Remove Authentication Remove Firewall Remove Network
article thumbnail

Are Your Firewalls and VPNs the Weakest Link in Your Security Stack?

Network World

It’s the opposite of a firewall and VPN architecture, where once on the corporate network everyone and everything is trusted. Recent critical vulnerabilities in VPNs and firewalls have exposed the risks associated with perimeter-based security measures.

Firewall 158
article thumbnail

Cisco adds a firewall, upgrades security

Network World

Security is the name of the game at Cisco’s Partner Summit gathering this week with the rollout of a new firewall and added data-loss prevention (DLP) and passwordless authentication features to its security wares. Available early next year, the 1U 3105 supports 10Gbps throughput, 7Gbps IPSec throughput and 3,000 VPN peers.

Firewall 183
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

8 questions to ask vendors about Zero Trust Network Access (ZTNA)

Network World

Today’s hybrid workplace, where employees are on the road, working from home and maybe visiting the office once or twice a week, has forced network and security teams to adopt a more flexible approach to managing the network, identities, and authentication.

Network 212
article thumbnail

Tempered Networks simplifies secure network connectivity and microsegmentation

Network World

The TCP/IP protocol is the foundation of the internet and pretty much every single network out there. There’s nothing in the protocol for security, mobility, or trusted authentication. The fundamental problem with TCP/IP is that the IP address within the protocol represents both the device location and the device identity on a network.

Network 167
article thumbnail

Cisco issues firewall, SD-WAN security warnings

Network World

Amongst Cisco’s dump of 27 security advisories today only one was rated as critical – a vulnerability in its Firepower firewall system that could let an attacker bypass authentication and execute arbitrary actions with administrative privileges on a particular device. To read this article in full, please click here

Firewall 151
article thumbnail

Networking terms and definitions

Network World

To find a brief definition of the networking term you are looking for user your browser’s “Find” feature then follow links to a fuller explanation. AI networking AI networking refers to the application of artificial intelligence (AI) technologies to network management and optimization.

Network 174
article thumbnail

Fortinet tightens integration of enterprise security, networking controls

Network World

Fortinet has made available a new release of its core FortiOS software that includes features the vendor says will help enterprises more tightly meld security and networking controls. FortiOS 7.2, How to choose an edge gateway. FortiOS is the vendor’s operating system for the FortiGate family of hardware and virtual components.

Network 158