Posts tagged with Network Security

Industry Commentary · IT policy

Government Network Security Failures Led to Remote Access Breaches

As technology advances, the number of cyber-attacks on both public and private networks also increases. According to the Washington Post, in 2013 alone, more than 3,000 enterprises were notified of...

Endpoint Management · Mobile · VPN

New Ways to Secure Mobile Devices for BYOD

The discussion on BYOD centers on whether employees working more efficiently on their personal devices is worth whatever network security vulnerabilities are sown when enterprises allow numerous...

Endpoint Management · IT policy · Mobile

Will Network Security Concerns Sink Government BYOD?

The Department of Homeland Security (DHS) issued a warning last week that the computer network of a public utility company had been compromised by a "sophisticated threat actor," likely through a...

Industry Commentary · Mobile · VPN

BYOD and Its Risks to Network Security

In the not-so-distant past, when enterprises lacked ubiquitous high-speed Internet connections and the means to provide employees with remote access, organizations were far more likely to enforce...

Industry Commentary · IT policy · Mobile · VPN

The Workplace of the Future and What It Means for Network Security

The convergent trends of BYOD, the consumerization of IT and mobility are causing rapid shifts in employees’ expectations for their work environment. Employees are driving the change by working...

Industry Commentary · IT policy · Mobile · VPN

Network Security: IT Professionals’ Top Priority for 2014

Chances are if you’re reading this blog, you understand how vital it is for enterprises today to secure remote access to their corporate networks. It looks like that understanding is becoming more...

Industry Commentary · IT policy · Rethink Remote Access · Shows · VPN

Mobile Endpoint Security Limitations a Hot Topic at Interop Las Vegas 2013

*Editor’s note: This blog originally appeared as a guest post on the Interop Blog

2 Factor Authentication · Industry Commentary · IPsec

Why Two-Factor Authentication Matters

By Patrick Oliver Graf, General Manager, NCP engineering

Readers' Poll

Readers' Poll: What Solutions Should Lead the Charge for Enhanced Network Security in 2013?

2012 has been quite the year for the mobile security industry. We've seen bring your own device (BYOD) come to the forefront of discussions, both in terms of its benefits and threats to network...

Readers' Poll

Readers' Poll: What Solutions Should Lead the Charge for Enhanced Network Security in 2013?

2012 has been quite the year for the mobile security industry. We've seen bring your own device (BYOD) come to the forefront of discussions, both in terms of its benefits and threats to network...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK