Posts

Showing posts from September, 2022

Preventing a Stalled Network Segmentation Project

Image
As part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories— Ido Daniel of Forescout charges up a step-by-step guide to prevent your network segmentation project from stalling. In healthy relationships, we avoid making assumptions about a situation until we know all the facts and establish where miscommunications may have begun. This same mindset should be applied when evaluating the success of your organization’s network segmentation project. It’s an unfortunately common practice for organizations to assume their assets and networks are fully separated when they are not. A variety of factors tend to complicate this assumption, including the disintegration of network perimeters due to remote work’s pervasiveness and the growing number and diversity of connected IoT and OT assets. The attack surface, thus, is constantly expanding and poses a more significant challenge to properly segment and mon

Solutions Review Announces Call for Participation: Fourth Annual Insight Jam

Image
Solutions Review is calling for participation in Insight Jam 2022 ! The fourth-annual Insight Jam community web event will feature more than 48 hours of buying advice, best practices, predictions, trends, tips and tricks for modern organizations looking to stay on-trend. Last year’s event was a smashing success generating more than 1,500 posts, 3,000 likes, 15,000 video views, and more than 750,000 impressions. This year Solutions Review is doubling down on its popular Expert Panel  segments to meet the demand for what its editors do best; bring industry experts together to publish the web’s leading content for enterprise technologists. Solutions Review Insight Jam 2022: Save the Dates Monday, December 12: Information Security (#InfoSecInsightJam): Adapting and Managing IAM, Endpoint, and SIEM in the SaaS Age Tuesday, December 13: Data Protection (#BUDRInsightJam): Challenges and Opportunities in Cloud Data Protection, Enterprise Backup, and Disaster Recovery Wednesday, Dece

The 9 Best WireGuard VPN Solutions to Consider in 2022

Image
The editors at Solutions Review break down what the WireGuard protocol is, and what the best WireGuard VPN solutions are in 2022. What is a VPN protocol, and why does it matter?  As explained by Restore Privacy , a VPN protocol is a set of instructions to establish a secure and encrypted connection between your device and a VPN server for data transmission. Different protocols, different sets of instructions. It’s not uncommon for a VPN to use multiple protocols, but most will build off of one protocol as their primary protocol. Examples include OpenVPN, WireGuard, and IPsec. In this article we’ll be specifically looking at WireGuard VPNs. WireGuard is a newer VPN protocol that seeks to provide better performance and more security over existing protocols. It was officially released from beta in 2020 and continues to gain popularity due to better performance in comparison to other protocols. WireGuard offers excellent performance in terms of speed, reliability, and also battery con

Identity Management and Information Security News for the Week of September 30; Updates from IDSA, Keyri, Laika, and More

Image
The editors at Solutions Review have curated this list of the most noteworthy identity management and information security news for the week of September 30. This curated list features identity management and information security vendors such as IDSA , Keyri , Laika , and more. Keeping tabs on all the most relevant identity management and information security news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month, in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy identity management and information security news items. Widget not in any sidebars Identity Management and Information Security News for the Week of September 30 The Identity Defined Security Alliance (IDSA) Appoints Executive Director Julie Smith to Executive Advisory Board The Identity Defined Security Alliance (IDSA) , a non

A Digital Integration Hub Definition and Advice for Deployment

Image
This is part of Solutions Review’s Premium Content Series, a collection of contributed columns written by industry experts in maturing software categories. In this submission, GigaSpaces CEO Adi Paz offers a Digital Integration Hub definition and advice on how to deploy one. Digital transformation has exploded as organizations seek new forms of revenue by creating applications and services that meet customer demands. According to McKinsey , business leaders predict that half of their revenues will be from new products and services by 2026. To build those new offerings, organizations need to manage data accordingly. Conventional IT architectures struggle to effectively support the increased load from digital applications, leading to performance bottlenecks and a poor customer experience. Eventually, a more robust solution is required. Gartner forecasts spending on cloud application infrastructure services and cloud application services to increase this year by 24 percent and 18 pe

The Age of Virtualization: Cybersecurity Strategy Evolved

Image
As part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories— Scott Aken of Axellio talks cybersecurity strategy and network traffic analysis in the age of virtualization. The virtualization strategies we saw in many other sectors of the IT industry over the past couple of decades are still mostly missing from traffic monitoring and analysis systems.  The processing power that analyzes network traffic and generates this information is still based on the heavy iron approach: processing live traffic with pricy, complicated applications operating on often proprietary hardware. Switches and routers are even being virtualized in the hardware-centric network industry, while proprietary hardware is still used in many network analysis systems. But times are changing.  Traffic analysis applications can now be virtualized thanks to next-generation network visibility platforms, opening the door to a new er

The Case for SaaS: IT Analytic Tools in the Cloud

Image
As part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories— Rakesh Jayaprakash of ManageEngine discusses the myriad benefits of running IT analytic tools in the cloud. Given the current hybrid work environment, running your IT analytics through a SaaS platform makes more sense than ever. By using analytics software in the cloud, you gain flexibility, scalability, and agility; additionally, you reduce the amount of time spent on installation and configuration, and it’s easy to integrate your SaaS analytics tool with a host of other SaaS products. When employing SaaS products, start-up companies and SMBs gain access to high-end software for a relatively low cost. Moreover, through the use of SaaS, these companies are not burdened by high operating expenses, as all software upgrades and maintenance are automatically provided by the SaaS provider. In a traditional, on-premises environment, one has

Endpoint Security and Network Monitoring News for the Week of September 16; Updates from Arrcus, AutoRabit, Torq.io, and More

Image
The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of September 16. This curated list features endpoint security and network monitoring vendors such as Arrcus , AutoRabit , Torq.io , and more. Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items. Widget not in any sidebars Endpoint Security and Network Monitoring News for the Week of September 16 Arrcus Announces the Availability of FlexMCN, A Multi-Cloud Networking Solution Built for the Distributed Cloud Era Arrcus, the hyper-scale networking software company, announced t