You've requested...

Network Access Control: User and Device Authentication

If a new window did not open, click here to view this asset.

Download this next:

Focus: Network security

During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.

All of this adds up to a real problem for hard-worked network managers, who are coming under more and more pressure to maintain the everyday running of the enterprise network while protecting it from multiple different threats to its well-being. One mistake could bring an entire business down for days, and in some cases, this can prove fatal.

In this guide we will explore some of the key themes driving enterprise network security initiatives, from how to protect and monitor day-to-day activity on the network, to tips on how to defend it from malicious external attackers, and the effect that emerging networking technologies, such as the Internet of Things (IoT) and software-defined networking (SDN) will have on enterprise network security, and how to adapt to face these changing realities.

These are also closely related to: "Network Access Control: User and Device Authentication"

  • Network security in the post-pandemic era

    With networks coming under strain due to the growth in remote work, cloud adoption and other digital transformation efforts, organisations have been struggling to get a handle on network security.
    This comes at a time when cyber attackers have been on the prowl, knocking on the doors of networks that are insecure in order to gain access to critical systems.
    Such challenges have prompted organisations to revamp their network security architecture, leveraging concepts like zero trust to keep threat actors at bay.
    In this e-guide, read more about the convergence of network management and security, and how network security will be impacted in the hybrid workplace, among other trends.

  • Next generation network security

    Network security has long been a top investment priority for organisations, typically taking the lion’s share of the cyber security budget, but technologies and the associated risks have changed in recent years. As a result, there is a need for new approaches to network security, especially in the light of digital transformation programmes and the technologies they are introducing to enterprise IT. While still observing the basics such as network segmentation, next generation cyber security has to take cognisance of and adapt to cloud computing services, devices making up the internet of things (IoT), the use of artificial intelligence (AI) in security, and the advent of software-defined networking (SDN), passive optical LAN (POL), network fabric architectures and hyper-segmentation. Network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats, and should now be seen as one of several key elements of a modern cyber security strategy.

Find more content like what you just read:

  • Best practices for addressing voice network vulnerabilities

    As communications technology has advanced and brought on subsequent security issues, it has become clear that firewalls alone are not enough to provide a secure network. Instead, enterprises need a complete, seamless approach to network security to preempt issues and protect their organizations. Access this white paper to learn more.

    Download

  • Network Security: Spotlight on Australia/New Zealand

    In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.

    Download

  • In 2017, the insider threat epidemic begins

    Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.

    Download

  • Infographic: 6 IT security threats to SMEs

    To learn about 6 IT security threats targeting small and medium-sized enterprises (SMEs), download this infographic.

    Download

  • Royal Holloway: Purple team playbook – threat modeling for security testing

    The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams

    Download

  • How Can Healthcare Protect Against Zero-Day Attacks and What Does It Mean?

    Zero-day attacks pose significant dangers to the healthcare sector, but defenders can mitigate risk by patching early and often.

    Download

  • Findings from MITRE Engenuity Enterprise ATT&CK Evaluations

    The MITRE Engenuity Enterprise ATT&CK Evaluations test the threat detection, visibility and protection capabilities of security tools like Cortex XDR. So, how does Cortex XDR, by Palo Alto Networks, stack up against other tools? Find out in this infographic.

    Download

  • How Cisco helped centralize and streamline Qdoba's security

    Qdoba Mexican Eats is connected and protected by Cisco Secure. Hear Gary Burgess, Director of Infrastructure and Security at Qdoba, discuss how a SASE solution that combines Cisco Umbrella cloud-delivered security and Meraki’s cloud-managed networking keeps connectivity reliable and secure.

    Download

  • Security for network and infrastructure to protect your business

    While security measures can be built into the foundation of your network infrastructure, no precaution is perfect, and you still need an incident response team. Access this landing page to learn how Reply leverages networking technologies alongside SIEM and other security tools, in order to provide top-to-bottom security for the network.

