Aruba to prioritize SASE, private 5G, data-center networking

Aruba Networks plans to prioritize development of a short list of key networking technologies – including data-center switching, private 5G, and secure access service edge (SASE) – that it finds are top of mind for enterprise customers.Hewlett Packard Enterprise’s network subsidiary is fresh off a successful first quarter that saw revenue climb 31% year over year. Aruba general manager Phil Mottram attributes the record revenue in large part to the company’s Intelligent Edge strategy, which includes technologies to help customers adopt and manage network and application resources.To read this article in full, please click here READ MORE HERE…

Read more

Fortinet adds new security, management features to its SASE platform

UNDER EMBARGO UNTIL TUESDAY, MARCH 7 AT 9AM ETFortinet has added features that broaden the range of management and security tools for its secure access service edge (SASE) package.The company has exanded its Secure Private Access offering that ties SASE resources together with SD-WAN-based applications through a Fortinet SD-WAN hub located in a nearby point-of-presence (PoP). The idea is to support larger hybrid environments and simplify anywhere access to corporate applications, said Nirav Shah, vice president of products with Fortinet.To read this article in full, please click here READ MORE HERE…

Read more

Cisco security upgrades strengthen access control, risk analysis

Cisco has strengthened some of its key security software packages with an eye toward better protecting distributed enterprise resources.Specifically, Cisco added more intelligence to its Duo access-protection software and introduced a new application called Business Risk Observability that can help enterprises measure the impact of security risks on their core applications. The company also enhanced its SASE offering by expanding its SD-WAN integration options.To read this article in full, please click here READ MORE HERE…

Read more

8 hot networking technologies for 2023

Despite the challenges posed by economic turmoil, epidemics, and political upheaval, network researchers are continuing to blaze new trails in innovation, performance, management, and security. In sum, 2023 is shaping up as a year of network evolution and transformation.Here are eight network technologies you will want to pay particularly close attention to.1. Unified SASE: Addresses hybrid workforce, hybrid clouds
Unified Secure Access Service Edge (SASE) tightly integrates security and networking into a single platform. The technology uses a single-pass scanning architecture combined with a unified policy that’s configured via a unified console that draws from a unified data lake. “This is significant for organizations to continue to provide a consistent and assured user experience while protecting users, devices, sites, and data amid the rapidly evolving dynamics coming in 2023,” says Kelly Ahuja, CEO of networking and cybersecurity firm Versa Networks.To read this article in full, please click here READ MORE HERE…

Read more

Work from home is here to stay, so how should IT adjust?

The pandemic has changed how we work, probably forever. Most employees with jobs that can be done effectively from home have no intention of returning full time to the office. They find that their work-life balance is much more balanced without the long commutes and constant interruptions that accompany office work.According to a McKinsey/Ipsos survey, 58 percent of American workers had the opportunity to work from home at least one day a week in 2022, while 38 percent were not generally required to be in the office at all.To read this article in full, please click here READ MORE HERE…

Read more

What is Zero Trust Network Architecture (ZTNA)?

Zero Trust is a term coined by John Kindervag while he was an analyst at Forrester Research to describe a strategic framework in which nothing on the network is trusted by default – not devices, not end users, not processes. Everything must be authenticated, authorized, verified and continuously monitored.The traditional approach to security was based on the concept of “trust, but verify.” The weakness of this approach is that once someone was authenticated, they were considered trusted and could move laterally to access sensitive data and systems that should have been off-limits.Zero Trust principles change this to “never trust, always verify.” A Zero Trust architecture doesn’t aim to make a system trusted or secure, but rather to eliminate the concept of trust altogether. Zero Trust security models assume that an attacker is present in the environment at all times. Trust is never granted unconditionally or permanently, but must be continually evaluated.To read this article in full, please click here READ MORE HERE…

Read more