Network security
With the growth of malware and data breaches, enterprises must ensure their networks -- and the applications and traffic on those networks -- are secure. Learn about important network security strategies and technologies, such as VPNs, Secure Access Service Edge (SASE), zero trust and software-defined perimeter (SDP).
Top Stories
-
Tutorial
21 Nov 2024
How to test firewall rules with Nmap
Using Nmap to identify potential shortfalls in the rules used to govern firewall performance gives teams an easy and cost-effective way to plug holes in their security frameworks. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Tip
18 Nov 2024
What CISOs need to know to build an OT cybersecurity program
More companies are tasking CISOs with operational technology security. But this oversight means a new strategy for those unfamiliar with building an effective OT security program. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
- Sharon Shea, Executive Editor
-
Tip
07 Nov 2018
Using AI, machine learning in networking to improve analytics
The barrage of alerts modern network analytics tools create is problematic, but the capabilities advanced tech like AI provides can help ease the burden to network operations. Continue Reading
-
Answer
02 Nov 2018
How do last-mile connections work for SD-WAN deployments?
SD-WAN technology plays well with existing last-mile connections, and it allows enterprises to use more than one type of transport link. But beware of provider sprawl. Continue Reading
By- John Burke, Nemertes Research
-
Tip
29 Oct 2018
11 common wireless security risks you don't have to take
Wi-Fi is a boon to productivity, but it can also create serious security issues. Learn how any company can uncover and fortify their wireless security setup. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Answer
24 Oct 2018
What is a long-tail DoS threat, and how does it target web apps?
Fine-grained application monitoring can defend against a long-tail DoS threat. This new kind of vulnerability manipulates service queues within a web application. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
News
12 Oct 2018
ONUG conference to highlight cybersecurity and data protection
At the ONUG fall conference on Oct. 22 to 23, attendees will learn how enterprises can secure assets in a digital economy and how automation, cybersecurity and data protection fit in. Continue Reading
By- Jennifer English, Executive Editor
-
News
11 Oct 2018
Patched MikroTik router vulnerability worse than initially thought
Tenable Research finds new exploits of an already patched MikroTik router vulnerability that could enable hackers to launch remote code execution attacks. Continue Reading
By- Madelyn Bacon, TechTarget
-
Blog Post
03 Oct 2018
Palo Alto Networks adds cloud analytics with RedLock acquisition
It's fair to say the cloud has become a core component of most organizations' IT strategies. The growth of public cloud services -- such as Amazon Web Services (AWS), Microsoft Azure and Google ... Continue Reading
By- Zeus Kerravala, ZK Research
-
News
27 Sep 2018
Network security challenges remain a top concern for IT pros
In networking news, security remains a top concern for IT pros; ExtraHop integrates with Microsoft Azure; and Barefoot Networks unveils developer tools for programmable ASICs. Continue Reading
By- Michaela Goss and Luke O'Neill
-
News
17 Sep 2018
Are SD-WAN security concerns warranted?
Networking analysts and engineers examine SD-WAN security concerns, the importance of cabling in wireless environments and a new security attack that's difficult to detect. Continue Reading
By- Chuck Moozakis, Editor at Large
-
News
30 Aug 2018
VMware takes NSX security to AWS workloads
VMware has brought NSX microsegmentation to workloads running on Amazon Web Services. Also, at VMworld 2018, VMware said NSX security is now enforceable on Arista switches. Continue Reading
By- Antone Gonsalves, News Director
-
Tip
22 Aug 2018
How has software-defined networking security evolved?
Software-defined networking security means more than just microsegmentation. Enterprises can also use SDN to assign security zones, improve monitoring and help with automation. Continue Reading
By- John Burke, Nemertes Research
-
Tip
22 Aug 2018
Find network security vulnerabilities by assessing risk
IT staff needs to regularly review network security vulnerabilities and security gaps to battle rising cybersecurity breaches and keep costs under control through risk assessments. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
News
03 Aug 2018
Cisco bolsters cloud security with Duo acquisition
Cisco has bought Duo Security to add its two-step authentication services to Cisco's cloud-based security offerings. Cisco plans to close the Duo acquisition by October. Continue Reading
By- Antone Gonsalves, News Director
-
Tip
02 Aug 2018
How hackers use idle scans in port scan attacks
Hackers exploit port scan attacks to mask their identities before launching an attack. One of their favorites: the idle scan. Continue Reading
By- Fernando Gont, SI6 Networks
-
Opinion
23 Jul 2018
New details released on Huawei's intent-based network
ZK Research offers details on Huawei's new Intent-Driven Network and what its hardware and the software can do to smooth network glitches and even raise security. Continue Reading
By- Zeus Kerravala, ZK Research
-
Tip
18 Jul 2018
Understanding the exploit market: How data breaches happen
When you understand how data breaches happen, applying software patches quickly is crucial to minimize your chances of being on the wrong end of the ever-faster exploit market. Continue Reading
By -
Tip
05 Jul 2018
Four ways to improve network security for modern networks
The green padlock on websites doesn't improve network security, so our expert addresses four ways to secure the modern network that move beyond the castle-wall analogy. Continue Reading
By -
News
26 Jun 2018
Tempered Networks extends reach of NAC software
Tempered Networks has extended the reach of its network access control technology. The company has introduced NAC software for IoT, Google Cloud and Microsoft Azure. Continue Reading
By- Antone Gonsalves, News Director
-
Tip
25 Jun 2018
Is NaaS the answer to bolster network infrastructure security strategy?
