How Unified Threat Managers Are Different Than Next-Generation Firewalls

How Unified Threat Managers Are Different Than Next-Generation Firewalls

Unified Threat Managers (UTMs) and Next Generation Firewalls (NGFW) are often categorized together. I am going to define what is generally included in each product what the differences are, approaches to evaluating, and decisions to make when considering either of these solutions.

What is a UTM? [Read more…]

BYOD Security: 5 Ways Meraki Manages Networking in The Cloud [Cisco]

BYOD Security: 5 Ways Meraki Manages Networking in The Cloud [Cisco]Besides being cost-efficient and quick to deploy, cloud-based services are flexible and scalable to fit your needs and your budget as they evolve over time. And cloud-based service providers usually take care of major issues (and costs) related to security, backup, storage and computing capacity – so you don’t have to.

What cloud-based networking brings to BYOD

Today’s cloud-based networking solutions also have an incredible array of BYOD management  and security  features baked right into them. It makes sense when you look at the risks involved with something as common as a guest WiFi network, for example. Many companies provide guest WiFi networks so customers or partners can use the Internet while visiting their offices. But what if a guest’s smartphone is infected with mobile malware that’s programmed to automatically infect any network (like yours) that it comes into contact with? It could make for an unpleasant visit – especially if your firewalls aren’t up to date and your guest WiFi network isn’t completely isolated from your internal corporate network!

[Read more…]

Security for Your BYOD Environment in 3 Simple Steps [Cisco]

BYOD is happening (like it or not): 3 basic steps you need to take

This post is for IT folks who would like to understand the minimum steps required to secure their network in an age where so many devices are attempting to connect to your network. An earlier post looked at developing policies for a formal BYOD program – this post is more about securing your environment (with or without a formal BYOD program). It covers employee’s personally owned devices that they bring to work with them, as well as visitors who are looking for a connection to the internet through your network.

It is possible to manage risk in your current BYOD situation today. Here are some tips and technology tools that take care of your existing BYOD needs now, even if your important BYOD policy plans aren’t quite polished yet. [Read more…]