Networking

Networkworld

Cisco sets $2.3B deal for unified access, multi-factor authentication security firm Duo

Cisco said today it had closed the $2.35 billion deal it made for network identity, authentication security company Duo.According to Cisco, Duo’s zero trust security model authorizes secure connections to all applications based on the trustworthiness of users and devices. Duo’s cloud-delivered technology lets IT professionals set and enforce risk-based, adaptive access policies and get enhanced visibility into users’ devices and activities.  As more devices come onto the network remotely this issue takes on more importance.“Outdated devices are particularly vulnerable to being compromised, which can easily spiral into a full-blown, major breach,” wrote Richard Archdeacon, Duo Advisory CISO about a recent Duo study on remote access security.   “Organizations don’t necessarily need to block individuals from using their personal devices, but they do need to re-shape their security models to fit these evolving working practices…If you don’t know what’s connecting to the network, how can you protect data from being compromised? “To read this article in full, please click here READ MORE HERE…

Read More
Networkworld

IDG Contributor Network: Security serves as an essential component to growing an enterprise with SD-WAN

As enterprises endeavor to expand domestic and global footprints, agile network infrastructure connectivity across geographies continues to prove an ongoing challenge. In particular, ensuring that data shared over these networks is protected from unauthorized access is a primary directive in today’s evolving cyber threat landscape. These often-contradictory demands call for IT decision makers to invest in innovation that will facilitate network flexibility and agility without compromising security, productivity or performance.This challenge begs a simple question. How can a WAN deliver the flexibility and agility necessary to help an organization grow without increasing exposure to data breaches and other security problems? After all, if the cost of convenience is increased network vulnerabilities, can it be considered a sound approach?To read this article in full, please click here READ MORE HERE…

Read More
Networkworld

What is Nmap? Why you need this network mapper

Network administrators, IT managers and security professionals face a never-ending battle, constantly checking on what exactly is running on their networks and the vulnerabilities that lurk within. While there is a wealth of monitoring utilities available for network mapping and security auditing, nothing beats Nmap’s combination of versatility and usability, making it the widely acknowledged de facto standard.What is Nmap?
Nmap, short for Network Mapper, is a free, open-source tool for vulnerability scanning and network discovery. Network administrators use Nmap to identify what devices are running on their systems, discovering hosts that are available and the services they offer, finding open ports and detecting security risks.To read this article in full, please click here READ MORE HERE…

Read More
Networkworld

How to protect your infrastructure from DNS cache poisoning

Domain Name System (DNS) is our root of trust and is one of the most critical components of the internet. It is a mission-critical service because if it goes down, a business’s web presence goes down.DNS is a virtual database of names and numbers. It serves as the backbone for other services critical to organizations. This includes email, internet site access, voice over internet protocol (VoIP), and the management of files.You hope that when you type a domain name that you are really going where you are supposed to go. DNS vulnerabilities do not get much attention until an actual attack occurs and makes the news. For example, in April 2018, public DNS servers that managed the domain for Myetherwallet were hijacked and customers were redirected to a phishing site. Many users reported losing funds out of their account, and this brought a lot of public attention to DNS vulnerabilities.To read this article in full, please click here READ MORE HERE…

Read More
Networkworld

The rise of next-generation network packet brokers

Network packet brokers (NPB) have played a key role in helping organizations manage their management and security tools. The tool space has exploded, and there is literally a tool for almost everything. Cybersecurity, probes, network performance management, forensics, application performance, and other tools have become highly specialized, causing companies to experience something called “tool sprawl” where connecting a large number of tools into the infrastructure creates a big complex mesh of connections.Ideally, every tool would receive information from every network device, enabling it to have a complete view of what’s happening, who is accessing what, where they are coming in from, and when events occurred.To read this article in full, please click here READ MORE HERE…

