TAP Into Technology Blog: IT Security (32)
The Visibility Test: How to Give Security Devices a 360 View of Network Traffic
Complete network visibility is no longer a "nice to have" technology feature for security appliances such as firewalls, intrusion detection systems or forensic analyzers – it’s a “must have” requirement. Any security engineer that doesn’t...
Security Connectivity Report: Optimizing Network Design for Forensic Analysis
Malicious attacks can take an average of 256 days to identify while data breaches caused by human error take an average of 158 days to identify.
Your Solution for PCI Data Compliance
Compliance is hard enough to obtain – much less maintain day in and day out. Payment Card Industry, or PCI, compliance is no laughing matter. It involves personal data, including credit, finance and demographic information.
Your 10/40/100G Network Is More Susceptible To Data Breaches
Since when did greater network capacity mean greater risk of data breaches?
Security Connectivity Report: Optimizing Network Design for Next‐gen Firewalls
The next‐generation firewall is poised to take over the mantle of protection from the last generation of security appliances and firewalls. ‐‐ Frank Ohlhorst, TechRepublic So you’ve been tasked with implementing your company’s next‐gen...
SPAN Ports Have Always Been A Disaster To Your Network Security
Remember that time when SPAN ports ensured your network visibility and, thus, its security and the security of your data? Oh wait, that time was never. The SPAN port has never been a viable means to capture your data. But, in 2015, the...