Articles about Network

Illumio partners with BT to offer businesses micro segmentation

Segmentation

Zero trust and micro segmentation have gained in prominence in the past year as working patterns have shifted to a remote model. Illumio has announced that its micro-segmentation solution, Illumio Core, is to be made available as part of telecoms giant BT's portfolio of security solutions

Illumio Core provides application visibility, micro-segmentation, and control of all network communications across any data center, container, VM, or cloud environment. its micro-segmentation technology, delivered with BT Security’s support and services, enables a broad range of customers to prevent lateral movement and the spread of breaches within their networks.

Continue reading

60 percent of network resources expected to be at the edge by 2022

Networked computers

A new study from IDC and Limelight Networks predicts that by next year 60 percent of all network resources will be deployed at remote edge or service provider locations, up from just 20 percent in 2020.

The survey of 1,100 analysts worldwide shows 73 percent view edge as a strategic investment, while another 17 percent say it's required by business operations.

Continue reading

Get 'Network Automation Cookbook' ($27.99 value) FREE for a limited time

Network Automation Cookbook is designed to help system administrators, network engineers, and infrastructure automation engineers to centrally manage switches, routers, and other devices in their organization's network.

This book will help you gain hands-on experience in automating enterprise networks and take you through core network automation techniques using the latest version of Ansible and Python.

Continue reading

Exium launches secure 5G network as a service

5G circuit board

As noted in our 5G predictions roundup at the end of last year, one of the concerns about the rollout is that it introduces extra risks.

In order to provide a safer option Exium is launching its Secure 5G network as a service, based on emerging clean network standards being promoted by the US Department of State, the EU and others.

Continue reading

Working from home is here to stay, increased focus on SD-WAN and zero trust -- network predictions for 2021

2021 predictions

After 2020 managed to turn most of the world on its head, making predictions for 2021 might seem to be a bit risky. Plenty of industry experts have been doing so, however, which means that it's time for our usual seasonal round ups of what you can expect to see from the technology world next year.

One of the biggest impacts of 2020's pandemic has been on networks as more people than ever have switched to remote work. Let's have a look at how the industry thinks this will play out in 2021.

Continue reading

How secure SD-WAN can improve security and cut costs [Q&A]

remote working

Securing enterprise networks has always been a challenge, but 2020 and the shift to remote working has made it even more so.

Fortunately secure SD-WAN technology can help businesses to deal with the new landscape as well as reducing costs and making strong security accessible to more organizations. We spoke to Mike Wood CMO of Versa Networks to find out more.

Continue reading

Users underestimate level of attacks on home networks

IoT security

Internet users in the US vastly underestimate how often their home networks are targeted by cyber threats according to a new report from Comcast.

The first Xfinity Cyber Health Report combines data from a new consumer survey with threat data collected by the xFi Advanced Security platform and finds 95 percent of survey respondents underestimate the volume of attacks they face each month.

Continue reading

Zero trust access, VPN, both? The changing face of remote network access [Q&A]

Networked computers

Virtual private network (VPN), software defined perimeter (SDP), zero trust network access (ZTNA), there are plenty of technologies around for protecting remote access to enterprise networks.

This is an area that's been thrown into sharper focus this year, but what's the best option for keeping remote access secure? We spoke to Scott Gordon, CISSP for Pulse Secure to discuss the value of the different options available.

Continue reading

Vectra improves cloud services to protect complex hybrid networks

Network

With more people working remotely, plus high numbers of IoT devices accessing corporate and cloud networks, traditional network security solutions struggle to cope and are blind to activity and data in cloud applications.

Network threat detection and response company Vectra has launched a new range of cloud services with broader and deeper cloud capabilities to track and link accounts and data in hybrid environments.

Continue reading

Cybereason launches new solution to protect enterprise networks

Network

Cyberattacks increasingly take aim at multiple devices and users simultaneously while employing a range of tactics, forcing defenders to employ a range of different tools across their IT estate.

Now though Cybereason is launching a new Extended Detection and Response (XDR) solution that brings together endpoint telemetry with behavioral analytics to help enterprises to swiftly detect and end cyberattacks anywhere on their networks.

Continue reading

Network access to over 7,000 organizations for sale on hacker forums

hack money

Hackers have breached 7,500 organizations and are selling network access on multiple Russian hacker forums.

An investigation by CyberNews.com reveals compromised networks located in the USA, Canada, and Australia which include educational, entertainment and bar industry organizations.

Continue reading

NETGEAR launches Nighthawk Pro Gaming XR1000 Wi-Fi 6 (802.11ax) router

If you don't have a Wi-Fi 6 (802.11ax) router, you are not living your life properly. Look, even if you don't have any Wi-Fi 6 devices yet, you can score such a router for as low as $79.99. Seriously, folks, its time to upgrade your aging wireless networking gear already.

For those of you hardcore gamers looking to upgrade to Wi-Fi 6, NETGEAR has a new router that is sure to tickle your fancy. The "Nighthawk Pro Gaming XR1000," as it is called, runs DumaOS 3.0 -- a gaming-optimized firmware and interface. Not only will you benefit from the power of 802.11ax, but DumaOS will allow you to tune things to best meet your online gaming needs.

Continue reading

A third of companies are exposing unsafe network services to the internet

Network security

New research finds that 33 percent of companies within the digital supply chain expose common network services such as data storage, remote access and network administration to the internet.

The study from RiskRecon and the Cyentia Institute also finds that organizations that expose unsafe services to the internet exhibit more critical security findings.

Continue reading

Synology launches DiskStation DS1520+

How to handle storage is a very tricky business. Some people prefer storing files locally, while others like the convenience of the cloud. Thankfully, you don't necessarily have to choose between the two -- you can sort of get both simultaneously. In other words, you can set up a network attached storage (NAS) device to store your files locally but also access them on the go -- a self-hosted cloud, if you will.

Synology is one of the most trusted names in network storage, and for good reason. Its storage/server devices are very robust -- high-quality and chock full of features. I have personally been testing one recently, and find it a great way to backup files and access media files (Plex server FTW). Today, Synology launches its latest such product. Called "DiskStation DS1520+," it has an impressive five bays. It also has two NVMe PCIe SSD slots for cache.

Continue reading

Attackers can get into a network in 30 minutes

clock timer

Penetration of a local network takes between 30 minutes to 10 days and in most cases, attack complexity is low, meaning that an attack is within the capabilities of a hacker with basic skills.

Moreover there is at least one easy penetration vector in 71 percent of companies according to the research from Positive Technologies which analyzed the security of corporate information systems and prepared an overview of the most common security flaws and attack methods.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.