Latest Articles

Beyond Blueprints – A Guide to Data Driven Construction

Harness the Power of Data to Transform Traditional Practices Most AEC professionals rely on years of experience and instinct. The advent of a centralized, cloud platform has led to a paradigm shift, with data now driving decisions. Egnyte’s Beyond Blueprints Ebook outlines how to embrace the change and harness the power of data for:• Secure […]

Read →

Hyper-Converged Infrastructure: An SSG-NOW Outlook Report

SSG-NOW, a leading industry analyst firm, has published a new report describing the driving issues, trends, history and key features of hyper-converged infrastructure. This report also discusses Sphere 3D’s V3 VDI platform, including the V50, V100 and V200 virtual desktop appliances, as best practice examples for the implementation of hyper-converged systems. For the last several […]

Read →

SANS Report — Advanced Network Protection With McAfee Next Generation Firewall

It’s important to idenfity the right features for your enterprise when evaluating next generation firewalls. Key points include ease of use, centralized management, integrated VPN, high availability, and the ability to stop advanced, sophisticated attacks.  Read this latest SANS report as they look in depth at the McAfee Next Generation Firewall as see how it […]

Read →

Information Week Report — Advanced Attacks Demand New Defenses

Security threat and response is a vicious circle of escalating (and increasingly cagey) attacks and sophisticated (and increasingly costly) defenses. The latest generation of malware includes deviously creative evasive techniques crafted to exploit ambiguities in the Internet’s underlying technology, flaws in network software stacks, and limitations of security appliances. In this report, we discuss these […]

Read →

Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques

Sophisticated cybercriminals are using advanced evasion techniques (AET), which deliver an exploit or malicious content into a vulnerable target so that the traffic looks normal, to bypass most existing security solutions. McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect this type of attack. It has been successfully tested against more than 800 […]

Read →

The Security Industry’s Dirty Little Secret – The Debate Over Advanced Evasion Techniques (AETs)

In early 2014, McAfee commissioned research group Vanson Bourne to determine the level of understanding IT security professionals have about AETs and the defenses they have put in place to stop them. The findings, summarized in this executive summary, show that most respondents do not fully understand AETs and, as a consequence, are not deploying […]

Read →

Seven Key Features to Help You Stop Advanced Evasion Techniques at the Firewall

Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced evasion techniques (AETs) take advantage of rarely used protocol […]

Read →

Demand More: Get the Most from the Move to a Next-Generation Firewall

As next-generation firewall (NGFW) technology becomes more mainstream, it is time to review the advanced capabilities and features that separate the leaders from the laggards. At its most basic, the consensus of a NGFW definition would include these capabilities – standard firewall features like stateful inspection and network address translation, integrated intrusion prevention, application awareness […]

Read →
25,000+
Articles
500K+
Monthly Readers
300+
Sponsors
15+
Years of Insights