Severin Collins

Severin Collins is an information and network security professional with 15+ years' experience. As a security professional he has in-depth knowledge on various network and information security technologies, risk and vulnerability assessment, open source and commercial solutions from vendors like:

  • ActivIdentity (Authentication)
  • Borderware (Firewall, VPN)
  • Check Point (Firewall, SSL VPN, Endpoint Security, DLP)
  • F-Secure (Endpoint & Content Security)
  • Firemon (Firewall Monitoring & Compliance)
  • IBM Internet Security Systems (IDS, IDP, Audit)
  • HP ArcSight (SIEM)
  • Juniper (Firewalls, VPN, SSL VPN)
  • Kaspersky (Endpoint & Content Security)
  • LogLogic (SIEM)
  • LogRhythm (SIEM)
  • McAfee (Security Connected Portfolio)
  • Nessus (Audit)
  • Netscreen (Firewall, VPN)
  • Palo Alto Networks (Firewall, VPN)
  • RadWare (Load Balancing)
  • RadGuard (VPN)
  • Rapid 7 Metasploit & Nexpose (Audit)
  • RSA Security (Authentication, PKI, SIEM)
  • SafeNet (VPN)
  • Sentrigo Hedgehog (now McAfee Database Security Security)
  • Splunk (Log Management & SIEM)
  • Symantec (Endpoint Security, Firewall)
  • TrendMicro (Endpoint & Content Security)
  • Trustwave (WAF, SIEM)
  • Watchguard (Firewall)
  • ...

What is information and network security?

It can simply be protecting your equipment and files from disgruntled employees, spies, and anything that goes bump in the night, but there is much more. Information security helps ensure that your computers, networks, and peripherals work as expected at all times, and that your data is safe in the event of hard disk crash or power failure. Information security also makes sure no damage is done to your data and that no one is able to read it unless you want them to.

People often represent the weakest link in the information security chain and are chronically responsible for the failure of security systems.

If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology.

Enacting policies and procedures simply won't suffice.