You've requested...

Network Access Control: User and Device Authentication

If a new window did not open, click here to view this asset.

Download this next:

Focus: Network security

During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.

All of this adds up to a real problem for hard-worked network managers, who are coming under more and more pressure to maintain the everyday running of the enterprise network while protecting it from multiple different threats to its well-being. One mistake could bring an entire business down for days, and in some cases, this can prove fatal.

In this guide we will explore some of the key themes driving enterprise network security initiatives, from how to protect and monitor day-to-day activity on the network, to tips on how to defend it from malicious external attackers, and the effect that emerging networking technologies, such as the Internet of Things (IoT) and software-defined networking (SDN) will have on enterprise network security, and how to adapt to face these changing realities.

These are also closely related to: "Network Access Control: User and Device Authentication"

  • Network security in the post-pandemic era

    With networks coming under strain due to the growth in remote work, cloud adoption and other digital transformation efforts, organisations have been struggling to get a handle on network security.
    This comes at a time when cyber attackers have been on the prowl, knocking on the doors of networks that are insecure in order to gain access to critical systems.
    Such challenges have prompted organisations to revamp their network security architecture, leveraging concepts like zero trust to keep threat actors at bay.
    In this e-guide, read more about the convergence of network management and security, and how network security will be impacted in the hybrid workplace, among other trends.

  • Next generation network security

    Network security has long been a top investment priority for organisations, typically taking the lion’s share of the cyber security budget, but technologies and the associated risks have changed in recent years. As a result, there is a need for new approaches to network security, especially in the light of digital transformation programmes and the technologies they are introducing to enterprise IT. While still observing the basics such as network segmentation, next generation cyber security has to take cognisance of and adapt to cloud computing services, devices making up the internet of things (IoT), the use of artificial intelligence (AI) in security, and the advent of software-defined networking (SDN), passive optical LAN (POL), network fabric architectures and hyper-segmentation. Network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats, and should now be seen as one of several key elements of a modern cyber security strategy.

Find more content like what you just read:

  • Best practices for addressing voice network vulnerabilities

    As communications technology has advanced and brought on subsequent security issues, it has become clear that firewalls alone are not enough to provide a secure network. Instead, enterprises need a complete, seamless approach to network security to preempt issues and protect their organizations. Access this white paper to learn more.

    Download

  • Network Security: Spotlight on Australia/New Zealand

    In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.

    Download

  • In 2017, the insider threat epidemic begins

    Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.

    Download

  • Royal Holloway: Purple team playbook – threat modeling for security testing

    The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams

    Download

  • How Can Healthcare Protect Against Zero-Day Attacks and What Does It Mean?

    Zero-day attacks pose significant dangers to the healthcare sector, but defenders can mitigate risk by patching early and often.

    Download

  • Secure your organization with the world’s largest threat intelligence collection

    At no point in human history have organizations spent as much money on cybersecurity as they currently are. CleanINTERNET DNS is designed to bring enterprises cost-effective cybersecurity, by incorporating the world’s largest threat intelligence collection to provide you with comprehensive vision of threats. Read the blog to learn more.

    Download

  • Findings from MITRE Engenuity Enterprise ATT&CK Evaluations

    The MITRE Engenuity Enterprise ATT&CK Evaluations test the threat detection, visibility and protection capabilities of security tools like Cortex XDR. So, how does Cortex XDR, by Palo Alto Networks, stack up against other tools? Find out in this infographic.

    Download

  • How Cisco helped centralize and streamline Qdoba's security

    Qdoba Mexican Eats is connected and protected by Cisco Secure. Hear Gary Burgess, Director of Infrastructure and Security at Qdoba, discuss how a SASE solution that combines Cisco Umbrella cloud-delivered security and Meraki’s cloud-managed networking keeps connectivity reliable and secure.

    Download

  • Key principles of AI-powered network security

    As networks expand, network security must evolve. One way that you can transform your security is by adopting AI-powered capabilities that can defend against evasive threats, unify security management, and more. In this white paper, learn all about that approach and deepen your understanding of today's top network-security obstacles.

