Remove Network Remove Network Security Remove VPN
article thumbnail

A new threat to network security has surfaced (and it’s not the quantum computer)

Juniper

Official Juniper Networks Blogs A new threat to network security has surfaced (and its not the quantum computer) The quantum computing era has officially arrived, which is a good thing. However, the bad news is that this new era also brings the ability to break current VPN encryption algorithms.

article thumbnail

Firewall as a Service and your biggest network security challenge

CATO Networks

We recently held a webinar focused on educating network professionals about Firewall as a Service (FWaaS). At the beginning of this webinar, we asked the audience what is your biggest challenge running distributed network security today? Using an MPLS network and routing the traffic over a reliable network.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Rethinking Enterprise VPN Solutions: Designing Scalable VPN Connectivity

CATO Networks

To keep business functioning as best as possible, enterprises need to provide secure remote connectivity to the corporate network and cloud-based resources for their remote workers. In the early days of Coronavirus lockdowns, some countries saw a surge in VPN use that more than doubled the typical pre-pandemic demand.

VPN 52
article thumbnail

How to Re-Evaluate Your Network Security Vendors | Part 2

CATO Networks

Welcome to the exclusive How to Re-Evaluate Your Network Security Vendors blog series! In this article, we will cover when you should re-evaluate your network security vendor. The first step in re-evaluating your security vendor is finding the optimal timing for it. When should you re-Evaluate your vendor?

article thumbnail

SDP/ZTNA vs. VPN

CATO Networks

Once Upon a VPN … In todays challenging reality, remote access has become a basic requirement for businesses of all kinds, sizes, and locations. An enterprises ability to shift to a work-from-anywhere model instantly, securely, and at scale, will determine how it will weather the COVID-19 crisis. Is VPN still relevant?

VPN 52
article thumbnail

Alternatives to VPN for Remote Access

CATO Networks

The most common enterprise remote access technology is Virtual Private Networking (VPN). A VPN client is installed on the users devices laptops, smartphones, tablets to connect over the Internet to a server in the headquarters. However, VPNs were built to enable short duration connectivity for a small subset of the users.

VPN 52
article thumbnail

Cato CTRL Threat Brief: CVE-2024-3661 – VPN Vulnerability (“TunnelVision”)

CATO Networks

On May 6 th , 2024, researchers from the Leviathan Security Group published an article detailing a technique to bypass most VPN applications, assigned as CVE-2024-3661 with a High CVSS score of 7.6. The attack requires introducing a rogue DHCP server to the local network.

VPN 52