The new rulers of the cybersecurity realm: Automation, Analytics Artificial Intelligence

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Network Architecture Alert

Dec 20, 2016
Featured Image

Cisco execs foretell key 2017 enterprise networking trends

Interesting posts this week from a few Cisco executives taking a look forward into what should be a very interesting networking world in 2017. +More on Network World: 5 enterprise technologies that will shake things up in 2017+ First up was Cisco’s Jeff Reed, Senior Vice President Enterprise Infrastructure and Solutions Group who had a blog on the top 10 list for future 2017 network trends. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The new rulers of the cybersecurity realm: Automation, Analytics Artificial Intelligence
What to expect from Cisco's competitors in 2017
10 examples of the AWS path of disruption
The beginning of the end for enterprise network VLANs
Sorriest technology companies of 2016
Citrix is building your workspace of the future
Worm on the sensor: What happens when IoT data is bad?

White Paper: Presidio

Cloud Consulting and Integration Services: Enabling a Hybrid World to Accelerate Business Outcomes

Realize the full benefit of cloud. Sequioa Cloud Solutions consulting and integration teams have deep-domain knowledge with a variety of cloud technologies from industry leaders. Our focus is to provide solutions to architect the optimal way to leverage both private and public cloud resources and to integrate the right cloud solution that will deliver scalable, secure, high performing service delivery models for our clients. Read More

Thumbnail Image

The new rulers of the cybersecurity realm: Automation, Analytics Artificial Intelligence

So what technologies are going to change this scenario back in favor of IT? The new security AAA: Automation, analytics and artificial intelligence say proponents. When it comes to automation, security platforms will devise and execute controls based on newly detected threats and do it without human intervention. That reduces the time between a compromise and the time the threat is neutralized – reducing the time window when attackers can do damage. Read More

Thumbnail Image

What to expect from Cisco's competitors in 2017

Cisco is in a strong position for 2017, but the company’s competitors won’t simply allow it to take market share. Read More

Thumbnail Image

10 examples of the AWS path of disruption

$13 billion later …. Read More

Thumbnail Image

The beginning of the end for enterprise network VLANs

We can look forward to a day when configuring and maintaining VLANs is no longer a fact of enterprise life. Read More

Thumbnail Image

Sorriest technology companies of 2016

You won’t be sorry for spinning through our review of public apologies issued by tech organizations, from Microsoft to Apple to Facebook to Samsung, in 2016. Read More

Thumbnail Image
INSIDER

Citrix is building your workspace of the future

Citrix CEO Kirill Tatarinov – one year after taking over from long-time leader Mark Templeton – is working to show how all the company’s pieces play together in making Citrix the focal point of the ‘workspace of the future’ for nimble enterprises. Read More

Thumbnail Image

Worm on the sensor: What happens when IoT data is bad?

Bad data is common in IoT, and though it’s hard to get an estimate of how much information streaming in from connected devices can’t be used, a lot of people are thinking about the problem. Read More

Video/Webcast: SolarWinds

IT Security: Why One Layer of Defense is Not Enough

As an IT pro, you know that there has been a substantial change in the number and type of threats that are being unleashed against organizations of all sizes. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Up close with Google Wifi's setup process

2016: The year of tech products nobody wanted Read More

Most-Read Stories

1. Mom discovered twin daughters’ bedroom being streamed via live camera viewer
2. 14 eyebrow-raising things Google knows about you
3. 19 free cloud storage options
4. Non-malware attacks are on the rise
5. 7 free tools every network needs
6. Riverbed stabs at Cisco’s heart with next-gen routing
7. Citrix is building your workspace of the future
8. Lessons learned from the 7 major cyber security incidents of 2016
9. A fix for the OS X Black Screen of Doom
10. Help light an IPv6-enabled Christmas tree
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Network Architecture Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.