Results for internal segmentation

Business and Technology

Robust Security with Intent-based Segmentation 

Fortinet announced, a new series of high-performance FortiGate NGFWs that enable organizations to implement intent-based segmentation deep into their security architecture.

By Muhammad Abid and Alex SamonteFebruary 06, 2019

Business and Technology

Achieving Business Goals with Intent-based Segmentation

Fortinet announced, a new series of high-performance FortiGate NGFWs that enable organizations to implement intent-based segmentation deep into their security architecture.

By Muhammad Abid and Alex SamonteFebruary 06, 2019

Industry Trends

Using Internal Segmentation to Secure the IoMT

To mitigate the cyber risks associated with Internet of Medical Things (IoMT) devices connecting to healthcare networks, security controls must be put in place to ensure that one compromised medical device does not lead to the compromise of the entire network and the loss of valuable patient data.

By Rajoo NagarDecember 28, 2017

Industry Trends

Why Today’s Financial Organizations Should Deploy Internal Segmentation Firewalls

As is the case across most of today’s industries, the latest IT technological advances like the cloud, Internet of Things (IoT), and mobility have all blurred the lines between traditional network boundaries, making them harder to secure by the day. Security challenges are escalating in part because there are an increasing number of network access points that can open doors to sensitive financial data. For example, many devices inside of today’s financial networks, such as routers and switches, are not security aware. Once these devices...

By Bill HoganMay 05, 2017

Industry Trends

Byline: Solving IoT Security - Pursuing Distributed Security Enforcement

For many of us in the Security Industry, the possibility of using Internet of Things (IoT) devices as a launchpad for an attack has been mostly theoretical. However, information obtained after the massive distributed denial-of-service (DDoS) attack against the services offered by DYN.com appears to show that the threat is real and immediate. The definition of IoT is often a little vague. Generally speaking, I consider any device with an IP address associated with it to be some sort of an IoT device, though not all of them are problems. The ones...

By Ken McAlpineFebruary 09, 2017

Business and Technology

Byline: Don’t Neglect Security in M&A Due Diligence

Look at any M&A due diligence checklist and you’ll see the same things: financials, customer information, sales, real estate, intellectual property, contracts—and the list goes on. One thing you may not see is information security, and that can be a crucial mistake. Like any other critical component of running a business, security needs to be right at the top of the list for M&A due diligence. When combining two companies, they often have different and sometimes even incompatible systems and data. That can create opportunities...

By Drew Del MattoDecember 12, 2016

Industry Trends

Securing The Internet of Things – Industrial Control Systems

The Internet of Things (networks of uniquely identifiable endpoints, or "things," that communicate without human interaction using embedded IP connectivity) is the next industrial revolution. Estimates say there will be 24 Billion IoT devices installed by 2020, and $6 Trillion will be invested in IoT devices over the next 5 years. With that kind of growth and investment, protecting each of these “things” and their corresponding interactions with other components, including our networks, will be critical. So where is this...

By Daniel ColeSeptember 14, 2016

Industry Trends

The First Step Towards Change is Awareness. The Second is Acting on it. 

In our everyday lives we all seem to be continually looking for knowledge or information to help improve a situation, or at least make sure we don’t end up in a bad one.  Let’s take for example, traffic.  If we live or work in a crowded city with lots of traffic, we are always looking to understand where the traffic jams and accidents are, and discover where the best routes are before we drive home from work so we can avoid getting stuck in traffic.  This behavior seems second nature to us. Most of the time, we do it without...

By Anthony GiandomenicoAugust 23, 2016

Industry Trends

Get Ahead of Evolving Healthcare Cyberthreats

Q: Why are conventional firewalls no longer enough? A: They never were to begin with. We caught up with Don Kopanoff at HIMSS 2016 to talk about the current state of security – and for him, it’s all about the rising complexity of threats. Last year, for example, upwards of 90 percent of identified viruses were unknown to the firewalls they infiltrated – meaning that if a firewall’s definitions aren’t aggressively updated, each passing day presents a new vulnerability. The increasing reliance on distributed...

By Susan BiddleMay 20, 2016

Business and Technology

Four reasons the Channel should pay attention to Internal Segmentation Firewalls

With the network perimeter disappearing before our eyes, a new model of firewall deployment represents an untapped opportunity for the security channel that shouldn’t be ignored.  Here are the top four reasons you should pay attention to Internal Segmentation Firewalls (ISFW): 1. The traditional “edge” firewall is no longer enough. As enterprise organizations adopt the latest IT technologies like Mobility and Cloud – and look ahead to things like container security – one unintended result is the expansion...

By Joe SykoraNovember 19, 2015