Sicurezza

The best enterprise level firewalls: Rating 10 top products

Pubblicato il

You know you need to protect your company from unauthorized or unwanted access. You need a network security tool that examines the flow of data packets in and out of the enterprise, governed by rules that decide whether that flow is safe, malicious or questionable and in need of inspection. You need a firewall. Recognizing […]

Sicurezza

REVIEW: Best VPN routers for small business

Pubblicato il

When selecting VPN routers, small businesses want ones that support the VPN protocols they desire as well as ones that fit their budgets, are easy to use and have good documentation. We looked at five different models from five different vendors: Cisco, D-Link, and DrayTek, Mikrotik and ZyXEL. Our evaluation called for setting up each […]

Sicurezza

What are the options for securing SD-WAN?

Pubblicato il

A key component of SD-WAN is its ability to secure unreliable Internet links and identify anomalous traffic flows. SD-WAN technology providers are continuing to increase their native security features and to create robust ecosystems of network-security partners. [ See where SDN is going and learn the difference between SDN and NFV. | Get regularly scheduled […]

Sicurezza

Microsoft adds resiliency, redundancy, security to Windows Server 2019

Pubblicato il

With Windows Server 2019, Microsoft is adding resiliency and redundancy enhancements to the Shielded Virtual Machines security controls it introduced with Windows Server 2016. Shielded VMs originally provided a way to protect virtual machine assets by isolating them from the hypervisor infrastructure and could also help prove to auditors that systems were adequately isolated and […]

Sicurezza

22 essential security commands for Linux

Pubblicato il

There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems. sudo Running privileged commands with sudo  – instead […]

Sicurezza

22 essential Linux security commands

Pubblicato il

There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems. sudo Running privileged commands with sudo  – instead […]

Sicurezza

Tips for securing IoT on your network

Pubblicato il

Judging by all the media attention that The Internet of Things (or IoT) gets these days, you would think that the world was firmly in the grip of a physical and digital transformation. The truth, though, is that we all are still in the early days of the IoT. The analyst firm Gartner, for example, […]

Sicurezza

Tips to improve IoT security on your network

Pubblicato il

Judging by all the media attention that The Internet of Things (or IoT) gets these days, you would think that the world was firmly in the grip of a physical and digital transformation. The truth, though, is that we all are still in the early days of the IoT. The analyst firm Gartner, for example, […]

Sicurezza

How to eliminate the default route for greater security

Pubblicato il

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Part of the reason is that many enterprises use an internet perimeter firewall performing port address translation (PAT) with a default […]

Sicurezza

Stopping ransomware starts with the security pros

Pubblicato il

Virtualization-based security software vendor Bromium surveyed security professionals about their behavior toward ransomware. The results were surprising. For example, 10 percent of them admitted to paying a ransom or hiding a breach. More alarming, 35 percent admitted to ignoring their own security protocols. After last week’s WannaCry event, these numbers may start to go down […]