    Download

  • 12 essential features of advanced endpoint security tools

    Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing security policies. IT administrators can use endpoint security for a number of operation monitoring functions and data backup strategies. Here are 12 key features endpoint security products should include.

    Download

  • NDR for the SOC: Findings from Enterprise Strategy Group

    37% of organizations cite increasingly sophisticated threats as a major threat detection and response challenge, according to research by TechTarget’s Enterprise Strategy Group (ESG). So, how can businesses close the gaps in threat detection and response? Review this ESG research report to learn how open NDR can support that mission.

    Download

  • CW APAC: Buyer’s guide to SASE

    Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.

    Download

  • Palo Alto Networks 2nd Special Edition

    Most network and network security products on the market today weren’t designed to handle today’s security concerns. To address these challenges, Gartner came up with secure access service edge (SASE). Read this e-boo for an in-depth look at SASE and learn how you can secure your organization against today’s threats.

    Download

  • XDR for today’s medical facilities

    For medical facilities, cybersecurity is critical for protecting access to patient records and networked medical devices. With Palo Alto Networks Cortex XDR, discover how a California medical center can now identify and respond to threats much more rapidly in this case study.

    Download

  • Considering key networking trends

    As your distributed network grows, you have to keep in mind that your attack surface does too. So, how can you ensure that your network is protected from increasing and complex cyberattacks? Staying up to date on the latest networking trends can help. Explore this E-Guide to access 5 key networking trends for 2023.

    Download

  • A Computer Weekly buyer's guide to perimeterless network security

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

    Download

  • Towards more robust internetworks

    This article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks.

    Download

  • Threat management: Essential guide

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

    Download

  • 12 API security best practices

    As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.

    Download

  • Infographic: Network insights from ESG analysts

    As an organization’s network grows more complex, so does managing that network. To review 6 findings about the state of network management and visibility, browse this infographic by TechTarget’s Enterprise Strategy Group (ESG).

    Download

  • How SA Power Networks and CrowdStrike protect endpoints

    SA Power Networks is South Australia’s sole electricity distributor. With escalating threats targeting critical infrastructure, SA Power Networks had to reckon with a new level of danger. Download this case study to learn how SA Power Networks uses the CrowdStrike Falcon platform for endpoint detection and response (EDR).

    Download

  • Running Cisco Firepower Virtual Firewall on EndaceProbe

    Your network, like every network, is in danger of being attacked by the many emerging and complex threats in the cyber landscape. So, how can you augment your defense measures? View this video to learn about one avenue toward enhanced network security: running Cisco Firepower Virtual Firewall on EndaceProbe.

    Download

  • CW APAC: Expert advice on zero-trust security

    Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

    Download

  • Making Threat Intelligence Actionable with SOAR

    SOAR is gaining traction as a way to improve security operations. Security and risk management leaders should evaluate how these tools can support and optimize their broader security operations capabilities. Read this Gartner Marketing Guide to learn more about sifting through the noise and choosing the best-fit SOAR tool for your needs.

    Download

  • Tightly Control and Manage Access to Applications and Services with Zero Trust

    In this research report, AT&T’s Chief Security Officer (CSO) provides a unique perspective on implementing Zero Trust to control and manage access to applications and services. Read the full report to unlock this exclusive insight.

    Download

  • 9 essential elements of network security

    Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.

    Download

  • Software-defined networking: Spotlight on ASEAN

    In this e-guide, read about the state of adoption of Software-defined networking (SDN) in the ASEAN, how the technology can be used to secure critical systems and what you can do to get started.

    Download

  • Leader’s guide to network management for educational IT

    In this 16-page e-book, unlock recommendations for IT management in educational institutions.

    Download

  • 5 components of a future-ready enterprise network

    As customer experience (CX) and employee experience (EX) expectations evolve, can your enterprise network keep up? To help you confidently answer yes, this white paper breaks down 5 components of a future-ready network. Keep reading to access the full insights.

    Download

  • Royal Holloway: Security evaluation of network traffic mirroring in public cloud

    This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.

