Remove 2015 Remove Firewall Remove Network
article thumbnail

What is a firewall?

Network World

Network-based firewalls have become almost ubiquitous across US enterprises for their proven defense against an ever-increasing array of threats. A recent study by network testing firm NSS Labs found that up to 80% of US large businesses run a next-generation firewall. billion industry in 2015 and expected to reach $12.7

Firewall 167
article thumbnail

Fortinet grabs cloud security player Lacework

Network World

Founded in 2015, Lacework is known for its cloud-based machine learning, AI and automation technology that lets customers manage and secure cloud workflows. Fortinet has reached an agreement to buy cloud security company Lacework for an undisclosed amount.

Cloud 193
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Palo Alto Networks: Proactively Averting Cyber Attacks

CTOvision

Products from Palo Alto Networks can give you that platform approach. Palo Alto Networks promises to safely enable applications to prevent both known and unknown threats for all users on any device, and any network, physical or virtual, in a highly automated way, while sharing threat intelligence with their customers.

Network 150
article thumbnail

Chinese APT Exploits Zero-Day in Versa Director, Targets Global IT

SecureWorld News

Versa Networks has classified this as a privilege elevation flaw, as it was primarily used to harvest credentials from users logging into the system. Versa Networks has responded to the threat by: Releasing patches for affected versions of Versa Director; Advising customers to upgrade to version 22.1.4 and 22.1.3.

article thumbnail

Koch CTO teams up to get cloud networking right

CIO Business Intelligence

Integrating a new network after an acquisition can be a sizable headache for any CIO. Traditionally, to integrate its acquisitions, Koch would flatten the acquired company’s core network, says Matt Hoag, CTO of business solutions at Koch. It’s more complicated than standard networking, Hoag says. Laying the foundation.

CTO 89
article thumbnail

2015 Cyberthreat Defense Report Reveals Cyberattacks Rising and Confidence Sinking

CTOvision

In 2014, 71 percent of respondents’ networks were breached with 22 percent of them victimized six or more times. This is a significant increase from the preceding year, which saw 62 percent of respondents’ networks breached, with 16 percent of them victimized by six or more successful cyberattacks. Waking up to a new reality.

Report 150
article thumbnail

Firemon: Providing proactive security intelligence and governance over your IT

CTOvision

Firemon enables enterprises to continuously analyze, visualize and improve the capabilities of your existing network security infrastructure. Enterprises use FireMon to perform key management tasks like Firewall rules cleanup, firewall policy changes, reducing complexity of firewall rulesets and ensuring compliance.