YOU ARE AT:TagsSecurity

BROWSING: Security

Five important questions to ask your cloud vendor

Choosing a vendor Businesses are increasingly migrating to the cloud in order to deploy applications, scale resources on-demand, cut costs, among other benefits. In order to reap the benefits of the cloud, however, a company must first choose a cloud vendor, which is no small...

Security concerns motivate SD-WAN adoption, Versa study finds

Versa Networks publishes global SD-WAN survey Versa Networks recently published a report that found software-defined wide area network (SD-WAN) adoption is on the rise as a way to improve security. SD-WAN is a way of connecting and securing WANs, which are used by data centers and...

Kagan: Privacy is only an illusion in a connected home

Every coin has two sides. We’ve been talking for so long about all the coming benefits of wireless smart homes, connected homes and connected offices. And it’s true, there are many incredible advancements in this space. However, there is an important warning I want...

Alibaba’s cloud product extension eyes European businesses

Alibaba Cloud launches eight new products Alibaba Cloud, a subsidiary of Alibaba Group, recently deployed eight products spanning the gamut of artificial intelligence (A.I.), big data, infrastructure, security and private cloud solutions. The products were unveiled at Mobile World Congress (MWC) in Barcelona, Spain. The purpose...

Enterprise IoT security considerations

Security concerns are regularly cited as the number one IoT deployment concern or barrier to adoption. “Security” covers a wide swath of considerations, both in terms of prevention and reaction. One of the first things that every expert acknowledges is that vulnerabilities and penetration will...

Demand for security drives Palo Alto second quarter revenue growth

Palo Alto Networks announces second quarter earnings Palo Alto Networks released financial results for its fiscal second quarter 2018. The fiscal second quarter 2018 grew 28% year-over-year to $542.4 million, compared with total revenue of $422.6 million for the fiscal second quarter 2017. Palo Alto attributed its...

Rackspace and Cisco collaborate on securing multi-cloud environments

Rackspace deploys over 22,000 Cisco firewalls Rackspace is making Cisco's next-generation firewalls available to customers who need to secure multi-cloud environments. Cisco and Rackspace’s partnership stretches back nearly 20 years, with Rackspace being recognized as one of Cisco's largest firewall customers. As Cisco’s testing partner, Rackspace...

Aerohive A3 aims to enable security, onboarding for connected devices

Aerohive Networks introduce new hybrid cloud-access management solution Aerohive Networks recently premiered a hybrid cloud-access management solution, dubbed Aerohive A3, slated to be released the second quarter of this year. The purpose of Aerohive A3, according to the company, is to bring onboarding, security, management and...

3 precautions for using wireless IP security cameras (Reader Forum)

Traditional analog CCTV camera systems are quickly losing favor, and IP cameras are taking their place. This is mostly because analog cameras produce low-resolution video while IP cameras produce high-resolution digital footage. Additionally, an IP camera allows for two-way communication between the camera and...

Allot: Mobile security offerings boost customer satisfaction

Mobile customers are increasingly worried about the security of their devices, and operators which cater to them with a network-based mobile security solution have higher customer satisfaction, according to a new report from Allot Communications. But the strategy on how security is positioned --...

What’s in store for Kubernetes in 2018

The de facto standard for container orchestration Kubernetes was crowned the de facto standard of container orchestration in 2017, with companies like Oracle, Amazon Web Services (AWS) and Docker embracing the open source platform. According to the Portworx Annual Container Adoption survey that included insight...

Enterprise IoT Editorial Webinar: IoT Devices for the Enterprise

IoT devices aimed at the enterprise space serve a wide variety of purposes and must be designed, tested and deployed in ways that address the unique needs of businesses. Unlike large-scale, consumer-oriented IoT offerings, enterprise IoT devices must be differentiated to serve specific industry...

Analyst Angle: IoT — how we got here and concern for privacy

  Internet of Things (IoT) has become a rallying cry for the world of connecting (mostly small devices) together and to the Cloud. This could be one of the largest new markets to develop in decades. You get meters able to read and forward information...

EasyStack EKS eyes enhancing DevOps, security and interoperability

EasyStack launches EasyStack Kubernetes Service (EKS) EasyStack, an open source cloud computing solutions provider in China, premiered EasyStack Kubernetes Service (EKS) at the KubeCon + CloudNativeCon 2017 in Austin, Texas, with capabilities like orchestration, scheduling, security, operations and maintenance holding the spotlight. Kubernetes, a platform that...

Meet the Qualcomm Snapdragon 845 mobile platform

Snapdragon 845 brings major advancements in immersive AV, AI, security, connectivity and performance For the past five year, Qualcomm Technologies has spent more than $1 billion per quarter on research and development. Last week, with a bevy of executives, partners, press and analysts on hand...

A review of the latest IIoT security regulations and guidelines

Conformity is everything in the fight against cyber-crime. Traditionally, the way to secure IT systems has been to “bring everything together, and keep everything the same”, remarks Senthil Ramakrishnan, lead member of technical staff at AT&T. But the internet of things (IoT) confounds this...

IIoT security: How to securely connect legacy OT systems

The internet of things (IoT) has turned the industry’s traditional security model of isolationism on its head. Suddenly, devices and systems, until now segregated by physical locks and operational air-gaps, are easily accessible. “In IT, servers are locked away in data centers where only...

Enterprise IoT Editorial Report: Industrial IoT security – the pitfalls and practicalities of securing manufacturing and supply chain IoT systems

The ‘internet of things’ (IoT) will usher in a fourth industrial revolution, and raise a storm. Manufacturing and distribution businesses anchored by old systems and processes will be drowned by the rising tide; those that transform their operations will catch a sail. But it...

Enterprise IoT Editorial Report: Industrial IoT security – the pitfalls and practicalities of securing manufacturing and supply chain IoT systems

The ‘internet of things’ (IoT) will usher in a fourth industrial revolution, and raise a storm. Manufacturing and distribution businesses anchored by old systems and processes will be drowned by the rising tide; those that transform their operations will catch a sail. But it...

Enterprise IoT Webinar: Enterprise IoT Playbook – Effective rollout strategies and security for enterprise

Somebody said it first: everything that can be connected will be connected. In tech, it seems never a truer word was spoken. Analysts reckon there will be 30 billion connected ‘things’ by 2020, and 75 billion by 2025. The ‘internet of things’ (IoT) promises...

Enterprise IoT Editorial Webinar: Enterprise IoT Playbook – Effective rollout strategies and security for enterprise

Somebody said it first: everything that can be connected will be connected. In tech, it seems never a truer word was spoken. Analysts reckon there will be 30 billion connected ‘things’ by 2020, and 75 billion by 2025. The ‘internet of things’ (IoT) promises...

IIoT security: How to establish a supply chain of trust

There are security vulnerabilities throughout the IoT supply chain, stretching right back to sourcing components. Enterprise users, particularly those engaged in industrial operations and critical operations, should review and monitor their IoT suppliers, and work with trusted and reputable partners. “The largest challenge for...

IIoT security: Why devices are the weakest link in the IoT stack

The most significant challenge for the internet of things (IoT) is device security. Without question, devices represent the weakest link in the IoT technology stack, the industry reckons. “This is because devices are constrained in battery and computing power,” notes Carlos Carazo, director of...

Preventing IoT Edge Device Vulnerabilities

  Security issues around IoT edge devices are rarely mentioned in literature, however, the projected billions of IoT edge devices out in the wild makes for a vast attack surface. Should hardware designers be concerned about security for IoT edge devices? And, is it worth...