Software-defined perimeter: What it is and how it works

A growing number of organizations are drawing an invisible line around their internet-connected resources in an effort to keep attackers at bay. Called software-defined perimeter (SDP), it is based on the relatively simple idea of throwing a virtual barrier around servers, routers, printers, and other enterprise network components.The goal of SDP is to protect networks behind a flexible, software-based perimeter. “Advantages include stronger security and greater flexibility and consistency,” says Ron Howell, principal SD-WAN and SASE architect at IT and business consulting firm Capgemini Americas.To read this article in full, please click here READ MORE HERE…

Read more

Cisco expands its SD-WAN software for wider reach, better security

Cisco has broadened the scope of Cisco SD-WAN software by growing its reach and security, and expanding its support for deploying multi-region WAN fabric.The idea behind the new features is to help manage the complexity and security of connecting to cloud resources from the edge of the network, said JP Shukla, director, product management, in Cisco’s Enterprise Cloud & SD-WAN group. “They want to connect these users as reliably and securely as these users would be in an office environment,” he said.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here READ MORE HERE…

Read more

Palo Alto Networks bulks-up its SASE portfolio

Palo Alto Networks is reinforcing the security and operational features of its Prisma secure-access service edge (SASE) package.New features include the ability to adjust security settings for multiple software-as-a-service-based apps, new security capabilities, and AIOPs support. In addition the company is expanding its family of Ion SD-WAN security devices to provide additional configuration options.

[ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here READ MORE HERE…

Read more

How to set up DHCP failover on Windows Server

Redundancy is essential for dealing with both planned and unplanned outages, and that includes having redundant dynamic host-configuration protocol (DHCP) servers to allow uninterrupted dynamic assignment of IP addresses.For those working in Windows environments, there are currently two options for setting up redundant DHCP servers: a failover scenario with a main server paired with another in hot standby; and a load-balancing scenario in which two DHCP servers actively handle client requests.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here READ MORE HERE…

Read more

Government-imposed internet shutdowns impacted 1.9 billion people in first half of 2022

Internet shutdowns by governments across the world impacted 1.89 billion citizens globally in the first half of 2022, a 22% increase when compared with the second half of 2021.A recent report compiled by VPN service provider Surfshark found there were 66 state-mandated internet blackouts imposed across six countries and territories during the period: Burkina Faso, India, Jammu and Kashmir, Kazakhstan, Pakistan, and Sudan. Local shutdowns were observed in India, Jammu and Kashmir region, and Pakistan, while Burkina Faso, Kazakhstan, and Sudan chose to cut down internet connections nationwide.While there was an overall decrease in the number of internet shutdowns during the period—72 cases in the first half of 2022 compared with 84 reported in the second half of 2021—the number of people impacted was much higher, as reliance on the internet has increased globally.To read this article in full, please click here READ MORE HERE…

Read more

Network security depends on two foundations you probably don’t have

You’ve done everything to secure your network, and you still face threats. That’s what most enterprises say about their network security, and they’re half right. Yes, they still face threats, but they’ve not done everything to address them. In fact, most enterprises haven’t really implemented the two foundations on which real network security must be based.When I ask enterprises whether they’ve done a top-down analysis of network security, they usually say they do it every year. When I ask what’s involved in that assessment, they say they look for indications that their current strategies have failed. They build another layer, which is kind of like putting a second Band-Aid on a cut.To read this article in full, please click here READ MORE HERE…

Read more

IBM bolsters quantum cryptography for z16 mainframe

While the need for it may be years away, IBM has added additional mainframe protection against future quantum-based security attacks.When Big Blue rolled out the newest iteration of its mainframe – the z16—in April, one of its core design pillars was a promise to protect organizations from anticipated quantum-based security threats. Specifically, the z16 supports the Crypto Express8S adapter to deliver quantum-safe APIs that will let enterprises start developing quantum-safe cryptography along with classical cryptography and to modernize existing applications and build new applications, IBM stated.To read this article in full, please click here READ MORE HERE…

Read more