Friday, June 21, 2013

Cisco impresses with first crack at next-gen firewall

  Shootout results: Best security tools for small business | Start-up tackles advanced persistent threats on Microsoft, Apple computers
 
  Network World Compliance

Forward this to a Friend >>>


Cisco impresses with first crack at next-gen firewall
When we tested next-generation firewalls last May, at least one important security vendor wasn't there: Cisco, because they weren't ready to be tested. Now that the ASA CX next-generation firewall has had a year to mature, we put the product through its paces, using the same methodology as our last NGFW test. Read More


WEBCAST: LogiAnalytics (formerly LogiXML)

Webinar: Create Competitive Advantage, Featuring Synchology
View this Webcast to hear, first-hand, how one organization transformed their client services with an analytics tool that enabled them to quickly build and deploy web-based dashboards, reports, and interactive analytics – all at a fraction of the cost of traditional BI platforms. View Now!

WHITE PAPER: F5 Networks

Tackling Peak Traffic Demands in Today's Data Center
As demands on data center infrastructure increase, both IT professionals and their tools will need to adapt. Learn how application delivery controllers (ADCs) can accommodate enterprise needs for performance and scalability while providing a unified platform for application services. Download the report today. Download Now

INSIDER
Shootout results: Best security tools for small business
If you run a small business, you have a lot of choices to protect your network. You can buy a consumer-grade router for less than $50, you can spend more than $4,000 for an enterprise firewall, or you can select something in between. Read More

Start-up tackles advanced persistent threats on Microsoft, Apple computers
Start-up CrowdStrike today made available its first product, called Falcon, designed to detect and block stealthy infiltrations of Microsoft Windows or Apple Macintosh-based endpoint machines and servers. Read More

Apple end-to-end encryption far from bulletproof
Apple won't provide experts with details of encryption architecture, so what it means by 'cannot decrypt"' data is unclear, expert says Read More


WHITE PAPER: Latisys

Latisys Cloud Powered by Industry Leading HP CloudSystem
This short video highlights the advantages of working with a trusted partner to determine which services are critical to move to the cloud, and which aren't – and how your entire IT infrastructure can be optimally designed so that you're experiencing maximum savings and performance without losing control. View Now

Stanford tries to improve 'Do Not Track' browser privacy
Stanford University has launched an online privacy initiative meant to complement Do Not Track, an effort aimed at preventing sites from recording people's Web browsing without permission. Read More

Wall Street sets example for testing security defenses
Quantum Dawn 2 will test institutions' playbooks while also finding more efficient ways to share real-time information Read More

Rising SSL traffic to degrade firewall performance
Drop in performance caused by extra workload required to decrypt data packets to look for malicious code, then re-encrypting before sending Read More


WHITE PAPER: FICO (formerly Fair Isaac)

Deliver Customer Value with Big Data Analytics
Big Data requires that companies adopt a different method in understanding today's consumer. Read this white paper to learn why Big Data is not just another passing trend. Learn more.

Federal regulators address rising security risk to medical devices
Issues recommendations, noting existing 'vulnerabilities ... that could directly impact medical devices or hospital network operations' Read More

Microsoft tacks up first wanted poster, debuts temp bounty for IE11 bugs
Microsoft on Wednesday backpedaled from a long-standing refusal to pay bug bounties when it announced a temporary program for the beta of Internet Explorer 11 (IE11). Read More

With faster 5G Wi-Fi coming, Wi-Fi Alliance kicks off certification program
The Wi-Fi Alliance unveiled a certification program for 802.11ac Wi-Fi (also known as 5G Wi-Fi) designed to make sure devices using the wireless technology interoperate with older hardware. Read More

NSA defends spying as backlash rages
Mounting backlash against National Security Agency spying practices is now coming from sources as varied as security expert Bruce Schneier, former Reagan-era budget director David Stockman and high-level representatives of European countries. Read More

 

SLIDESHOWS

Best security tools for under $3,000

Check Point wins test of eight unified threat management (UTM) devices for small business.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Keep the AGs away from Google's autocomplete

7. Start-up readies network-optimized Linux for data centers

2. iPad 5 rumor rollup for the week ending June 18

3. Cisco denies spying

10. Apple end-to-end encryption far from bulletproof

4. Scientist out to break Amdahl's law

8. Verizon accused of intentionally slowing Netflix video streaming

5. Latest iPhone 6 concept design inspired by Apple iOS 7 debut

9. FBI/IC3 says online mug shot 'extortion' a growing problem

6. Getting the most out of flash storage

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment