Story image

Maximise threat prevention and network uptime with inline bypass

14 Jun 18

As a company’s tech stack becomes increasingly dense, security professionals have their work cut out for them to ensure that they are adequately protecting the network.

Network performance is getting higher and the number of security tools needed are overlapping and overcomplicating the task.

Security architects facing this conundrum have started to turn to inline bypass capability to manage this situation.

The integrated physical and logical inline bypass capability is a key component of the GigaSECURE Security Delivery Platform, enabling security administrators to maximise threat prevention, security resilience and network uptime.

Using this approach, security architects can stop tool sprawl, cut tool costs and significantly shorten the time required to roll out threat prevention initiatives. 

Inline tools can move from the perimeter into the core of the network where they can see the lateral movement of advanced threats.

This ensures that all assets in the inline security prevention stack are utilised to maximum potential.

It also guarantees resilience because in the event of an inline security tool failure, the GigaSECURE Security Delivery Platform detects it and redistributes traffic among the remaining healthy tools in that tool group.

Once the failed tool comes back, the platform can again begin forwarding traffic to the recovered tool for inspection.

The result of these capabilities is a system that is able to

  • consolidate and optimise security monitoring
  • seamlessly add, remove and upgrade security tools
  • migrate security tools between prevention and detection modes
  • integrate inline, out-of-band, flow-based tools and metadata
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
25% of malicious emails still make it through to recipients
Popular email security programmes may fail to detect as much as 25% of all emails with malicious or dangerous attachments, a study from Mimecast says.
Google Cloud, Palo Alto Networks extend partnership
Google Cloud and Palo Alto Networks have extended their partnership to include more security features and customer support for all major public clouds.
Using blockchain to ensure regulatory compliance
“Data privacy regulations such as the GDPR require you to put better safeguards in place to protect customer data, and to prove you’ve done it."
A10 aims to secure Kubernetes container environments
The solution aims to provide teams deploying microservices applications with an automated way to integrate enterprise-grade security with comprehensive application visibility and analytics.
DigiCert conquers Google's distrust of Symantec certs
“This could have been an extremely disruptive event to online commerce," comments DigiCert CEO John Merrill.