Whitepaper

Protect Against Advanced Evasion Techniques

The network security paradigm is currently shifting toward a new reality as advanced hacking methods become more prevalent and harder to detect. An example of such a method is advanced evasion techniques (AETs). Although evasions have been documented extensively in the last 15 years, security vendors have systematically ignored the significance of evasions. Some vendors

The Security Industry’s Dirty Little Secret

The debate over advanced evasion techniques (AETs). To assess what IT security professionals understand about AETs and what measures have been put in place to stop them, McAfee commissioned Vanson Bourne in January 2014 to survey 800 CIOs and security managers from the US, UK, Germany, France, Australia, Brazil, and South Africa.

Akamai’s state of the internet

Akamai’s globally-distributed Intelligent Platform allows us to gather massive amounts of data on many metrics, including connection speeds, attack traffic, network connectivity/ availability issues, and IPv6 adoption progress, as well as traffic patterns across leading Web properties and digital media providers. Each quarter, Akamai publishes the State of the Internet Report.

Making the move from AAA to Policy Management

A quick look at why authentication, authorization and accounting – or AAA and RA DIUS – were developed can easily take you back more than a decade. Acronyms and phrases like modems, roaming between ISPs, UNI X, and AOL come to mind. Users had one device and were chained to wired desktops. And IT managed

Enabling Secure Enterprise Mobility

If you’re like most, sitting at a desk for the entire day and only carrying a laptop is a thing of the past. Life was simple and you could always reach email, apps and the printers needed. The new generation of worker, known as #GenMobile, uses multiple mobile devices for every aspect of work and