Loading


Add to Google
Showing posts with label Wireless security. Show all posts
Showing posts with label Wireless security. Show all posts

Tuesday, May 29, 2012

Forrester Overview: the Rise and Fall of Information Security Technologies

Follow @ryderskull88


The popularity of the individual technologies for information security sometimes increases and sometimes decreases. Forrester Research in its report TechRadar bets on five technologies that are at the stage of growth, and five of those, that are dying.

Here are five technologies the popularity of which according to analysts from Forrester will grow in the future years.


1. Audit tools

According to a Forrester research the current implementations of audit tools are not changing too much, but in three or five years they will be widely used because of the growing number of data leaks. Mainly the rising popularity of these tools contributes to the emergence of standards for information security. That's why massive introduction of such decisions is expected in the nearest future.

2. Analysis of malicious software (malware)

The fact that such an analysis is used in incident response and vulnerability management, suggests that in the nearest future (3-5 years) the adoption of such tools will increase. In particular, some more thorough analysis of network traffic is needed due to the constant threats.

3. Network Encryption

Although the function of network encryption is present in the IT-infrastructure devices such as routers and switches, Forrester notes that because of the numerous requirements of standards for information security including encryption and data protection, demand for a separate application is now at the stage of growth. In one to three years, we will see a qualitative change in this area (a new stage of development), but without pressure from regulators this technology will be implemented only by large organizations, according to Forrester.

4. Intelligent modeling of threats

This is rather new concept that deals with analyzing the right way to protect sensitive data through proactive threat modeling. After 3-5 years there may be the next stage of technology development, although the cost and complexity of currently available modeling tools creates a barrier to threats adapting this new technology.

5. DDoS mitigation controls

Although the market has an anti-DDoS solutions, Forrester points out that the market is still extremely small recently. However, due to the growth of hacking (hacktivism - in the terminology used by Forrester), the market for solutions that provide protection against DDoS attacks will grow over the 1 - 3 years. Especially rapid growth of this will be in the SaaS model.

And here are the technologies which according to Forrester will face death in the coming years.

1. Network Access Control

According to Forrester the market for individual proposals to control network access will disappear within the next 5-10 years.

2. Applications for secure data transmission

The need for secure data transfer and providing file sharing between business partners, of course, is still high, but in 3-5 years all these services will be implemented through cloud services rather than applications.

3. Solutions for unified threat management (UTM)

Although these solutions are widely implemented in both small offices and branch offices, the technology of integrated threat management faces the fact that the focus of attention is shifting to the new security gateways with more integrated functions and determination of the invasion.

4. The traditional network firewall

The traditional firewall market is stagnating due to the wide adoption of the next-generation firewalls. The research company predicts that in 5-10 years a new generation of firewalls will replace today's traditional firewalls.

5. Preventing network intrusion (some solutions)

Forrester believes that the market of individual intrusion prevention systems (IPS) is at the stage of decline, and it will disappear within 5-10 years) despite its success in the world's largest companies for now. Instead there will be some new multifunction gateways and firewalls (especially the new generation of firewalls), which will include IPS and will be used instead of a separate IPS equipment.


The article was written and provided by Andrew Smith, QArea Company. Read about the company here.
Enhanced by Zemanta

Friday, February 17, 2012

Four Ways to Protect Your Home Computer Network

A home network is no longer the high tech curiosity that it was when wireless routers first appeared. Today, the average American family has its own wireless network. These networks make our life extremely convenient, but that convenience comes at a cost. Remember when you were a kid, sleeping over at your friends, and you’d get scolded for sneaking snacks out of the pantry? These days it’s the neighbor boy sucking up your bandwidth (or worse) that you have to watch out for. 



Here are the top four ways to protect your home network from an outside invasion, whether they’re after your bandwidth or your checking account number.

1. Change the default name and passwords on your router’s administrator settings.

This is different than the password for encryption (see below). This is a step many people forget, and not doing so could allow a hacker to gain unrestricted access to your router and essentially all computers on your network.

A simplified illustration of a home networkImage via Wikipedia

2. Always enable network encryption on your wireless security settings. 

It seems silly to even mention this, but there are still people who don’t understand that leaving their networks open is just asking for trouble. Security settings encrypt your data and block bandwidth thieves from taking a free ride on your network. In the olden days, WEP encryption was the industry standard. These days, WEP is easier to crack than a Reidel wine glass. Always set your network to WPA encryption or higher.  


3. Disable the SSID broadcast on your router. 

By doing this, you are essentially making your broadcast signal disappear. A passerby or neighbor scanning for available wireless networks on their cell phone or laptop will not see your router on the list of available networks. You can configure your own computers and devices to automatically connect to your router even if it doesn’t show up on a SSID scan.

Connections on an ADSL Modem Router (From Left...Image via Wikipedia



4. Regularly monitor on your network to check that there are no unwanted guests. 

Most routers come with software that provides these monitoring tools. Be sure to install and use them.
As the speed and sheer amount of digital information on the Internet increases at an exponential rate, more and more activities that were once traditionally performed in the real world are now taking place in virtual space. It’s can be hard to remember general safety rules, but if you follow these steps and stay vigilant, you’ll have done much to protect your home computer network. 



Technology happens to be one of John's favorite things to write about. If you'd like to find out more about Home Network, please visit  http://www.netgear.com/(enter categories) happens to be one of John's favorite things to write about. If you'd like to find out more about (category), please visit website.com




Enhanced by Zemanta

Here Are Some of My Most Popular Posts Since Day One.

If you like my blog Please Subscribes to my RSS Feed for updates and more

Rydertech

↑ Grab this Headline Animator


Subscribe via email

Enter your email address:

Delivered by FeedBurner
Your Email Will never be shared or Made Public

Related Posts Plugin for WordPress, Blogger...