This post was written by Dan Cole.

As enterprises continue to shore up their defenses in anticipation of the next breach, it’s understood by many security professionals that it’s not a matter of if it happens, but when. And when it does, how soon they would know before the attack has completed its cycle.

FacebookTwitterGoogle+LinkedIn

When you think about securing down a network using a next-generation firewall, in most cases the process immediately goes from the Internet to the local area network (LAN). This may be a good way of thinking if you only have hard wired desktop clients. However what if the network includes servers that need inbound access from the Internet or a wireless network?

FacebookTwitterGoogle+LinkedIn

The holiday shopping season is also a big season for cyber-criminals to breach high-traffic retailers. Forecasting from trends I have seen over the past 18 months, here are six security tips on how to protect your retail business. These often-overlooked recommendations are not limited to the holiday season, and you can implement them at any time:

1.

FacebookTwitterGoogle+LinkedIn

Today, customers are looking for more security and insight into the traffic on their network, without the burden of managing it on their own. Increasingly managed service providers (MSPs) are being asked to deliver network perimeter protection. Meeting this demand, SonicWall Firewall as a Service (FWaaS) now offers new SonicWall Global Management Systems (GMS) as a Cloud managed services.

FacebookTwitterGoogle+LinkedIn

The other day I went clothes shopping at the mall with my 12-year-old son, an experience that’s usually painful for both of us. While he was deciding between “straight leg” and “skinny leg” pants I spent my time looking at the surrounding shops in the mall. Some were smaller, independently-owned stores while others were part of larger retail chains.

FacebookTwitterGoogle+LinkedIn

Suffice it to say, SonicWall ‘s been in the news recently. Certainly the news around EMC has garnered many headlines. But it’s great to know that while all of this goes on, our number one priority remains interacting with our customers from around the world. This week, many of us are at the annual SonicWall  World and the SonicWall Software User Forum 2015 in Austin.

FacebookTwitterGoogle+LinkedIn

When a giant global plastics manufacturer faced a super cyber threat landscape, SonicWall’s firewall “Hero Sandwich” came to the rescue. This powerful security solution of the SonicWall Firewall Sandwich was recently leveraged by our customer, a global enterprise network. The challenges faced by this customer were the same that all companies face today as the cyber threat landscape increases exponentially year over year.

FacebookTwitterGoogle+LinkedIn

The foundation of email threat protection has long been anti-virus technology and IP reputation databases. Threat research teams across the globe are hard at work analyzing email, identifying spam and malware, and building anti-virus and IP reputation database libraries to help combat threats. Experts agree that for best threat protection, email security solutions should not rely on a single anti-virus engine or reputation database, but should integrate multiple sources to maximize security effectiveness.

FacebookTwitterGoogle+LinkedIn

If you follow sports at all you’ve probably heard about athletes using visualization to improve performance. It’s a simple tool where an athlete visualizes or “sees” himself or herself performing successfully in the athlete’s mind. Through visualization athletes paint a mental picture of how they will succeed and accomplish their goals.

FacebookTwitterGoogle+LinkedIn