Scaling security devices is much more difficult than scaling routers or switches. A router acts on the destination IP lookup only, a 32 or 128 bit fixed length value, whereas a switch acts on a 48 bit fixed length MAC address, looking up on the destination MAC and adding the source MAC to a lookup table.
The number of mobile devices in the workplace is exploding and with this, a new frontier for cyber-attack is emerging that poses a significant risk to business. As the great philosopher and strategist SunTze wrote, “Know your enemy and know yourself and you can fight a hundred battles without disaster.”
Threat analysts are finding that malware isn’t just a problem for laptops any more.
In this guest post, our customers Kelley Parkes, Director of Technical Operations (on the right) and Dave Rupert, Systems Engineer (on the left) at First Source, describes how their company built a site-to-site VPN with SonicWall NSAs and TZs to enable secure collaboration and failover protection to sites spread across the country.
During my 14 years with SonicWall Security (formerly SonicWall), I’ve never seen a greater need for powerful network security, and the SonicWall World Software User Forum provides a great opportunity for you to mingle with some of the most powerful minds in security today.
We’re excited to finally be able to host a dedicated security customer forum at this event.
The SonicWall Security Threat Research team sifts through hundreds of thousands of unique malware samples daily. In their latest threat report, they’ve documented that businesses continue to be under attack in ways that are increasingly difficult to defend against. We often see threat actors using combinations of evasion techniques and modifying their attacks vectors to circumvent firewalls and intrusion detection systems.
What if you could increase employee productivity and employee satisfaction? Compelling evidence shows that employers that embrace the use of mobile devices for work purposes, whether personal or corporate issued, can do just that. Too risky? A new generation of mobile security and management tools can enable this without compromising data security.
Patrick Sweeney, executive director of product management, SonicWall Security Products once said “At any given moment, every organization in the world is a few packets away from an imminent infrastructure disaster!” There can be many reasons for this to happen: out of date security technologies, non- adapted security policies and human errors.
Let me ask you a question. How safe is your security position in your retail store? If you lock your doors and windows, then why not lock your network as well? Locking down your network does not mean you are slowing it down for legitimate use but rather, hardening it against attacks.
Recently, I was privileged to spend three days at the SonicWall Security Peak Performance EMEA conference in Berlin, meeting and talking with more than 300 SonicWall partners and customers from across Europe. Security is very much top of mind for our partners, and we know from the results of a SonicWall survey conducted ahead of the conference that advanced persistent threats are a chief concern for a majority of their customers.
Providing employees with mobile access to corporate resources and applications can deliver a wealth of benefits, including improved productivity, satisfaction and innovation. However, it also introduces security and compliance challenges, from data loss to network breaches and malware attacks.
The way people work has fundamentally changed and mobile devices are at the forefront of this shift.