    Download

  • 12 essential features of advanced endpoint security tools

    Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing security policies. IT administrators can use endpoint security for a number of operation monitoring functions and data backup strategies. Here are 12 key features endpoint security products should include.

    Download

  • CW APAC: Buyer’s guide to SASE

    Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.

    Download

  • A Computer Weekly buyer's guide to perimeterless network security

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

    Download

  • Palo Alto Networks 2nd Special Edition

    Most network and network security products on the market today weren’t designed to handle today’s security concerns. To address these challenges, Gartner came up with secure access service edge (SASE). Read this e-boo for an in-depth look at SASE and learn how you can secure your organization against today’s threats.

    Download

  • Towards more robust internetworks

    This article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks.

    Download

  • Considering key networking trends

    As your distributed network grows, you have to keep in mind that your attack surface does too. So, how can you ensure that your network is protected from increasing and complex cyberattacks? Staying up to date on the latest networking trends can help. Explore this E-Guide to access 5 key networking trends for 2023.

    Download

  • Threat management: Essential guide

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

    Download

  • NGFW features: Cisco vs. SonicWall vs. other vendors

    From network access control lists (ACLs) to unified threat management (UTM), from the 1990s to the 2020s, firewalls have evolved. Along with charting that evolution, this buyer’s guide digs into what constitutes a modern, next-generation firewall (NGFW) today. Read on to unlock those insights and much more.

    Download

  • 12 API security best practices

    As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.

    Download

  • 2024 vulnerabilities: Security bulletin

    Rather than going on the attack themselves, threat actors often take advantage of known network vulnerabilities and pick up the scraps. CleanINTERNET from Centripetal Networks offers dynamic threat intelligence-based protection against

    Download

  • Hybrid workforce cybersecurity unified by SASE approach

    Remote work broadens the network edge, making it more challenging to secure users, devices and apps. To discover how SASE's fusion of networking and security can boost visibility and the user experiences of your dispersed workforce, tap into this white paper.

    Download

  • The evolving role of network security in a cloud-centric world

    As enterprises' IT environments evolve, so must network security. This in-depth research report by TechTarget's Enterprise Strategy Group explores the priorities and collaboration needed to secure complex IT environments, as well as the obstacles to achieving that goal. Read on to unlock 26 pages of analyst insights.

    Download

  • Running Cisco Firepower Virtual Firewall on EndaceProbe

    Your network, like every network, is in danger of being attacked by the many emerging and complex threats in the cyber landscape. So, how can you augment your defense measures? View this video to learn about one avenue toward enhanced network security: running Cisco Firepower Virtual Firewall on EndaceProbe.

    Download

  • CW APAC: Expert advice on zero-trust security

    Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

    Download

  • Making Threat Intelligence Actionable with SOAR

    SOAR is gaining traction as a way to improve security operations. Security and risk management leaders should evaluate how these tools can support and optimize their broader security operations capabilities. Read this Gartner Marketing Guide to learn more about sifting through the noise and choosing the best-fit SOAR tool for your needs.

    Download

  • Network security evolution: Insights for cloud-centric era

    As organizations move to the cloud, network security must evolve. This research report by Enterprise Strategy Group explores the challenges of securing hybrid cloud environments, the use of AI in network security, and how to consolidate firewall vendors. Download the report to learn more.

    Download

  • Software-defined networking: Spotlight on ASEAN

    In this e-guide, read about the state of adoption of Software-defined networking (SDN) in the ASEAN, how the technology can be used to secure critical systems and what you can do to get started.

    Download

  • 9 essential elements of network security

    Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.

    Download

  • Leader’s guide to network management for educational IT

    In this 16-page e-book, unlock recommendations for IT management in educational institutions.

    Download

  • Modern firewall platforms: Enterprise Strategy Group report

    Using more cloud applications, providing network access to more IoT devices: These are two of the many factors that complicate network security for modern organizations. So, how can your business address those complexities and secure your network? Find out in this research report by Enterprise Strategy Group (ESG).

