How Unified Threat Managers Are Different Than Next-Generation Firewalls

How Unified Threat Managers Are Different Than Next-Generation Firewalls

Unified Threat Managers (UTMs) and Next Generation Firewalls (NGFW) are often categorized together. I am going to define what is generally included in each product what the differences are, approaches to evaluating, and decisions to make when considering either of these solutions.

What is a UTM? [Read more…]

6 Things Every Smart IT Manager Knows About Mac Security

macsecurity

Many people believe the Mac® is more secure than PCs, and that hackers don’t waste time on them. Forrester has even reported that a Mac is “more secure than a Windows machine,” as “historically there have been relatively few intrusions on a Mac.”

However, the Mac has become commonplace in the enterprise and 50% of businesses now issue them to employees. This means the Mac is becoming an attractive target.

According to a Kaspersky Security Bulletin, the main reason why cyber-criminals are targeting the Mac is because “Apple® products are popular with many influential politicians and prominent businessmen, and the information stored in the devices owned by these people is of interest to a certain category of cyber-criminal”.

While Mac OS X® has strong built-in security features, there are six specific things smart IT managers already do to protect their organizations from breaches and data loss – without investing in expensive security solutions to get started.

[Read more…]

Put Some ISE On Those BYOD Security Pains [Cisco]

Put Some ISE On Those BYOD Security Pains

There’s no denying it: employee-owned mobile devices, with frequent off-site network access, are the new normal for the next generation of workers.

Although adoption of BYOD programs is steadily climbing, security concerns for IT leaders continue to deepen. A 2012 Forrester survey of senior IT executives confirms security is their Number 1 concern regarding BYOD. And a 2012 Economist Intelligence Unit study cited corporate security as the biggest obstacle to implementing BYOD.

Making matters worse, yesterday’s mobile-access security solutions created in the past, no longer apply to today’s ubiquitous mobile-worker environments. There is simply too much complexity for legacy mobile device management (MDM) technology to deliver the functionality needed to protect corporate data and deliver the right user experience.

What companies need now is a security solution built with the challenges of today’s BYOD implementations in mind. This is where solutions such as Cisco’s Identity Services Engine (ISE) come into play.

Continue reading to get details on how Cisco is addressing this space, and find out more about a Mobility Webinar I’ll be hosting in December.

[Read more…]