Network Security: The Starting Point

The 2018 State of Infrastructure Report from Interop ITX and InformationWeek revealed that network security is the mainspring for future network investments.  

A brief overview on terms:

When you think IT security, it’s comprised of a company’s security of servers, applications (cloud and workloads), devops, unified communications and the network. And it’s the network that acts as the central hub, enforcing policy across other department’s administrators. A subset of cybersecurity, network security is focused on integrity of network and data sent through devices within the network. Cybersecurity protects internet-connected systems which includes hardware and devices, software, and data both in storage and transit from attacks. Cybersecurity falls under the category of Information Security which is the umbrella term for process and functions used to protect all sensitive data.

Network security prevents against hacking and unauthorized access, protecting the IT infrastructure. Network-based security tools are the lynchpin to all innovation and cloud implementation going forward. Without adequate network security, the protection of files and company directories, the enterprise will forever be vulnerable as new employees, devices and software gets added.

Network security is the start of any organization’s prevention and reaction strategy, it’s multiple layers of defense at the edge and within the network. Proper network security protocols protect data sent through devices on the network. As we all face more frequent and advanced threats like VIP spoofware where outsiders pose as a high profile within the company and send emails to other employees, or viruses, worms/Trojan horses, zero-day attacks, hackers, denial of service attacks and spy/adware, we will see internal network security professionals turning to outside help for intrusion detection, encryption, firewalls and digital certifications and updates that they can’t keep up with.

Layered security software, management and programs will increase in popularity this year—think mobile device management (MDM), Desktop as a Service (DaaS), advanced software or hardware for IoT sensors. Managed network security will rise as tedious and long updates to intrusion prevention systems, website white and blacklisting jobs become more than an internal staff can handle. It’s important to build a sound network security strategy before adding on additional layers of defense.

Innovative Network Security

Hardware and software solutions that protect the underlying network and satisfy security functions like: UTM, IDP/IPS, network sandboxing, DNS security, DDoS, messaging security, web security and VPN include:

  • Next-generation firewalls
  • Network-based content inspection
  • Network-connected device management
  • Threat visibility platforms
  • Network and endpoint security sync products – end point threat detection and network remediation
  • Security management and policy platforms. Examples are orchestrators that help with service chaining and policy management for traffic flows between network devices
  • Data encryption services
  • Application frameworks- for security providers to build cloud-based apps
  • Unified or single security platforms which include technology for network appliances, mobile, cloud and threat prevention


Download the Battlecards

Security battlecards are available on the following security solutions. Battlecards include:

  • Solution overview
  • What to look for in the field
  • Discovery questions
  • Debunking common myths
  • Solution add-ons
  • Top suppliers


thumb-BATTLE-DDoS thumb-BATTLE-ManagedFirewall thumb-BATTLE-EndpointSec thumb-BATTLE-PenTesting


As Director of Marketing at TBI, Cohen is responsible for managing TBI’s marketing communications and implementing multi-channel branding and press strategies. In addition to driving TBI’s overall marketing strategy, Cohen directs both internal and external communications to ensure the delivery of valued products and programs to providers and partners alike. You can contact Corey at or connect with her on LinkedIn.