Noviembre 2018
 << < > >>


¿Quién está en línea?

Miembro: 0
Visitante: 1

rss Sindicación



Watchguard Introduces New Network Security Visibility Solution

Cisco to buy Sourcefire, more network security deals seen

WatchGuard Dimension will come standard with the company's flagship Unified Threat Management (UTM) platform and provides a suite of visibility and reporting tools that instantly isolates and distills actionable security issues and trends, speeding network professionals' ability to set meaningful security policies. "Around the world, network security pros tell us they are Cisco routers UK drowning in logs of data and find it time consuming - or nearly impossible - to identify key issues on their networks and make proper policy decisions," said Dave R. Taylor, vice president of corporate and product strategy at WatchGuard Technologies. "In a recent report from the SANS Institute, only 10 percent of respondents felt confident in their organizations ability to analyze large data sets for security trends, even though 77 percent are collecting logs and monitoring data from systems and security devices. WatchGuard Dimension solves this challenge by instantly turning raw network data into actionable security intelligence in the big data visualization style today's users have come to expect." WatchGuard Dimension offers users a menu of visibility and reporting options to present the information in the way they find most intuitive: Executive Dashboard; Summary Reporting; Hierarchical TreeMap; and Global ThreatMap. WatchGuard Dimension is now available with WatchGuard's 11.8 launch of its XTM security platform. Other major highlights include the addition of WatchGuard Data Loss Prevention to the platform, an updated Web User Interface compatible with mobile devices, and tremendous new flexibility in the configuration of VPNs in today's more complex network environments. Republication or redistribution, including by framing or similar means, is expressly prohibited without prior written consent. Datamonitor shall not be liable for errors or delays in the content, or for any actions taken in reliance thereon
For the original version including any supplementary images or video, visit

Image Caption

Sourcefire shares rose 27.8 percent to $75.51 in afternoon trading while Cisco stock was down 0.3 percent at $25.64. Analysts said the valuation may be high but the deal made sense for Cisco, which has lost market share in network security to small, innovative rivals such as Juniper Networks Inc, Check Point Software Technologies, and Palo Alto Networks Inc. Cisco wants to be the top player in security and shed its reputation of lagging in that area, company security head Chris Young told analysts on a conference call. "We will not rest until we are the number one security partner for our customers, hands down," Young said. More acquisitions should be on the way in the tech security sector, which Research firm IDC has said spending this year should generate 7.8 percent revenue growth for vendors. "We view this morning's news as 'game changing' for the cyber security space as we expect a surge of consolidation to take place over the next 12 to 18 months," Daniel Ives, a tech analyst with FBR Capital Markets, said in a research note. He added that larger technology players such as IBM, Juniper, Symantec, and EMC could look to acquire smaller security players to help drive growth given the high priority security has in IT spending. Brian White, an analyst at Topeka Capital Markets, said Dell and Hewlett Packard could also be seeking to expand their security offerings, and the Sourcefire acquisition could be the beginning of more transactions. Potential targets are smaller, more nimble companies that provide up-to-date network security to combat advanced hacking attacks. Security protection needs have grown more complex with the proliferation of web applications, social media and video streaming. Palo Alto Networks, Fortinet as well as privately held FireEye and Barracuda Networks are considered top picks.
For the original version including any supplementary images or video, visit

The Mobile Device & Network Security Bible: 2013 - 2020

The market is further expected to grow at a CAGR of nearly 21% over the next 7 years Enterprises and mobile network operators have made significant investments in integrated security appliances and content security gateways (including those specific to SMS/MMS security) The installation of Anti-Malware/Anti-Virus client software is fast becoming a de-facto requirement for most smartphones and tablets More than half of all enterprises allow the use of employed owned mobile devices on their networks. Enterprises thus continue to aggressively adopt SSL VPNs in their mobile security strategies to ensure connection security in addition to activity monitoring and control Mobile Device Management (MDM) services providers are eyeing on opportunities for cloud based mobile security services that extend existing security policies to enterprise mobile devices to help secure data, reduce risk and protect the enterprise, which has created a new submarket for mobile Security as a Service (SEaaS) Key Questions Answered: The report provides answers to the following key questions: How big is the mobile device and network security market, and what particular submarkets does it constitute? Who are the key players in each submarket? How is the value chain structured for each submarket and how will it evolve overtime? Which regions and countries will witness the highest percentage of growth in mobile security spending? Will recent privacy scandals have a negative impact on mobile security spending in the coming years? What known malware families are most dangerous for modern smartphones? Table of Contents 1 Chapter 1: Introduction 19 1,1 Executive Summary 19 1,3 Historical Revenue & Forecast Segmentation 22 1,4 Key Questions Answered 24 1,5 Key Findings 25 1,8 Companies & Organizations Mentioned 28 2 Chapter 2: An Overview of the Mobile Device & Network Security Market 40 2,1 The Importance of Mobile Devices & Networks 40 2.1.1 Mobile Devices Outnumber PCs & Notebooks 40 2.1.2 Supporting a Plethora of Applications & Hardware Peripherals 42 2.1.3 Vulnerability to Attacks: Opening the Market for Mobile Security 42 2,2 What Constitutes the Mobile Device & Network Security Market?
For the original version including any supplementary images or video, visit

The Practice of Network Security Monitoring, review: A hands-on guidebook


That experience convinced Bejtlich that prevention eventually fails. That doesn't mean admitting defeat though: if you can't stop all attackers getting in, then concentrate on frustrating them, using the time bought by your defences to detect them and eject them from your network. In one case study, Bejtlich describes how an attacker who eventually stole the entire payments database from the South Carolina Department of Revenue spent four weeks exploring the network before copying any files. If monitoring had detected the hacker during that month, no identity information would have been lost. For the general reader, the explanations of how network security monitoring differs from seeking vulnerabilities in your system and software, or from filtering and blocking confidential information, is a good introduction. The discussion of the impact of privacy laws on monitoring your business network is also very useful.
For the original version including any supplementary images or video, visit

Admin · 93 vistas · Escribir un comentario

Vínculo permanente hacia el artículo completo


Este artículo no tiene Comentario por el momento .....

Escribir un comentario

Estatuto de los nuevos comentarios: Publicado

Se mostrará tu URL

Por favor introduce el código contenido en las imágenes.

Texto del comentario

   (Salvar el nombre, el mail y la URL en los cookies)