Plaintiffs in the patent infringement case Centripetal Networks v. Cisco Networks won the day thanks to clear testimony and using Cisco's own technical documents in unaltered form. By contrast, the judge slammed Cisco for offering disagreeing witnesses and attempting to focus on old, irrelevant technology.
Why did Cisco, one of the world's largest and most successful networking companies, have to pay more than $2.6 billion in damages? A judge found that it infringed on four patents held by network security firm Centripetal Networks.
Join CrowdStrike VP of Product Marketing Ian McShane and Zscaler Director of Transformation Strategy Nathan Howe as they offer insight into how cloud and endpoint security can join hands to strengthen security protection, detection and remediation.
Radware's Alteon SSL Inspect provides a simple one-box solution for high-performance visibility
into enterprise SSL/TLS traffic. It removes the blind spot introduced by the rising use of SSL/TLS
and allows security tools to inspect all traffic for possible breaches and leaks.
Download this data sheet to lean more...
The need for enhanced business agility and secure remote access to support digital transformation has led to the adoption of the security access service edge, or SASE, model, says Rajpreet Kaur, senior principal analyst at Gartner.
This paper examines how VMware and Intel have worked together to deliver network virtualization capabilities that leverage software and hardware innovation to provide a wide range of business and operational benefits to enterprises that need their networks to be every bit as agile, flexible, secure, and elastically...
The emerging cloud-delivered service model known as security access service edge, or SASE, is designed to help simplify security for remote access, says Sean Duca of Palo Alto Networks, who explains how the model works.
CISA is warning that threat actors are actively exploiting a remote code execution vulnerability in F5's BIG-IP network products that can lead to data exfiltration and other security issues. Earlier, researchers and F5 had urged users to patch the flaw.
In order to address the shift in networking and security requirements, a new architecture is needed.
With the common framework a SASE provides, organizations can simplify management, get consistent visibility, and maximize network protection across users, devices and applications, no matter their location.
Beyond mere information sharing, collective defense is a concept that aligns public and private sectors in a unified front against cyber threats. Bill Swearingen of IronNet Cybersecurity defines the concept and how it's being employed today.
Johns Hopkins Medical Institution recently turned to Gigamon to curb some of the chaos created by IT monitoring and troubleshooting inefficiencies.
Check out the case study to see how the medical organization addressed network downtime and security vulnerabilities, which can spell big trouble for your bottom line.
A recently discovered cyber-espionage toolkit called Ramsay is designed to infiltrate air-gapped networks to steal documents, take screenshots and compromise other devices, according to the security firm ESET.
Vistra Energy, a Texas-based power generation firm, recently underwent a network transformation project. CISO Paul Reyes, joined by Zscaler's Dan Shelton, opens up on how to make the move to cloud-based models and what it can do to support your business.
Shocking but true: 44 percent of East-West traffic is not encrypted. If you ever needed a reason to evaluate your own network, our new TLS research report is jammed with more numbers that will motivate you to do so. Researchers studied 275 billion data flows to reveal real-world metrics of SSL/TLS protocol usage, and...