• Related Resources
  • Classrooms
    • SDN And The WAN
    • Designing The Hybrid Cloud

Lesson 1:


In this video, Burke explores the challenges and complexities of the growing threat surface and explains how adding new layers of security functionality can enable pervasive protection.

The Challenges Of
Network Security Monitoring

Lesson 2:


To deal with the enormous increase in data flowing into your security monitoring, you need to practice layered defense analysis. Learn why.

Security Monitoring:
Being Everywhere At Once

Lesson 3:


Learn how virtualization, cloud services, and mobility are changing how IT services are delivered to the business and what enterprises must do to protect their information assets.

The Changing Security Landscape

Lesson 4:


See how the new IT landscape and how technology innovation is changing the way IT is organized and how services are delivered to the business.

Pervasive Protection

Lesson 5:


Get practical advice for pervasive protection emphasizing your ability to become proactive, rather than reactive.

Practical Security
Monitoring Guidelines

Lesson 6:


Take our quiz

Quiz

Network Security Monitoring

This classroom explores why network pros need to add new layers to their security monitoring functionality to enable pervasive protection.

TOP

John Burke
CIO and Principal Research Analyst, Nemertes Research

John Burke is CIO and principal research analyst with Nemertes Research. With nearly two decades of technology experience, he has worked at all levels of IT, including end-user support specialist, programmer, system administrator, database specialist, network administrator, network architect and systems architect. He has worked at The Johns Hopkins University, The College of St. Catherine, and the University of St. Thomas.

TOP

Related Resources

TechTarget networking websites cover routing and switching, network security and management, application performance and delivery, VoIP, unified communications and collaboration, wireless LANs, Software Defined Networking, Wide Area Networks and mobility. SearchNetworking.com


Learn More
  • Essential Network Monitoring System Features for the Enterprise

  • Comparing Enterprise Network Monitoring Vendors

  • Combatting Network Threats: Look, Ma, No Firewall!

  • Network Security Basics: A Buyer's Guide

  • How A Network Security Overview Pays Dividends



TOP

Follow Us

15.4k
6.6k
2.5k

Contact Us

  • info@TechTarget.com
  • 275 Grove Street
    Newton, MA 02466
  • @TechTarget
  • (888) 274-4111