Remove Cloud Remove Firewall Remove Network Remove Symantec
article thumbnail

Cathay Pacific to take cloud journey to new heights

CIO Business Intelligence

Even as its cloud journey reaches cruising altitude, Cathay Pacific Group IT is not slowing down. Instead, the publicly held operator of Cathay Pacific Airlines and HK Express is shifting from migration to optimization mode in an effort to wrest additional benefits from its all-in cloud transformation.

Cloud 119
article thumbnail

Fountainhead: What Is Meant by a "Cloud-Ready" Application?

Fountainhead

Insights into Data Center Infrastructure, Virtualization, and Cloud Computing. What Is Meant by a "Cloud-Ready" Application? Is calling an app "cloud-ready" just a form of cloud-washing? Cmon - arent all apps "ready for the cloud" (and for that matter, ANY cloud)? cloud these days. Thus, most cloud.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Browser Isolation: The Missing Piece in Your Security Puzzle

SecureWorld News

However, conventional solutions such as antivirus, firewalls, and other detection and blocking tools can only offer a limited level of security. Here, filtering, threat analysis, and sandboxing are performed on a public or private cloud server. Provides more security: Remote browser isolation in the cloud is very reliable.

article thumbnail

Are next-generation firewalls legacy technology?

Network World

A few years ago, next-generation firewalls (NGFWs) came out of nowhere to become a network security staple. These devices combined traditional L3/L4 packet filtering with deep packet inspection, IPS, and other network security services along with knowledge about users and applications. This model is changing rapidly, however.

article thumbnail

The Importance of Connecting with Our Customers

CIO Business Intelligence

By Rob Greer, Vice President and General Manager, Symantec Enterprise Division. As the GM of Symantec , I had the good fortune of being able to attend both the Gartner Security & Risk Management Summit and the 2022 RSA Conference the week of June 6. Forget the conventional thinking about network security.

article thumbnail

The Hacker Mind: Follow The Rabbit

ForAllSecure

So I started intercepting all the traffic on your network. Elliot Alderson: You are using Tor networking to keep the server's anonymous. Fast, GB wifi leads Elliot to discover a TOR network which leads him to the onion routing protocol. Vamosi: Cloud is a hard concept to drive across a podcast with no visuals.