    Download

  • Cyber Security 2016 and beyond

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

    Download

  • Assessing your network-security posture: 6 considerations

    With advanced threats crowding the cyber landscape, how can you secure your dispersed workforce? This research report by Palo Alto Networks’ Unit 42 unpacks 6 components of a strong network-security posture. Keep reading to discover those insights – and much more.

    Download

  • Access Management Buyer's Guide

    The modern workforce is rapidly becoming more mobile and hyperconnected, and attackers are taking note. But with attackers constantly innovating and finding new ways to bypass weaker multifactor authentication (MFA) implementations, how can you authorize users and devices without putting the network at risk?

    Download

  • Today's attacks target people, not just technology

    Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.

    Download

  • Strengthen Your Incident Response with Endace and Cisco

    When a threat enters your network, you need to investigate it quickly. Endace and Cisco have teamed up to help you do so. Read this overview to learn how you can enhance your incident response by integrating EndaceProbe’s network packet history with Cisco Stealthwatch.

    Download

  • 7 characteristics of next-generation networking

    The term next-generation networking refers to the process of designing network infrastructure with new, advanced technologies. Next-generation networks are flexible, nimble and secure architectures that are easier to manage. In this article, analysts offer their perspectives on which technologies help modernize network infrastructures.

    Download

  • Why 88% of organizations are struggling with public cloud infrastructure

    Discover in this ESG showcase how Google's Cloud NGFW Enterprise, powered by Palo Alto Networks, combines best-in-class cloud engineering with industry-leading security to help your organization efficiently and effectively apply network security policies at scale.

    Download

  • Why 88% of organizations are struggling with public cloud infrastructure

    Discover in this ESG showcase how Google's Cloud NGFW Enterprise, powered by Palo Alto Networks, combines best-in-class cloud engineering with industry-leading security to help your organization efficiently and effectively apply network security policies at scale.

    Download

  • A Computer Weekly Buyer's Guide to Digital Transformation

    The future of organisations depends on their handling of digital transformation. In this14-page buyer's guide, Computer Weekly looks at how the IT operation can lead strategy, whether network security is keeping up and what can be learned from GE's digital journey.

    Download

  • Enhancing network edge security: 12-page e-book

    Yes, security threats are expanding – and so is the network edge. So, how can you ensure your organization’s users at the edge are as secure as possible? Tap into this e-book by Cradlepoint for guidance.

    Download

  • How complacency kills mobile security

    In this expert guide, learn how a lackadaisical attitude towards mobile security can prove to be catastrophic to enterprises as mobile threats continue to exploit known vulnerabilities to gut profits.

    Download

  • Infographic: SIEM vs. SOAR vs. XDR

    IT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.

    Download

  • Bolster signature-based malware detection with machine learning

    Discover how to enhance malicious code and behavior detection by combining signature-based detection with machine learning. Hear from experts Michael Cobb and Karen Scarfone about how to improve malware threat detection and 10 questions to ask endpoint security vendors.

    Download

  • Emerging trends in retail IT

    Innovation is changing retail from the storefront to the back office and beyond. Because of this transformation, IT teams and the enterprise networks they manage have never been more important. In this white paper, explore emerging trends in retail IT and considerations for choosing futureproof edge network solutions for retail.

    Download

  • The EVIL-ution of ransomware: What to know

    Ransomware attacks are not going away any time soon. Having your organization believing and trusting in your security protocols is important, especially when it comes to securing your network. Watch this video to learn more about the evolution of ransomware and what you can do to protect yourself today.

    Download

  • A Computer Weekly e-guide to SASE

    Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.

    Download

  • The enterprise buyer’s guide to IoT security

    46% of organizations are already embracing the Internet of Things (IoT) – and Gartner expects that number to rise dramatically in coming years. This e-guide provides an exclusive look at the IoT threat landscape and offers expert guidance for choosing the best-fit security tool to protect your IoT devices – read on to get started.

    Download