We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Insights Portal

\ Networking 

June 5, 2018 | Network Access Controls (NAC)
By Jennifer Minella, IANS Faculty

 Choose the Right NAC Solution

The success of a NAC solution depends heavily on an organization's specific goals and network environment, but certain features can make or break an implementation. In this Ask-an-Expert written response, IANS Faculty Jennifer Minella compares products from four vendors - Aruba, Bradford, Cisco and ForeScout - across four key feature areas.

Read More »

May 16, 2018 | Networking and Network Devices
By Dave Shackleford, IANS Faculty

 Five Secure Email Gateways Compared

Secure email gateways come in a variety of form factors and vary in terms of features, ease of integration, scalability and more. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford details the pros and cons of offerings from five vendors: Barracuda Networks, Cisco, Microsoft, Symantec and Trend Micro.

Read More »

May 7, 2018 | Architecture, Configuration and Segmentation
By Marcus Ranum, IANS Faculty

 Network Segmentation: A Primer

Network segmentation helps improve security and resilience to attack, but it's far from easy to implement. In this Ask-an-Expert written response, IANS Faculty Marcus Ranum explains the importance of segmentation and offers tips for successful implementation. 

Read More »

May 1, 2018 | Virtual Private Networks
By Dave Shackleford, IANS Faculty

 Evaluate Top VPN and Web Proxy Solutions

In addition to sporting the latest features and functions, VPN and web proxy solutions must also be easy to use and configure. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford compares four VPN solutions (from Check Point, Citrix, Palo Alto and Pulse) and two web proxy solutions (from McAfee and Symantec) across both sets of criteria.

Read More »

April 9, 2018 | Intrusion Prevention/Detection (IPS/IDS)
By Jake Williams, IANS Faculty

 Choose the Best IDS/IPS for a New Wide-Area Network

An IDS/IPS is a critical WAN security control, but choosing the right one for your environment requires some research. In this Ask-an-Expert written response, IANS Faculty Jake Williams details the key criteria to consider and suggests evaluating solutions from four main vendors: Check Point, Cisco, McAfee and WatchGuard.

Read More »

February 1, 2018 | Firewalls, NGFW
By Aaron Turner, IANS Faculty

 Address SSL Inspection Privacy and Performance Concerns

Most organizations agree that inspecting SSL traffic is critical to detecting and preventing all kinds of malware, but many let privacy and performance concerns hold them back from implementing the feature. In this Ask-an-Expert written response, IANS Faculty Aaron Turner offers practical steps for implementing SSL inspection without adversely impacting user privacy or application performance.

Read More »

December 21, 2017 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Manage SSH and RDP Securely

SSH and RDP are widely leveraged across most enterprises, but what are the best practices for securing them? In this Ask-an-Expert written response, IANS Faculty Aaron Turner underscores the importance of segmentation/filtering, jump servers and multifactor authentication in ensuring both protocols are implemented and managed securely.

Read More »

October 30, 2017 | Architecture, Configuration and Segmentation

 Internal Network Monitoring Solution Request-for-Proposal (RFP) Template

When creating a request for proposal (RFP) of any kind, the purpose is to ensure prospective vendors can check all of the necessary boxes. This document provides a comprehensive RFP template specifically designed for organizations seeking an internal network monitoring solution.

Read More »

October 16, 2017 | Wireless Networks

 KRACK Weakness in WPA2 Wi-Fi Security Protocol

On October 16, 2017, researchers disclosed a major weakness in the Wi-Fi Protected Access 1 (WPA1) and WPA2 security protocols. WPA2 is the most widely used Wi-Fi security standard in the world. The disclosure was a proof-of-concept, and there are currently no confirmed reports of this vulnerability, known as KRACK (an acronym for Key Reinstallation Attacks), being actively exploited in the wild.

Read More »