Network Security Resources

Network Security news and support resources, featuring the hottest solutions, technologies and vendors in the Network Security world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Tag "Network Security"

RedHat OpenShift Security – Kubernetes Network Security

NeuVector
RedHat OpenShift and Kubernetes provide the tools to deploy and manage containers at scale. But how can OpenShift security be integrated into the workflow? In this briefing, NeuVector CTO Gary Duan introduces the docker container threat landscape and the Openshift security requirements for the Build, Ship, and Run phases. Runtime visibility and Kubernetes security is […]

Microsoft Announces Just-In-Time VM Access Public Preview

Microsoft
Attackers commonly target cloud environments with Brute Force or Port Scanning attacks, typically against management ports like RDP and SSH that are left open to enable administrators access. In addition to detecting and alerting you to these attacks, Azure Security Center just released a new Just-In-Time (JIT) VM Access mechanism. JIT VM Access, now in […]

Gartner Says Worldwide Information Security Spending Will Grow 7 Percent to Reach $86.4 Billion in 2017

Gartner
Business Impact of Security Incidents and Evolving Regulations Driving Market Growth Worldwide spending on information security products and services will reach $86.4 billion in 2017, an increase of 7 percent over 2016, with spending expected to grow to $93 billion in 2018, according to the latest forecast from Gartner, Inc. Within the infrastructure protection segment, Gartner forecasts […]

Unified Endpoint Management (UEM) and IT Security: Critical Connections

Ivanti
UEM and cybersecurity are separate specialties within many enterprises and IT teams. However, these two important disciplines are inextricably intertwined. Herewith, some thoughts on those interdependencies and what they mean to your UEM and security management efforts. Security Begins at Your Endpoints The respected market watchers at Forrester Research perhaps said it best in The Forrester Wave™: Endpoint Security Suites, Q4 2016. “Endpoint security represents the frontline in your […]

Microsoft: Using Microsoft R Server Operationalization on HDInsight

Microsoft
R Server on HDInsight cluster allows R scripts to use Spark and MapReduce to run distributed computations. You can develop a model and operationalize the model to make predictions by configuring Edge Node as One-Box. We have One-Click Deploy ARM Templates using which you can create R Server on HDInsight Cluster with EdgeNode configured as […]

Just in time Access for Virtual Machines in Azure

IT Blog by Marius Sandbu
The issue with sometimes having a virtual machine on Microsoft Azure is that if it is publicly accessible that the IP is uses is on a known IP range (Microsoft publishes the IP ranges here – –> https://www.microsoft.com/en-us/download/details.aspx?id=41653 which will make those IP addresses quite popular by hackers using different brute force mechanisms. (Having a […]

How to configure Citrix NetScaler Global Server Load Balancing to Recover your Citrix XenDesktop or XenApp environment in Microsoft Azure

Christiaan Brinkhoff
Building the Digital Workspace of the Future can be a interesting road to follow. To prepare your environment for a Public Cloud, such as Microsoft Azure, there are different approaches to follow. Microsoft provides a great method to replicate, failover and/or migrate your on-premises servers to Azure with the service named Azure Recovery Service, what actually 1:1 replicates […]

VMware: Getting up to speed with Micro-Segmentation

VMware
High-profile cyber attacks are frequently in the news these days, putting IT security at the forefront of everyone’s minds. The WannaCry and Petya ransomware assaults, in particular, hit major businesses across the world in nations as diverse as the US, Russia, India, Taiwan and Britain. The WannaCry extortion attack alone impacted more than 300,000 PCs […]

How to Secure Docker Networking for Access to External Networks and Applications

NeuVector
Getting container visibility and security for docker networking can be a challenge even for a pure container based application stack, or cluster. For most enterprises this challenge can be even tougher when trying to secure a hybrid environment with both container and non-container applications. Many enterprises are in the midst of migration projects to a […]

Microsoft’s New Networking Features in Azure Scale Sets

Microsoft
Today we are announcing a set of networking enhancements for Azure virtual machine scale sets. We are adding new ways to assign IP addresses, configure DNS, and assign network security. Azure scale sets were built to provide a fast and easy way to deploy and manage a collection of virtual machines. The initial implementation of […]

Microsoft Azure Network Security Documentation

Microsoft
We know that security is job one in the cloud and how important it is that you find accurate and timely information about Azure security. One of the best reasons to use Azure for your applications and services is to take advantage of Azure’s wide array of security tools and capabilities. These tools and capabilities […]

Cisco Extends Security Openness with McAfee Interoperability and New Technology Partners

Cisco
Vendor “openness” drives better outcomes for the state of information security.  That’s why Cisco has invested and committed so heavily to our Cisco Security Technical Alliances (CSTA) program in recent years.  CSTA now has over 130 technology partners…a six-fold increase from where we started nearly four years ago.  It is a use-case driven technology partner […]

Citrix: Network Security – Winning the Battle, but Losing the War?

Citrix Systems
A cyber war is raging all around us, with increasingly capable warriors on both sides of the battlefront. On the attack are cybercriminals, malware, and all those who threaten both sensitive data and our digital lives. Defending against threats and attacks are cyberwarriors who are tasked with preserving the sanctity of intellectual property, privacy, and […]

Cisco: Breaking Down Cisco’s Biggest Innovation In the Past Decade

Cisco
Just over a year ago, David McGrew, one of Cisco’s fellows, walked into my office to brief me on a project he was working on. The next 45 minutes were pretty unforgettable. He explained to me that he and his team had discovered how to solve one of the biggest challenges in network security: They […]

Visit Our Sponsors

Close