Enterprises preparing to adopt Secure Access Service Edge should understand how the architecture presents organizational and architectural challenges for network and security teams.
Category Archives: Security
Supporting remote workers in your pandemic response plan
To support employees working from home, network teams should carefully monitor VPN traffic, review firewall rules and rely on remote access support software.
How SD-WAN changes the network security perimeter
The advent of SD-WAN has changed the network security model by pushing more security and control to the edge — and businesses need to adjust to this new reality.
What does a zero-trust model mean for network security?
A zero-trust model limits access and permissions according to a defined set of parameters that enterprises specify for each application. Learn what this means for network security.
The top 9 trends in network technology for 2019
In the new year, expect SDN and SD-WAN to come back down to earth. Meanwhile, multi-cloud, edge computing and intent-based networking will ramp up. Plus, data centers are not dead.
HPE Locks Down Server Security
Security threats are quickly becoming a top priority outside of the IT organizations as businesses see security as a top hindrance to achieving their business goals. Hewlett-Packard Enterprise has developed its new generation of servers with security in mind, claiming the most secure server available.
Click here to read the paper
Cisco UCS: True System Innovation
Most servers today have a 20+ year legacy, which can be a hindrance to true flexibility because they are mired in the past. Cisco built its UCS product from a clean sheet of paper, designing a system, not a server, in order to tackle the compute challenges of both today and the future.
Click here to read the paper
CIOs Are Driving Digital Transformation
The drive for digital transformation is being led by the CIO. Because of the criticality of this transformational strategy, the CIO is finding a place at the table more often because their efforts are now driving the business, not just the infrastructure.
Click here to read the paper
Security Follows Compute to the Edge
Edge compute has become more prevalent as technologies like IoT are beginning to be deployed and more enterprises are becoming more distributed. Hewlett-Packard Enterprise has a strategy to ensure security throughout the chain, from the datacenter to the edge.
Click here to read the paper
Recommended Daily Security Allowance
Security is a mess. Half of the problems can be traced to vendors and the other half can be traced to customers. Part of the challenge on the vendor side is that they have the ability to claim capabilities without really spelling out what “secure” means. This needs to change.