Network Security

Fortinet introduces ML capabilities to its FortiWeb web application firewall

The new innovations to FortiWeb provide a dramatic increase in detecting web application threats with nearly 100 percent accuracy.

Cloud security doesn’t raise alarm bells: Jay Chaudhry, Zscaler

The shiny network appliances in organizations’ security infra are irrelevant as cloud is now a professionally managed utility, says Jay Chaudhry, founder & CEO at Zscaler.

Partner Content
How to protect your server against ransomware attacks?

Many companies get scared and pay up the demanded ransom almost immediately which only leads to criminals getting more emboldened. 

Why you need centralized logging and event log management

Collecting too much log data overwhelms systems and staff. Centralized event log management lets you filter for the most significant security data.

5 major cyberattacks and hacks of 2017

As we approach IDG Security Day on June 21, here is a glance at the major hacks, threats and ransomware attacks that shook the industry last year.

Gemalto launches virtualized network encryption platform for evolving data security needs

New virtual appliance simplifies management and deployment while lowering cost of ownership to encrypt traffic across all network layers.

Fortinet Acquires Bradford Networks

Strengthens Fortinet Security Fabric and extends segmentation and security to the edge of the enterprise network including Internet of Things (IoT).

Robust security with 99.99 percent uptime – LogMeIn CISO tells us how it’s done

From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.

Software is the key enablement for defining security perimeter: Makarand Joshi, Citrix

Makarand Joshi, Area Vice President and Country Head – India Subcontinent at Citrix, talks about GDPR, why it bets on a software-defined perimeter, and what makes its unified workspace solution unique in the market.

Partner Content
Spotted unusual activity on network: Here's what to do next

Just like the physical world, prevention is better than cure and in the case of the cyber world, having the proper defence in place goes a long way in securing an enterprise network.

Partner Content
Here's the checklist of an efficient endpoint security solution

Most attacks on an organization can be traced back to devices connected to enterprise networks, which is basically an endpoint. And hence, that is why it is extremely important for an enterprise to ensure that their endpoints remain safe and secure.

Partner Content
Poor network visibility: Don't put your enterprise's security at risk

The number of devices that connect to enterprise networks is exponentially growing, leading to an inter-connected information highway. The size, complexity, and mobility of modern network environments are continuously increasing.