Read More
Networkworld

Cisco pays cool $2.3 billion for hot security company Duo

Cisco today laid out $2.35 billion in cash and stock for network identity, authentication security company Duo.According to Cisco, Duo helps protect organizations against cyber breaches through the company’s cloud-based software that verifies the identity of users and the health of their devices before granting access to applications with the idea of preventing breaches and account takeover.A few particulars of the deal include:
Cisco currently provides on-premises network access control via its Identity Services Engine (ISE) product. Duo’s software as a service-based (SaaS) model will be integrated with Cisco ISE to extend ISE to provide cloud-delivered application access control.
By verifying user and device trust, Duo will add trusted identity awareness into Cisco’s Secure Internet Gateway, Cloud Access Security Broker, Enterprise Mobility Management, and several other cloud-delivered products.
Cisco’s in-depth visibility of over 180 million managed devices will be augmented by Duo’s broad visibility of mobile and unmanaged devices.

Cisco said that Integration of its network, device and cloud security platforms with Duo Security’s zero-trust authentication and access products will let customers to quickly secure users to any application on any networked device. In fact, about 75% of Duo’s customers are up and running in less than a week, compared to six to 12 months for comparable products. This focus on customer success has led to over 12,000 customers, including over 100 of the Fortune 500 companies, wrote Rob Salvagno, Cisco vice president of  Corporate Business Development in a blog about the buy.To read this article in full, please click here READ MORE HERE…

Read More
Networkworld

REVIEW: Best VPN routers for small business

When selecting VPN routers, small businesses want ones that support the VPN protocols they desire as well as ones that fit their budgets, are easy to use and have good documentation.We looked at five different models from five different vendors: Cisco, D-Link, and DrayTek, Mikrotik and ZyXEL. Our evaluation called for setting up each unit and weighing the relative merits of their price, features and user-friendliness.[ Learn who’s developing quantum computers.]
Below is a quick summary of the results:To read this article in full, please click here(Insider Story) READ MORE HERE…

Read More
Networkworld

What are the options for securing SD-WAN?

A key component of SD-WAN is its ability to secure unreliable Internet links and identify anomalous traffic flows.SD-WAN technology providers are continuing to increase their native security features and to create robust ecosystems of network-security partners.[ See where SDN is going and learn the difference between SDN and NFV. | Get regularly scheduled insights by signing up for Network World newsletters. ]
IT managers should consider their branch network security requirements and carefully evaluate the security capabilities of leading SD-WAN providers, include their native security features and their partnerships with network security providers.To read this article in full, please click here(Insider Story) READ MORE HERE…

Read More
Networkworld

SDNs and NFV are complementary and core components of modernized networks

The terms software defined networking (SDN) and network functions virtualization (NFV) are often used interchangeably, which is incorrect.  In a sense, the two are tied together as companies start using NFV as part of their SDN plans but that doesn’t have to be the case.Enterprises could maintain their current network architecture and shift to NFV or they could roll out an SDN and never leverage the benefits of NFV, so it’s important to understand what each is and the benefits of both.[ For more on SDN see where SDN is going and learn the difference between SDN and NFV. | Get regularly scheduled insights by signing up for Network World newsletters. ]
What is software-defined Networking
SDNs are a fundamentally different way to think about networks.  Technically, SDNs can be defined as the separation of the management, control and data-forwarding planes of networks.  Many people, including technical individuals read that definition and say, “So what?”, but the separation of these planes has a profound impact on networks and enables things that have never been done before.To read this article in full, please click here READ MORE HERE…

Read More
Networkworld

Cisco CEO trumpets Catalyst 9K advances, software business success

Industry bellwether Cisco revealed some important financial numbers this week – its revenues were $12.5 billion, up 4 percent for the third quarter year-over-year, with product revenue up 5 percent.But one of the of the more interesting tidbits is that the company said it was adding some 40 Catalyst 9000 customers a day and has  added 2,700 new customers this quarter to bring the total to 5,800 customers since its introduction in 2017. The Catalyst 9000 is key to a number of Cisco’s future initiatives – one of the most important being its drive to build out its Network Intuitive plans for intent-based networking.[ Related: Getting grounded in intent-based networking] |
The other is that the way its software is sold – via a variety of subscription/feature levels is a key component of its overall strategy to become a more software-oriented company.To read this article in full, please click here READ MORE HERE…

Read More