Remove Firewall Remove Internet Remove Research Remove WAN
article thumbnail

Cathay Pacific to take cloud journey to new heights

CIO

Cathay’s move to a modern SASE will deliver reliable internet bandwidth, enhanced interoperability between network elements, and enable the airliner to better manage and secure hundreds of workloads on AWS and Azure, Nair says. It will replace the standard MPLS network, he adds.

Airlines 298
article thumbnail

Call for Papers — Ignite ‘21 Is Now Open

Palo Alto Networks

We’re looking for highly technical perspectives with firsthand experience with our next-generation cybersecurity technologies, as well as groundbreaking new threat research or innovative best practices to be showcased at Ignite this November. Network Perimeter Internet Edge Security. Internet / Web Security. 5G Security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Role of SD-WAN in Securing the Expanding Network Perimeter

CIO

Software-Defined WAN (SD-WAN) is one of the most rapidly adopted technologies of the past decade. According to a recent study published by Dell’Oro Group, the worldwide sales of SD-WAN technologies are forecasted to grow at double-digit rates over each of the next five years to surpass $3.2 billion in 2024. Key considerations.

WAN 246
article thumbnail

RMON: A Closer Look at Remote Network Monitoring

Kaseya

One of the most successful network management protocols, RMON was originally developed by the Internet Engineering Task Force (IETF), an open organization made up of network designers, operators, vendors and researchers, that develops and promotes voluntary Internet standards. What Is the Difference Between RMON and SNMP?

Network 77
article thumbnail

The 8 Best Practices for Reducing Your Organization’s Attack Surface

Ivanti

Research from Randori and ESG reveals seven in 10 organizations were compromised by an unknown, unmanaged or poorly managed internet-facing asset over the past year. In fact, according to research from Enterprise Management Associates (EMA) , reducing security friction leads to far fewer breach events. So what do you do?

article thumbnail

A Critical Piece of Your SD-WAN Visibility

Kentik

SD-WAN, one of the most disruptive network technologies of the past few years, has a fast rate of adoption. Enterprises adopting SD-WAN are driven by key factors such as WAN cost savings, application performance improvement, management and operation simplification, and more. Visualize all transport (MPLS, internet, LTE, etc.)

WAN 76
article thumbnail

The Next Generation of Network Security Is Cloud-Delivered

Palo Alto Networks

Nearly 25 years ago, I was the principal developer of the industry’s first stateful inspection firewall. Those were the early days of the internet, and back then the prominent firewall technology was stateless access control lists (ACLs). Cloud adoption is challenging firewall architecture again and requires me to respond.

Network 14