Remove Architecture Remove Network Remove Webinar
article thumbnail

Want to transform networking? Empower the missing users

Network World

As 2025 kicked off, I wrote a column about the network vendor landscape specifically, which networking players will step up and put their efforts into finding new applications with solid business benefits that could enable a network transformation. Candidates for that role, it seems to me, are in fact the target of the webinar.

Network 397
article thumbnail

VPN vs. ZTNA: Cisco tackles pros and cons

Network World

Enter zero trust network access (ZTNA), which provides secure remote connectivity that has quickly become a preferred alternative to VPN. Unlike VPNs, which grant full network access once connected, ZTNA verifies user identity and only provides access to the specific applications and data needed for their role, minimizing the attack surface.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT/OT convergence propels zero-trust security efforts

Network World

Physical isolation from IT networks protects OT systems against threats, but it also prevents companies from driving more automation, efficiency, and intelligence into business operations. Enterprises also want to extract data from OT systems, which requires network connectivity.

Security 391
article thumbnail

Zero Trust security, why it’s essential In today’s threat landscape

CIO Business Intelligence

As a networking and security strategy, zero trust stands in stark contrast to traditional, network-centric, perimeter-based architectures built with firewalls and VPNs, which involve excessive permissions and increase cyber risk. The main point is this: you cannot do zero trust with firewall- and VPN-centric architectures.

Security 216
article thumbnail

Live Data Breach Webinar Featuring Dave Shackleford

CTOvision

Widely known security practitioner Dave Schackleford is presenting a webinar on Thursday 15 may at 2pm Eastern that should be of high interest to any enterprise technologist seeking to understand the dynamics of the modern data breach. By Bob Gourley. The following is from the invitation: You’re a target for data breach.

article thumbnail

Sustainability, grid demands, AI workloads will challenge data center growth in 2025

Network World

In a way, the battle between sustainability objectives and AI and development objectives inside government and across society hasnt really begun, Lawrence explained on a recent webinar sharing the research firms predictions.

article thumbnail

Meter Command: the modern network interface

CIO Business Intelligence

This rigidity is even more pronounced in infrastructure and networking. Infrastructure and networking, in particular, have been command-line interface (CLI) driven for decades. The last major change in networking software was moving from CLI to cloud management via dashboards, sacrificing precision for accessibility along the way.

Network 290