When Gartner coined the phrase "next generation firewall", in 2003, it captured a then-nascent approach to traffic classification and control. Combining traditional packet filtering with some application control and IPS layered on top, today's 'legacy' NGFWs do pretty much what they say on the tin.
However, while NGFWs continue to be a vital part of an organization’s protection, they were designed for a time before advanced targeted threats started attacking our enterprises -- threats which often go undetected until it's too late.
In only a handful of years, a wide range of file sharing services have popped up, from completely free services aimed at consumers (including the likes of Dropbox, Google and WeTransfer), to enterprise-focused services (such as Mimecast, EMC and Citrix).
Considering the long list of available offerings on both sides, making the right choice for your business can be difficult, so it's a good idea to do your research first...
How many of you really understand the cloud? If you were tasked with explaining "the cloud" to a child could you manage it?
A recent discussion with top industry professionals and cloud thought leaders revealed that, for cloud solution providers, education was the biggest hurdle in cloud service adoption. Thankfully at a SAGE hosted round table, we dissected exactly what the cloud is, what it does, and how it can benefit you.
Following on from the success of Tesco's first generation budget tablet, it was only a matter of time until its successor was released.
Tesco sold 35,000 units of the Hudl in the first few days after it was launched last year and ended up shifting over 750,000, placing this endeavor firmly into the 'success' category for the supermarket giant. The Hudl 2 was recently released and we were given the chance to take it for a test spin to find out if Tesco has got another bargain success story on its shelves.
There is little doubt that cloud will play an increasingly important role as more and more organizations adopt cloud based strategies to underpin their IT infrastructures. Indeed, cloud hosting offers a wide variety of advantages to companies with the expertise to take advantage of it. Applications can be rolled out faster, resources can be rented rather than purchased and infrastructure can be right-sized to support monthly and seasonal peaks.
However, a global survey commissioned by iland in April 2014 and undertaken by analyst firm Enterprise Management Associates (EMA), highlighted that there are also plenty of challenges when moving to a new cloud based infrastructure. In fact, 91 percent of those surveyed experienced at least one unexpected challenge when moving to the cloud with pricing, performance, scalability and location all topping the list of issues.
After news broke earlier this month that hackers had gotten their hands on nearly 7 million Dropbox login credentials, the familiar media chorus of password safety tips soon followed. You likely saw the headlines: "How to Change Your Dropbox Password". "It’s Time to Enable Two-Step Authentication on Everything". "Never Ever Reuse Your Passwords".
It’s not that good password hygiene isn’t important. Enabling two-factor authentication, not using the same passwords for multiple sites, changing passwords every couple of months -- these are all aspects of a smart and savvy approach to protecting the files and data that you store online. But they’re not foolproof. As hackers grow increasingly sophisticated, even users following all the "rules" may see their login credentials compromised as part of an attack. Additionally, for companies whose employees use consumer-facing platforms, enforcing password safety rules can sometimes be a challenge. Whether it’s a result of hacker expertise or human error, when passwords fail, companies must make sure they have a backup plan in place.
The use of biometrics by border control agencies worldwide is now commonplace. Many countries around the world are deploying or have already deployed biometric border security systems for accurate and fast identification of citizens and foreign travelers.
Border security biometric systems include national database deployments in entrance and exit systems, immigration, and e-passports, to track and manage the flow of humans across borders. More sophisticated technologies like multimodal biometrics identification are now considered more reliable to improve border control security.
A videogame museum is opening in Britain that hopes to become the "hub for videogame culture".
The National Videogame Arcade in Nottingham will display a selection of highlights from the National Videogame Archive, a collection of 20,000 objects owned by the Science Museum.
NHS Trusts across the UK are risking a security meltdown due to the widespread presence of Microsoft’s outdated Windows XP OS with the government looking at another £5.5 million bill from Microsoft for support.
Citrix, the mobile workspace company, filed a freedom of information act request that found all the of 35 NHS Trusts questioned are still using Windows XP and that just five are utilizing desktop virtualization technology to handle migration away from it.
Zombies are a staple of the horror film industry despite being absurdly ill-equipped to play the role of a predatory force unleashing Armageddon on the human race. They're embarrassingly slow and brainless, for starters. They have terrible personal hygiene, can't operate machinery of any kind, they can't drive and they even don't know how to use a computer or a smartphone. As if that wasn't bad enough, no one has properly explained why some people they kill become zombies and others are completely gobbled up.
Network zombies, on the other hand, are an all too real menace for the modern-day IT administrator. They are smarter than the average zombie, impossible to predict because they appear randomly without warning and dangerous because they cause downtime and lost productivity. Without the right approach, they are nearly impossible to locate and kill.
The lines between business and personal mobile use are blurring as the way consumers use their devices becomes increasingly diverse. This is leading mobile users everywhere toward an always-connected existence, dominated by mobile devices, and where brands must work even harder to meet their visitors' needs.
With this in mind, Netbiscuits recently conducted a survey of more than 6,000 consumers from six countries, asking them for their insights and thoughts around mobile web usage and behavior. Here, Netbiscuits CEO Daniel Weisbeck recaps the top ten findings from the UK, US, Germany, China, India and Brazil.
While successful businesses vary wildly in how they operate, one aspect seems to be shared -- an established communication system, both internally and externally. Through this communication infrastructure, high-level leaders can stay connected with corporate leaders, managers, and lower-level employees, allowing for precise instructions, procedures, and overall progress, to be effectively communicated and comprehended by all parties involved.
The problem most businesses encounter is maintaining that line of communication. This is especially true for larger companies with establishments in various locales.
Authorities are advising all users of the Tor network to check their computers for malware after it emerged that a Russian hacker has been using the network to spread a powerful virus.
Tor, which began as a secret project from the US Naval Research Laboratory, works by piling up layers of encryption over data, nested like the layers of an onion, which gave the network its original name, The Onion Router (TOR).
Thefts of cars that use keyless fobs to gain access are on the rise after criminals gained the ability to hack into the car’s onboard computer and it is causing some luxury car owners to be refused insurance.
The Society of Motor Manufacturers [SMMT] reports that organized crime syndicates have been able to bypass the onboard security by using software only meant for mechanics and start vehicles using the ignition button present in many high end models, such as Range Rovers and BMWs.
The miniaturization of components for the benefit of notebooks has had a knock-on effect for desktops. Using some of the same components, desktops can be made a lot smaller too, or even designed to fit behind a screen for an all-in-one system. The Dell Optiplex 3020 Micro is almost a notebook without a screen, but if you want a tiny no-nonsense system that will be almost invisible on a desk, or even fitted underneath, there is plenty to commend it.
The Dell Optiplex 3020 Micro's name is a little confusing, because there are actually two larger Optiplex 3020 models; only the word Micro denotes the rather different specification of this system. Measuring just 18.2cm along its longest edge, and weighing a paltry 1.28kg, the Micro is much smaller than the Minitower and Small Form Factor versions of the 3020. It's designed to sit flat on your desk, or an optional stand can be used to stand it vertically. There are VESA mounting options too, plus an all-in-one mount and a console including a DVD rewriter.