Forget detection: in Security 2.0, visibility is the key to long-term protection
With specific-purpose tools becoming obsolete within years, long-term vision requires better views of extending networks
David Braue | 31 May | Read more
With specific-purpose tools becoming obsolete within years, long-term vision requires better views of extending networks
David Braue | 31 May | Read more
It took nine months of back-and-forth with the Australian Signals Directorate (ASD), extensive code changes and a new approach to sensitive-application certification, but the world-first Australian approval of the Citrix Worx Mobile Apps – allowing them to carry PROTECTED-level government information – will set the pace for similar efforts in other countries, according to the company's government-market head.
David Braue | 22 Oct | Read more
As the head of Citrix’s networking products, Phil Caleno has a chance to get a deep look into networks and understand the type of threats customers are facing.
Anthony Caruana | 13 Jul | Read more
They may have originally embarked on thin-client rollouts for remote access, but government agencies' early acceptance of virtual desktops has proved prescient as security models are challenged by growing use of mobile devices and cloud services.
David Braue | 18 May | Read more
Controlling user access privileges has always been essential to enterprise security, but today's cloud and mobile-driven computing environments make that control hard to maintain. Thankfully, combining time-honoured remote access technologies with increasingly intelligent – and portable – business policies offers new promise for those struggling to extend internal security measures to outside IT services.
David Braue | 11 May | Read more
The emerging model of the Internet of Things (IoT) is rapidly changing the way organisations think about IT security – but IoT's unique characteristics are also likely to send ripples through conventional security architectures by forcing a fundamental rethink about how corporate data is managed and protected.
David Braue | 27 Apr | Read more
Apps used by millions of iPhone and iPad owners became vulnerable to snooping when a flaw was introduced into third-party code they used to establish HTTPS connections.
Lucian Constantin | 21 Apr | Read more
That software-defined networking (SDN) is a coming reality is starting to gain traction in IT security circles, with some vendors arguing it could lead to a level of interoperability in security largely missing at present.
Ellen Messmer | 30 Aug | Read more
Medellín, Colombia, uses virtualization software to bring education to the farthest reaches of its community, streamline costs and reduce energy consumption.
The majority of email and Web gateways, firewalls, remote access servers, UTM (united threat management) systems and other security appliances have serious vulnerabilities, according to a security researcher who analyzed products from multiple vendors.
Lucian Constantin | 15 Mar | Read more