    Download

  • Simplify architecture and security with an AI-powered network

    Streamline network architecture and security with an AI-powered approach. Learn how to improve performance, automate security, and maximize existing IT investments. Download this white paper to discover the benefits of a simplified, security-first network.

    Download

  • 5 components of a future-ready enterprise network

    As customer experience (CX) and employee experience (EX) expectations evolve, can your enterprise network keep up? To help you confidently answer yes, this white paper breaks down 5 components of a future-ready network. Keep reading to access the full insights.

    Download

  • Royal Holloway: Security evaluation of network traffic mirroring in public cloud

    This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.

    Download

  • Cyber Security 2016 and beyond

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

    Download

  • Assessing your network-security posture: 6 considerations

    With advanced threats crowding the cyber landscape, how can you secure your dispersed workforce? This research report by Palo Alto Networks’ Unit 42 unpacks 6 components of a strong network-security posture. Keep reading to discover those insights – and much more.

    Download

  • Today's attacks target people, not just technology

    Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.

    Download

  • Access Management Buyer's Guide

    The modern workforce is rapidly becoming more mobile and hyperconnected, and attackers are taking note. But with attackers constantly innovating and finding new ways to bypass weaker multifactor authentication (MFA) implementations, how can you authorize users and devices without putting the network at risk?

    Download

  • Strengthen Your Incident Response with Endace and Cisco

    When a threat enters your network, you need to investigate it quickly. Endace and Cisco have teamed up to help you do so. Read this overview to learn how you can enhance your incident response by integrating EndaceProbe’s network packet history with Cisco Stealthwatch.

    Download

  • How complacency kills mobile security

    In this expert guide, learn how a lackadaisical attitude towards mobile security can prove to be catastrophic to enterprises as mobile threats continue to exploit known vulnerabilities to gut profits.

    Download

  • 7 characteristics of next-generation networking

    The term next-generation networking refers to the process of designing network infrastructure with new, advanced technologies. Next-generation networks are flexible, nimble and secure architectures that are easier to manage. In this article, analysts offer their perspectives on which technologies help modernize network infrastructures.

    Download

  • Why 88% of organizations are struggling with public cloud infrastructure

    Discover in this ESG showcase how Google's Cloud NGFW Enterprise, powered by Palo Alto Networks, combines best-in-class cloud engineering with industry-leading security to help your organization efficiently and effectively apply network security policies at scale.

    Download

  • A Computer Weekly Buyer's Guide to Digital Transformation

    The future of organisations depends on their handling of digital transformation. In this14-page buyer's guide, Computer Weekly looks at how the IT operation can lead strategy, whether network security is keeping up and what can be learned from GE's digital journey.

    Download

  • Enhancing network edge security: 12-page e-book

    Yes, security threats are expanding – and so is the network edge. So, how can you ensure your organization’s users at the edge are as secure as possible? Tap into this e-book by Cradlepoint for guidance.

    Download

  • Infographic: SIEM vs. SOAR vs. XDR

    IT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.

    Download

  • Bolster signature-based malware detection with machine learning

    Discover how to enhance malicious code and behavior detection by combining signature-based detection with machine learning. Hear from experts Michael Cobb and Karen Scarfone about how to improve malware threat detection and 10 questions to ask endpoint security vendors.

    Download

  • Emerging trends in retail IT

    Innovation is changing retail from the storefront to the back office and beyond. Because of this transformation, IT teams and the enterprise networks they manage have never been more important. In this white paper, explore emerging trends in retail IT and considerations for choosing futureproof edge network solutions for retail.

    Download

  • A Computer Weekly e-guide to SASE

    Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.

    Download

  • The EVIL-ution of ransomware: What to know

    Ransomware attacks are not going away any time soon. Having your organization believing and trusting in your security protocols is important, especially when it comes to securing your network. Watch this video to learn more about the evolution of ransomware and what you can do to protect yourself today.

    Download