article thumbnail

Enterprises opt for different microsegmentation architectures

Network World

We asked three enterprises to share why they deployed microsegmentation technology in their networks and how it's working. Distributed firewalls via VMware NSX. Here are their stories. Todd Pugh, CIO at food products manufacturer SugarCreek , manages a fully virtualized private data center.

article thumbnail

Top Five Risks of Perimeter Firewalls and the One Way to Overcome Them All

Tech Republic Security

Firewalls have been an integral part of the enterprise network architecture. But with the shift to digital business models the once-sturdy firewall has gone from a security staple to a security risk. Read more to learn the five major risks brought on by legacy firewalls in a world of cloud and mobile.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

4 ways CISOs can manage AI use in the enterprise

CIO Business Intelligence

Over the summer, I wrote a column about how CIOs are worried about the informal rise of generative AI in the enterprise. Since then, many CIOs I’ve spoken with have grappled with enterprise data security and privacy issues around AI usage in their companies. That column may have been the understatement of the year.

article thumbnail

The role of next-gen firewalls in an evolving security architecture

Network World

As the commercial enterprise firewall approaches its 30th birthday, it is hard to overstate how dramatically the product has evolved. This 2,700-word research report looks the current state of next-generation firewall technology.

article thumbnail

It’s Time To Stop Paying For Commoditized Endpoint Security Features

Forrester IT

Today’s enterprise security buyers evaluating a new endpoint security suite often begin with a security RFP layered thick with many existing endpoint security features and capabilities, including antimalware, host firewall, anti-exploit, and application control.

Security 251
article thumbnail

Nvidia jumps into Zero Trust

Network World

Zero Trust is an architecture that verifies every user and device that tries to access the network and enforces strict access control and identity management that limits authorized users to accessing only those resources they need to do their jobs. [Get Get regularly scheduled insights by signing up for Network World newsletters.].

Firewall 153
article thumbnail

Radically simplify and expand Zero Trust to cloud workload

CIO Business Intelligence

Many organizations rely on legacy security architectures to secure their cloud workloads. They often use a combination of: Cloud native security solutions offered by cloud service providers Multiple security tools (firewall, VPN, TLS/SSL inspection, DLP, etc.)

Cloud 98