Remove Firewall Remove Security Remove Symantec
article thumbnail

Are next-generation firewalls legacy technology?

Network World

A few years ago, next-generation firewalls (NGFWs) came out of nowhere to become a network security staple. These devices combined traditional L3/L4 packet filtering with deep packet inspection, IPS, and other network security services along with knowledge about users and applications. Cryptzone, Google BeyondTrust, Vidder, etc.)

Firewall 284
article thumbnail

With Project Cypress, VMware brings generative AI to cyberdefense

Network World

The generative AI tool is called Project Cypress, and it was announced last year as a tech preview, says Umesh Mahajan, vice president and general manager for application networking and security at Broadcom, which completed its acquisition of VMware last November. The tool can also suggest remediations, but it won’t act on its own. “We

Vmware 492
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Importance of Connecting with Our Customers

CIO Business Intelligence

By Rob Greer, Vice President and General Manager, Symantec Enterprise Division. As the GM of Symantec , I had the good fortune of being able to attend both the Gartner Security & Risk Management Summit and the 2022 RSA Conference the week of June 6. More tools require extra work to manage but don’t guarantee more security.

Symantec 246
article thumbnail

Microsoft Entra Suite is late to the SSE pool but will still make waves

Network World

SSE – secure service edge – is a cloud-based way to deliver secure access to corporate systems, SaaS applications, and the Internet in general. At its core, SSE combines three main technologies: cloud-access security broker (CASB), secure web gateway, and zero-trust network access ( ZTNA ). based Forrester Research.

Microsoft 305
article thumbnail

Leveraging MITRE ATT&CK: How Your Team Can Adopt This Essential Framework

CIO Business Intelligence

That would be a tremendous boon for your security team, right? Here’s the not-so-great news: while many teams are aware of the existence of this tool, too few have mastered the use of it, and still fewer have made it a core component of their security workflow. The danger of not understanding attacks : Security evasion.

Symantec 264
article thumbnail

A CISO POV: Securing AI in your company

CIO Business Intelligence

Enterprise AI traffic monitoring: Vigilantly monitor AI activities within the enterprise to identify anomalies or potential security threats and allow for prompt intervention. Firewall capability for AI security: Enhance security measures by providing firewall capabilities to safeguard against potential AI-related vulnerabilities.

Company 182
article thumbnail

Cathay Pacific to take cloud journey to new heights

CIO Business Intelligence

Cloud optimization is the new initiative in 2024,” says Rajeev Nair, general manager of IT infrastructure and security at Cathay, a major airliner and cargo carrier in the Asia-Pacific region, with headquarters in Hong Kong. It will replace the standard MPLS network, he adds. It will replace the standard MPLS network, he adds.

Cloud 298