Cisco adds AMP to SD-WAN for ISR/ASR routers

Network World

Cisco has added support for Advanced Malware Protection (AMP) to its million-plus ISR/ASR edge routers, in an effort to reinforce branch and core network malware protection at across the SD-WAN. Cisco last year added its Viptela SD-WAN technology to the IOS XE version 16.9.1 More about SD-WAN. How to buy SD-WAN technology: Key questions to consider when selecting a supplier. What are the options for security SD-WAN?

WAN 112

IDG Contributor Network: When SD-WAN is more than SD-WAN

Network World

As the SD-WAN market has matured, one thing has become very clear: SD-WAN will not exist on its own. The technology is merging with other networking technologies, ultimately becoming a feature of a much larger bundle. Predominantly, we’re seeing security and SD-WANs merge. Just consider some of the activity: Velocloud recently announced its SD-WAN Security Technology Partner Program to integrate with other security vendor’s products.

WAN 77

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Enterprise IT in 2014 – Under-the-Radar Challenges with WAN Bandwidth, BYOD, and XP Security


Limited WAN Bandwidth. In a 2014 Next-Generation WAN Survey , 68 percent of respondents said demand for WAN bandwidth will increase over the next year. As the number of connected devices grows—from smartphones to tablets, and more—this strain on WAN bandwidth is inevitable. However, only 15 percent of those surveyed said they were planning to expand WAN capacity.

WAN 232

Read This If You Do Business in China

SecureWorld News

But the bank left out a critical detail about the software: it included malware.". Now, the Federal Bureau of Investigations (FBI) is jumping on the concerns surrounding this Chinese malware whack-a-mole. Featured Original Content Malware China

How to protect your business when you’re working on the cloud


If you’re throwing the doors to your cloud storage open to your workforce then you need to be sure that the devices they’re using to access it are suitably safe – i.e. free from the kind of malware that can exploit channels of data access. Every device that accesses your network and cloud storage should have at least the same level of security as the devices that live in your office; mobile phones and tablets very much included.