We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

\ Networking

 


September 13, 2018 | Networking and Network Devices
By Dave Shackleford, IANS Faculty

 Six Secure Email Gateways Compared

Secure email gateways come in a variety of form factors and vary in terms of features, ease of integration, scalability and more. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford details the pros and cons of offerings from six vendors: Barracuda Networks, Cisco, Forcepoint, Microsoft, Symantec and Trend Micro.

Read More »


September 6, 2018 | Firewalls, NGFW
By Dave Shackleford, IANS Faculty

 UTM Firewalls: An Overview

When choosing firewalls for unified threat management (UTM) appliances, organizations need to balance feature set with firepower. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford presents the pros and cons of options from Check Point, Palo Alto, Fortinet and Cisco.

Read More »


August 22, 2018 | Software-Defined Networking

 IANS Decision-Maker: Microsegmentation Scenarios

Once your environment is highly virtualized, likely with some use of public cloud as well, the use of microsegmentation tools and controls for network isolation and access control will come up. But how can you tell if this is a technology you need? This tool steps you through three main scenarios and their decision factors.

Read More »


July 17, 2018 | Authentication
By Michael Pinch, IANS Faculty

 Blockchain as an Infosec Strength and Weakness

As crypto currency trading grows more popular, people are hearing a lot about how the Blockchain is key to making it all work. Meanwhile, security experts are talking more about the technology as a defensive asset and, if abused, a dangerous threat vector. In this webinar, IANS Faculty Michael Pinch walks through how Blockchain came about, how it works and how it’s central to managing digital currency transactions. He also reviews how it can be used to bolster security, how the bad guys can exploit it to launch attacks, and what organizations can do to protect themselves.

Read More »