Has Protecting Networks Reached The Point of Diminished Returns?

Listen to the Podcast

Charles Kolodgy, Research Director, Security Products for IDCCharles Kolodgy, Research Director, Security Products for IDC and Jim Doherty, Chief Marketing Officer and Senior Vice President for CipherOptics join the Lippis Report Podcast to discuss network defenses and threat mitigation strategies that are effective in protecting IT assets. Charles Kolodgy believes that “protecting the network?” has reached a point of diminished returns. He believes that the biggest vulnerability that exists in most of today?’s networks is “protecting data?”. Charles acknowledges that there are two aspects of data protection: “data at rest?” and “data in motion?”. While many companies are currently engaged in projects that provide protection for “data at rest?”, most are neglecting the “data in motion?” aspect of protection altogether. I talk with Charles and Jim about this and all agree that it?’s time to pervasively encrypt data in motion.

Purchase a Transcript of this Podcast: $125

We have many podcasts transcribed, however some we do not. In the case that your purchased podcast transcription is not available, a four day delay will occur. Thank you for your support.








Comments Off on Has Protecting Networks Reached The Point of Diminished Returns?

Posted in Cipheroptics, Network Security, Thought Leader Podcast Series

Event: Network Security 2.0: Global Data Security Best Practices

Visit the Link

Event: Network Security 2.0: Global Data Security Best Practices
Date and Time: Wednesday, October 3, 2007 2:00 pm Eastern Daylight Time
Panelist(s) Info: Dr. Larry Ponemon, chairman and founder of Ponemon Institute and Jim Doherty, Chief Marketing Officer, CipherOptics
Duration: 1 hour
Description: According to the most recent research by the Ponemon Institute, chances are you are sending your sensitive data in clear text across multiple networks all over the globe. Does that make you a little nervous? It should.

Use the link above to register with CipherOptics for this event.

Join Dr. Larry Ponemon and Jim Doherty, as they discuss the findings, trends and observations from the most recent research by the Ponemon Institute on the issue of network security, including personal insights and recommendations from the following industry veterans:

  • Jerry Archer, CSO of Intuit
  • John Reece, chairman and CEO of John C. Reece & Associates and former deputy commissioner of Modernization and CIO of the IRS
  • Gregory P. Schaffer, CISO, Alltel Communications
  • Howard Schmidt, CEO of R&H Security Consulting and former U.S. Cyber Security Czar, former CSO of Microsoft and eBay
  • David VanderNaalt, Chief Information Officer of the State of Arizona, former CISO of American Express

Comments Off on Event: Network Security 2.0: Global Data Security Best Practices

Posted in Cipheroptics, Network Security

Register with the Lippis Report and get instant, free access to thousands of industry white papers, case studies, presentations and podcasts.

Register Now. Existing User? Login.

Network Security 2.0

Get the White Paper

By CipherOptics

Network security is important in both the public and private sectors. Our nation’s critical infrastructure is dependent upon the secure and uninterrupted flow of sensitive information over the network. In short, the network is the conduit for conducting business in today’s global marketplace as well as ensuring our personal safety and security.

The purpose of this paper is to explain the importance of network security and data protection, the risks most organizations face today and how organizations can improve their ability to protect their critical information assets. The paper also discusses Ponemon Institute research findings about network and data security methods and technologies. These studies track the perceptions of IT security and data protection practitioners. Included in this paper are observations from a panel of five learned IT security experts.

How To Stop Cyber Crime From Ruining Your Company’s Reputation

Listen to the Podcast

Jim DohertyAccording to the International Crime Complaint Center or IC3 the number of cyber crime complaints has skyrocketed from a little over 6,000 in 2000 to over 1 million as of June of 2007 with a total dollar loss from these crimes, which are usually fraud, estimated at $647 million. Many of the complaints involve reports of identity theft, such as loss of personal identifying data, unauthorized use of credit cards or bank accounts, etc. The threat for corporations is that cyber crime not only steels its intellectual property and customer data, but its reputation and trust relationship with customers which have a much large material impact then the initial crime. I talk with Jim Doherty Chief Marketing Officer and Senior Vice President for CipherOptics about strategies to defend against cyber crime. This issue is too important not to listen to. Enjoy, Nick

Purchase a Transcript of this Podcast: $25

We have many podcasts transcribed, however some we do not. In the case that your purchased podcast transcription is not available, a four day delay will occur. Thank you for your support.








Comments Off on How To Stop Cyber Crime From Ruining Your Company’s Reputation

Posted in Cipheroptics, Podcasts, Unified Communication

Complete Guide for Securing MPLS Networks
Keep your company´s information secure wherever it goes.

Get the White Paper

By CipherOptics

Enterprises are demanding virtual private networks (VPNs) instead of costly leased lines and Ethernet and IP services instead of DS1 and DS3 services from their service providers. MPLS is now the best way for service providers to respond to those customer demands by providing Virtual Private LAN Services (VPLS), or Layer 2 MPLS VPNs, and IP VPNs, or Layer 3 VPNs. However, VPNs are limited in their ability to serve the growing security needs of enterprise networks. VPNs enable a separation of enterprise traffic over the same service provider network, but do not enable a secure communication between the remote VPN sites. In order to avoid any risk of losing data, having it accessed or otherwise compromised, enterprises need to take an active role in protecting their data in motion on shared MPLS networks.

