Internet and application security News
March 01, 2016
SD-WAN means you're not just limited to an MPLS connection at every site anymore. The flexibility and cost savings of combining MPLS with Internet is great, but is it secure?
February 03, 2016
Faced with little time and strict security needs, U.S. Army network engineers came up with an inventive way to use a network tunnel to improve communications amid the Ebola crisis.
June 08, 2015
At Cisco Live, Cisco introduces product enhancements that fit within its overall ACI security strategy.
July 17, 2012
Blue Coat announces mobile application security for BYOD environments, giving IT a better view, and more control, of apps on personal devices.
Internet and application security Get Started
Bring yourself up to speed with our introductory content
Monitoring VPN traffic is a critical task. Expert Kevin Beaver explains what to look for in a VPN traffic monitoring tool and offers a few free and open source options for enterprises to consider. Continue Reading
View this VPN UTM vendor comparison and understand how to manage your virtual private network infrastructure as part of a unified threat management solution. Continue Reading
Access Gateway is a secure application access solution that provides administrators application-level control allowing users application access from anywhere. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Internet and application security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
For all the gripes enterprises have about MPLS, one point of contention remains: Branches directly connected to the Internet don't feel safe. Is that still true in the age of SD-WAN? Continue Reading
In part two of a three-part series, an expert looks at how hybrid VPNs are impacted by the shift from private services to the public Internet. Continue Reading
What network monitoring tools give enterprise WANs the visibility they need into their corporate VPNs? Find out in this expert answer. Continue Reading
Manage Internet and application security
Learn to apply best practices and optimize your operations.
Expert lists strong encryption settings and security policies, among others, as ways to use security and design to strengthen VPNs. Continue Reading
Despite cloud services and user-owned devices, the WAN remains a critical piece of IT infrastructure, and the VPN a network hero. Continue Reading
In this Ask the Expert response, VPN expert Rainer Enders discusses how he thinks SSL VPNs will evolve in order to address security concerns. Continue Reading
Problem Solve Internet and application security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Consider appliance, cloud and hybrid approaches when you're deciding how to secure your Internet-connected branch office. Continue Reading
Understand the concept of first-hop security and the challenge of trying to apply the techniques currently enforced in IPv4 networks to emerging IPv6 deployments. Continue Reading
In this Ask the Expert response, VPN expert Rainer Enders discusses how to determine whether SSL VPNs are a secure enough option for your enterprise. Continue Reading