IT Security

Global Unified Threat Management Market: Rise in Network Security Threats

Global Unified Threat Management Market Research Report 2016-2020, is structured with comprehensive market analysis and industry expert’s recommendations. Analysts Forecast

The World of Biometrics, Mobile ID and Finance

Banking With a Selfie in Argentina ICBC, the largest bank in the world by asset volume, recently embraced facial recognition

What’s the difference between SDN and NFV?

SDN, NFV & VNF are among the alphabet soup of terms in the networking industry that have emerged in recent

Getting The Most Out of Your SIEM Investment

Over the last 10-15 years, many organizations built Security Operations Centers (SOCs) on the backbone of security information and event

The Emergence of Virtual Reality and Augmented Reality in the Security Operations Center

Organizations are increasingly clustering their skills and capabilities into security operations centers (SOCs). An SOC is a focused facility where

NGIPS are Game Changers in Security

Organizations are replacing their Stateful firewalls with Next-Generation firewalls (NGFW) and Next-Generation Intrusion Prevention systems (NGIPS). Most traditional firewalls are

Improving the Cyber Analyst Workflow Through Gamification

Gamification — the process of applying game principles to real-life scenarios — is everywhere, from U.S. army recruitment to immersive cybersecurity

Securing the Digital Economy With Federated Identity Management

As the global digital economy grows, the number of digital identities rises, and so does the need to protect and

Regional Regulatory Compliance Trends: Strategies and Implications

Extracted from a podcast by Tim White, Director of Product Management, Policy Compliance at Qualys, who talks about regulatory compliance

Gartner Identifies the Top Technologies for Security in 2017

Gartner, Inc. highlighted the top technologies for information security and their implications for security organizations in 2017. Analysts presented their

7 Patch Management Practices Guaranteed To Help Protect Your Data

We’re in an era in which pre-packaged exploit services make it possible for the average Joe, with no technological experience

5 Hot Enterprise Backup and Recovery Vendors

The data backup market is changing fast. Here are five vendors leading the transformation. The backup and recovery market has

Three Reasons Network Security Policy Management is a Big Deal

As Ron Kehoe wrapped up his Data Center World session about Network Security Policy Management (NSPM) this past Wednesday, an

Training Courses

Technical Training Courses Looking for a course that fits your particular needs? Browse a catalog of the courses offered through

Juniper Aims For Pervasive Network Security With New Firewalls, Policy Enforcer

Juniper Networks has announced two new firewalls in its SRX line with throughput up to 40Gbps. The company also announced

Use a Malware Simulator to Better Defend Against Ransomware

If you are looking for ways to run a malware simulator to test ransomware and other forms of malware in