Comments Off on Complete Guide for Securing MPLS Networks
Keep your company´s information secure wherever it goes.

Posted in Cipheroptics

Secure Information Sharing for Layer 2 Networks
How CipherEngine delivers security without complexity

Get the White Paper

By CipherOptics

Recent improvements have made Layer 2 WAN services a viable, scalable and cost-effective alternative to traditional WAN services. Extending LAN traffic across the corporate backbone at native speed is welcomed as application performance is significantly improved. While there are many Layer 2 services available such as Metro-Ethernet, Virtual Private LAN Services (VPLS) and private Ethernet Line Services, all require encryption services to protect corporate IT assets.

Comments Off on Secure Information Sharing for Layer 2 Networks
How CipherEngine delivers security without complexity

Posted in Cipheroptics, Enterprise Mobility

Data Encryption is Going to be Everywhere

Listen to the Podcast

Ron WillisProtecting data in “motion” has become top of mind for most IT executives as they look to close network security vulnerabilities and protect communications. Being able to meet regulatory compliance requirements is also driving encryption sales. Encryption has come a long way as users would pay the encryption penalty of delaying traffic as data passed through encryption devices. But thanks to faster ASCIS this penalty has been all but eliminated. Ron Willis, CEO of CipherOptics joins the program to discuss the encryption market. Enjoy, Nick

Comments Off on Data Encryption is Going to be Everywhere

Posted in Cipheroptics, Network Infrastructure, Network Security

Securing Data Transmission on Metro Ethernet Networks

Get the White Paper

This paper provides key strategies for securing data in motion while in transit over Ethernet networks. It provides authentication, confidentiality and integrity tactics for layer 2 and 3 Metro Ethernet networks. Protecting data in motion using industry standard encryption and hashing protocols such as IPSec and AES or 3DES to provide layer 3 and 2 are explained and explored in this paper providing the reader insight into network security design options.

Encryption Penalty Eliminated with CipherOptics Ethernet Security Gateway

Listen to the Podcast

Scott Palmquist joins the program to discuss the network encryption market and CipherOptics’ new Ethernet Security Gateway. Protecting data in “motion” has become top of mind for most IT executives as they look to close network security vulnerabilities. There’s a great discussion on layer 2 versus layer 3 encryption, protecting data in motion versus at rest, where to apply encryption and the elimination of the encryption performance and latency penalty. Enjoy, Nick

15 Minutes to Complete Data Protection

Get the White Paper

CipherOptics, the leaders in protecting data in motion offers a strategy for data encryption as it propagates throughout a network. Many corporations do not recognize the vulnerability that exist in using unsecured public transport services such as MPLS, frame relay, broadband etc. In short, data or intellectual property is unprotected as it leaves the corporate LAN over wide area transport and can be compromised. In this white paper learn the best practice of data encryption.

Comments Off on 15 Minutes to Complete Data Protection

Posted in Cipheroptics

Best Practices for Protecting Network Data

Get the White Paper

If you care about protecting data as it flows throughout your network, then you should read this best practice whitepaper from CipherOptics, the experts in encryption appliances. The paper provides practical advice for encrypting data without the problems of latency and throughput that hamper IPSec solutions at 100M and 1Gb speeds.The Transparent In-Line Encryption Architecture or (TILEA) encryption architecture is reviewed and explained. It´s a quick read too.

CipherOptics Marrying Enterprise-Wide Data Protection to Business Needs – Building the Security Utility

Get the White Paper

When it comes to protecting the confidentiality and integrity of information, today’s networks are way behind. Encryption remains a complex mess of piece parts technologies based upon protocols and applications. To accommodate new business demands, large organizations need an enterprise-class encryption model that Enterprise Strategy Group (ESG) calls Agile Network Encryption (ANE). Though ANE is a vision today, Cipheroptics is doing an excellent job of articulating this vision and building screaming encryption products to meet short-term enterprise needs.

Comments Off on CipherOptics Marrying Enterprise-Wide Data Protection to Business Needs – Building the Security Utility

Posted in Cipheroptics, Lippis Report, Network Infrastructure, Network Security

CipherOptics Launches SG1002 Encryption Appliances

Listen to the Podcast

Nick Lippis interviews Brandon Hoff and Katie Dunn on the state of the network security market, data security and the launch of CipherOptics’ new 1Gb SG1002 IPSec encryption appliance. There´s a great discussion in this podcast, on scaling tactics for securing encrypted end-to-end networks versus tunnels. Also issues such as key and policy management and secure domains are explored.

Comments Off on CipherOptics Launches SG1002 Encryption Appliances

Posted in Cipheroptics, Network Infrastructure, Network Security, Podcasts