Remove Firewall Remove Mobile Remove Network
article thumbnail

Embrace DBaaS to Speed Up Mobile App Development

CTOvision

As enterprises work to rapidly embrace the mobile revolution, both for their workforce and to engage more deeply with their customers, the pressure is on for IT to support the tools needed by their application developers. There’s no denying the massive growth in mobile applications within the enterprise. By Chip Childers.

Mobile 264
article thumbnail

Are Your Firewalls and VPNs the Weakest Link in Your Security Stack?

Network World

It’s the opposite of a firewall and VPN architecture, where once on the corporate network everyone and everything is trusted. Recent critical vulnerabilities in VPNs and firewalls have exposed the risks associated with perimeter-based security measures.

Firewall 136
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Tempered Networks simplifies secure network connectivity and microsegmentation

Network World

The TCP/IP protocol is the foundation of the internet and pretty much every single network out there. There’s nothing in the protocol for security, mobility, or trusted authentication. The fundamental problem with TCP/IP is that the IP address within the protocol represents both the device location and the device identity on a network.

Network 165
article thumbnail

Networking terms and definitions

Network World

To find a brief definition of the networking term you are looking for user your browser’s “Find” feature then follow links to a fuller explanation. AI networking AI networking refers to the application of artificial intelligence (AI) technologies to network management and optimization.

Network 156
article thumbnail

The Cloud – Gateway to Enterprise Mobility

Eric D. Brown

The world of mobile ten years ago was one that was mobile, but wasn’t. Companies setup virtual private networks (VPN’s) to allow access to the company systems from outside the firewall. Today, mobility is much different in most organizations. The security issues that existed were fairly minor.

Mobile 140
article thumbnail

Are next-generation firewalls legacy technology?

Network World

A few years ago, next-generation firewalls (NGFWs) came out of nowhere to become a network security staple. These devices combined traditional L3/L4 packet filtering with deep packet inspection, IPS, and other network security services along with knowledge about users and applications. This model is changing rapidly, however.

article thumbnail

Overcoming the Equation: Security = Friction

CTOvision

We’ve migrated to a userid-password society; as we’ve added layers of security, we password-protect each layer: PC (and now device), network, enclave, application, database, and storage (encryption). A telling example is the Department of Defense and its approach to mobile security. However, the derived credential has less friction.

Security 249