TMCnet News

Research and Markets: Hybrid Networks: The 21st Century Enterprise Network Reality Requires Concurrent Protection across Three Environments
[September 01, 2015]

Research and Markets: Hybrid Networks: The 21st Century Enterprise Network Reality Requires Concurrent Protection across Three Environments


Research and Markets (http://www.researchandmarkets.com/research/3dq76l/hybrid_networks) has announced the addition of the "Hybrid Networks: The 21st Century Enterprise Network Reality Requires Concurrent Protection across Three Environments" report to their offering.

This week's SPIE discusses evolving enterprise network topologies, and the resulting security concerns, with an emphasis on hybrid networks. Hybrid networks are also discussed from the perspective of the 3 tenets of security: visibility, control, and predictability.

Information and network security was much easier in the early stages of computing. The majority of computer system users only had one password, and that password could only be used in one place - at a stationary workstaton within the physical confines of his or her place of employment. The risk of them providing inappropriate access to those with nefarious purposes was rather low.



As the information age developed, the world changed. User populations have expanded exponentially, and users access numerous distinct systems in their work and personal lives. Furthermore, system access is no longer bound to a single location or dedicated workstation. Thanks to the Internet's reach, users access systems from anywhere, with any browser-enabled device. Certified line-of-sight observation of who is requesting system access is all but gone. Moreover, the Internet has also introduced a higher risk of identity theft via phishing schemes and keyboard logging malware. percent ( %) of data breaches exploited weak or stolen credentials, according to the Verizon (News - Alert) 2013 Data Breach Investigations Report. Ninety-five percent (95%) of Web application attack incidents involve harvesting credentials stolen from customer devices; then, logging into Web applications with them, according to the Verizon 2015 Data Breach Investigations Report.

Key Topics Covered:


  1. Introduction
  2. A 21st Century Reality Requires Concurrent Protection across Three Environments
  3. 21st Century Security Based on Three Tenets

For more information visit http://www.researchandmarkets.com/research/3dq76l/hybrid_networks


[ Back To TMCnet.com's Homepage ]