Next-Generation Network Security: A Buyers’ Guide

Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.

Resource Details

Cisco Systems logo
Provided by:
Cisco Systems
Topic:
Security
Format:
PDF