2016: New Opportunities for Security in SDN, Cloud, Data Centers and Container Technology

Security continues to be top of mind for businesses as we head into 2016. The continued adoption of cloud and virtualization technologies has resulted in new security concerns and new opportunities for security companies to address them: Security Demands will Drive SDN Adoption SDN has been picking up steam in enterprises. It enables creation and…

Reflections on the Excellus Breach

Today’s hackers harness numerous advanced attack strategies to get past traditional security solutions, including multi-vector attacks that exploit multiple security vulnerabilities, metamorphic and polymorphic malware that changes itself continually, and zero-day attacks that target newly discovered security flaws. Traditional firewall solutions fail to capture and stop today’s sophisticated attacks.Todays IT security focus on the perimeter,…

Garrat-Callahan reduces cloud application access from 45 minutes to near-instant with Hillstone

The Garratt-Callahan IT department saw a dramatic increase in network and application performance with the Hillstone solution. The better network performance allowed the IT department to allocate appropriate bandwidth to more mission-critical processes. In addition to network improvement, it also reported on malware, ARP attacks and other threats that Garratt-Callahan’s existing solution was not capturing…

Combining the Best-Of-Breed in Threat Defense

The tactics used by today’s advanced threat creators have evolved from isolated, random, single type of attacks to more organized, targeted and sophisticated attacks, aiming to achieve greater financial benefits as well as to cause significant political and personal damage to those that are hacked. The ways to combat these attacks have also changed over…

Trends in Network Security

RSA 2015 continues to see reinforcement by the security industry on the collaboration of individual segments on threat detection and attack protection. Enterprises and their CIOs have (finally) come to realize that money does need to be spent on security infrastructure and advanced technologies to prevent monetary (and political) damage as the result of possible…