Firewalls

Architecture-based, futuristic security to rule in 2018: Bhaskar Bakthavatsalu, Check Point

CISOs will transition from a point product solutions approach to ‘Framework & Security Consolidation’ approach says Bhaskar Bakthavatsalu, MD, Check Point, India & SAARC.

Proactive protection is the best shield for CISOs: Nilesh Jain, Trend Micro

"We are primarily focused to deliver proactive protection to customers across server security, endpoint security and network security", says Nilesh Jain, Vice President – South East Asia and India, at Trend Micro India. 

Multi-cloud strategy is the new normal: Sharad Sanghi, Netmagic

Managing hybrid cloud and multi-cloud deployments remain our biggest strength, says Sharad Sanghi, MD & CEO, Netmagic Solutions.

The most sought after cybersecurity skills in 2018

The ever-evolving threat landscape has made it imperative for security professionals to stay on top of the latest security tools. Here’s a look at the most sought after cybersecurity skills in 2018

Security budgets of Indian organizations: Where is it heading?

The perpetual catch up game between hackers and CISOs is resulting in a steadily rising cybersecurity budget. We take a look at what’s driving this trend and assess the security roadmap in 2018.

Emerging technologies to combat new age threats

Given the new age threat landscape, CIOs and CSOs across the board can no longer bank upon a fortified periphery that would protect the organization’s crown jewels.

What is microsegmentation? How getting granular improves network security

Microsegmentation is a way to create secure zones in data centers and cloud deployments that allow you to isolate workloads and protect them individually.

Rise of BYOD, BYOA adds to network security woes across organizations: Fortinet

Fortinet advises CISOs to mitigate risks from BYOD and BYOA by implementing a ‘layered’ cybersecurity approach with increased visibility

Partner Content
Make way for SDP

Drawing the analogy to the modern-day network managers, you can’t manage the network you can’t see.

Partner Content
Fortinet avails OT security solution for critical infrastructures

The Fortinet security fabric enables industrial organizations to deliver advanced segmentation, access control, and malware protection.

What is Zero Trust? A model for more effective security

The technologies that support Zero Trust are moving into the mainstream. Here's why security experts say it might be the best way to stop data breaches.

People, data and network are constants for modern enterprise: George Chang, Forcepoint

To understand and tackle issues of cybersecurity, enterprises must first decode the intersection of users, data and network, says George Chang, Head–APAC, Forcepoint.