WAN Security Channel
News and Analysis
Bipartisan report argues that businesses should be allowed to retrieve stolen intellectual property from attackers' networks.
More News and Analysis
- BitTorrent Adds File Sync Service to P2P Network
- Huawei Quits U.S. Market
- Data Center Security Spending Rises
- Attackers Hold Upper Hand Despite Increased Security Spending
Texas Tech University Health Sciences Center turns to a new network architecture and dark fiber to support the academic and healthcare needs of dozens of regional campuses and clinics.
Reviews & Workshops
Smartphones and tablets equipped with fingerprint readers or other biometric hardware have the potential to drive greater adoption of biometric authentication in the enterprise—if we can get the hardware, software and business processes right.
More Reviews & Workshops
- Web Security Services Put to the Test
- Wave Embassy Trusted Drive Manager Simplifies Encrypted Drive Management
- When To Encrypt At Layer 2 Or Layer 3
February 06, 2013 05:38 PM
Posted by Andrew Conry Murray
Network Computing readers weighed in on F5’s entry into the firewall market and how its strategy of integrating firewall software into its load-balancing platform might play out with customers and competitors.
See all blogs by Andrew Conry Murray
February 27, 2012 04:40 PM
Posted by Lee H. Badman
If the phone isn't ringing, then your wireless users must not be feeling any pain, right? That can be a dangerous assumption in large, complicated wireless networks. Some issues may not be crystallized enough to raise your clients' ire, but the fact remains that performance is degraded. AirMagnet's latest Enterprise version wants to make hard-to-find problems more obvious even as the WLAN gets ever more complex.
See all blogs by Lee H. Badman
February 10, 2012 09:00 AM
Posted by Howard Marks
When Riverbed and others brought WAN acceleration to the market around the turn of the century, many of us hoped that with WAN acceleration we could pull the servers, and the headaches they cause, from branch offices. Unfortunately, many organizations found reasons to keep servers in the branches. Riverbed's new Granite appliance allows organizations to keep servers in their branch offices while eliminating many of the headaches through what Riverbed's calling Edge Virtual Server Infrastructure.
See all blogs by Howard Marks
November 14, 2011 07:00 AM
Posted by David Hill
Security statistics are depressing. The bad guys seem to be overwhelming the good guys, even when the good guys are well-known security vendors. So when an emerging company, such as Red Lambda, claims to have software that significantly improves the odds for the good guys, you need to pay close attention.
See all blogs by David Hill
September 09, 2011 01:48 PM
Posted by Mike Fratto
There has already been a lot written about the compromise at DigiNotar, GlobalSign and Comodo. One day we will look at the summer of 2011 as the time when the PKI collapsed. That's not hyperbole. The problems with certificate authorities and the inherent weakness they present have been known for years--a fact we alluded to as far back as 1997. Browsers accept certificates as trusted in that they have the signing CA certificate in their local browser store. Browsers do not check that a particular CA is authorized to actually issue a particular server certificate. The trust is universal. That is why the attacks on DigiNotar, GlobalSign and Comodo are so serious and have global impact.
See all blogs by Mike Fratto
September 07, 2011 07:00 AM
Posted by Jim Rapoza
What with hurricanes, earthquakes and Kardashian weddings dominating recent media coverage, you may have missed the news about a recent security breach that clearly displayed a serious weakness in one of the core security mechanisms of the Internet.
See all blogs by Jim Rapoza
Best of the Web
VXLAN is an Experimental IETF draft of protocols to enable the creation of a large overlay, multi-tenant network.
: OpenFlow is poised to reach over-hyped status, yet there are practical, useful reasons for keeping an eye on Openflow. The biggest cloud players are involved and driving the feature creation.
Get a primer on the Openflow protocol and what it can do for networking.