Remove CTO Remove Firewall Remove Network Remove Security
article thumbnail

BackBox adds network vulnerability management to automation platform

Network World

BackBox this week announced its Network Vulnerability Manager (NVM), a software add-on to its existing Network Automation Platform, that will enable network managers to automate operating system upgrades, network configuration updates, and various remediations across firewalls and other network and security devices.

Network 106
article thumbnail

Koch CTO teams up to get cloud networking right

CIO Business Intelligence

Integrating a new network after an acquisition can be a sizable headache for any CIO. Traditionally, to integrate its acquisitions, Koch would flatten the acquired company’s core network, says Matt Hoag, CTO of business solutions at Koch. It’s more complicated than standard networking, Hoag says. Laying the foundation.

CTO 86
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to minimize remote access cyber security threats in 2024

CIO Business Intelligence

The remote work revolution has pushed companies to rethink their security and data protection practices amidst hybrid work and cloud environments. trillion by 2025, as cyber risk management has not kept up with digital transformation posing serious risks to organizations’ security and revenue.

Security 121
article thumbnail

Palo Alto Networks: Proactively Averting Cyber Attacks

CTOvision

It''s important to utilize every form of security to get closer to proactive prevention. Products from Palo Alto Networks can give you that platform approach. Their trifecta of Next Generation Firewall, Threat Intelligence and Advanced Endpoint Protection, can be the key to proactive mitigation of the cyber threat.

Network 150
article thumbnail

Microsegmentation – Secure Your Internal Network

CTOvision

The problem is that threat actors are able to get through the castle gates (firewalls) and once in, are able to evade the castle guards (IPS). Since 2000, secure networks have been built by segmenting traffic at the switch port level from server to server, radically limiting east-west traffic. Microsegmentation will fix this.

Network 150
article thumbnail

Maturing Security Posture and Mitigating Concerns with FireMon

CTOvision

According to Greg Young of the Gartner Group, many organizations are taking the “adopt first, secure later” approach to the cloud. Currently, IT organizations are initially finding ways to meet emerging business requirements, and then realizing the necessity of identifying additional security controls. Find out more about FireMon here.

Security 150
article thumbnail

Palo Alto Networks Uses Neural Networks to Attack Insider Threat

CTOvision

Interestingly enough, Palo Alto Networks is working on ways to help its customers leverage the high fidelity data coming out of its Enterprise Security Platform. A SOM is a type of artificial neural network that uses unsupervised learning to produce a discretized representation of its input.

Network 150