Network security as a service can be a beneficial part of a network infrastructure security strategy, but you have to ask the right questions. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
News
12 Jun 2018
Hybrid cloud security architecture requires rethinking
Enterprises need a centralized approach when considering a hybrid cloud security architecture, an analyst says. Plus, is user experience management an IT responsibility? Continue Reading
By- David Harbeck, Editorial Assistant
- 01 Jun 2018
-
E-Zine
01 Jun 2018
DevOps in networking begins to gain ground
Software development has benefited from a DevOps framework, which brings together software engineers and operating teams to collaborate in a continuous integration/continuous delivery model that helps automate and deploy code faster. DevOps in networking, however, is still an emerging concept. Many networks are still managed and updated using heavily manual processes.
In this issue of Network Evolution, find out how network virtualization and automation are leading enterprises to consider whether they can manage their networks through DevOps methodologies. As more network elements become software-driven, organizations will see a shift to DevOps in networking.
In addition to an emerging DevOps approach, the software-driven network brings with it a slew of new technologies and approaches to understand. From software-defined networking and software-defined WAN to network functions virtualization and virtual network functions, network professionals have to wade through options aimed at changing everything about how networks are built and managed. Read on as we sort out the subtle differences among these technologies.
And as virtualization enhances network design, it also makes the network a more attractive target for hackers. We also look at what security tools and services enterprises are investing in to boost network security in the cloud.
Finally, read how the Broward Center for the Performing Arts is using cloud-based network monitoring to keep its theater in the spotlight.
Continue Reading -
Feature
01 Jun 2018
Enterprises use network security in the cloud to combat threats
The market for network security in the cloud is growing as enterprises shift workloads to the cloud to combat potential data breaches and system threats. Continue Reading
By- Jean DerGurahian, Features and E-Zine Editor
-
News
30 May 2018
Cato's network security feature on the hunt for threats
Cato Networks added a network security feature that detects and identifies threats within customer networks. The capability is built into Cato's SD-WAN platform, Cato Cloud. Continue Reading
By- Jennifer English, Executive Editor
-
Feature
09 May 2018
Growing CDN services market changes to meet cloud needs
Enterprises looking for greater network performance and scalability turn to traditional CDN services providers for nontraditional help to improve security and offer access to APIs. Continue Reading
By- Jean DerGurahian, Features and E-Zine Editor
-
News
03 May 2018
Why hybrid cloud data protection is so crucial
This week's roundup of analyst musings includes discussions about the importance of hybrid cloud data protection and whether it's beneficial to strike a work-life balance. Continue Reading
By- Chuck Moozakis, Editor at Large
-
Answer
26 Apr 2018
How can I prevent a DDoS attack program?
DDoS programs overwhelm networks with a torrent of requests. How can you prevent a DDoS attack, and what are the steps you can take to keep your networking environment secure? Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
News
20 Apr 2018
Router security options advised following U.S. hacker alert
A rare government alert that Russian hackers are targeting routers in the United States and the United Kingdom has security experts debating router security options. Continue Reading
By- Antone Gonsalves, News Director
-
Feature
11 Apr 2018
Gordon: Trends driving network access control systems
Pulse Secure executive Scott Gordon cites industry trends driving the vendor's new product launch and how endpoint security is driving shifts in network access control systems. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
News
09 Apr 2018
Russian hackers target opening in Cisco switch security
Russian hackers are suspected of targeting a utility flaw to bypass Cisco switch security and penetrate enterprise networks and critical U.S. infrastructure. Continue Reading
By- Antone Gonsalves, News Director
-
News
04 Apr 2018
Integrate endpoint management systems for better security
This week, networking bloggers discuss combining endpoint management systems with security, thorny wireless devices and the logic of an IXP atop a VXLAN infrastructure. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
News
03 Apr 2018
Juniper Security Director helped by Cyphort analytics
Cyphort analytics is now a part of Juniper Security Director. Juniper has introduced integration between the policy manager and the Cyphort security software acquired last year. Continue Reading
By- Antone Gonsalves, News Director
-
News
12 Mar 2018
Aryaka adds new security layers to global private network
Through security partnerships, Aryaka's Passport platform offers six security layers to provide additional protection in case one layer becomes vulnerable. Continue Reading
By- Jennifer English, Executive Editor
-
News
06 Mar 2018
Cisco adds malware security features in Tetration analytics
Cisco has turned Tetration analytics toward app security. The latest upgrade helps spot software flaws and identify malware activity, such as Spectre and Meltdown exploits. Continue Reading
By- Antone Gonsalves, News Director
-
News
01 Mar 2018
Cisco tracks growing role of machine learning, AI in cybersecurity
Cisco highlights the growing role of automation, machine learning and AI in cybersecurity, increasing the target of investments by IT departments working to mitigate malware. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
Answer
01 Mar 2018
What security is needed for digital assistant devices?
How should cybersecurity-enforcement efforts adapt as digital assistant devices become more pervasive in business enterprise networking to safeguard corporate data? Continue Reading
By- Julian Weinberger, NCP engineering
-
News
23 Feb 2018
What are the top information security objectives for CISOs?
Bloggers delve into CISO information security objectives, Juniper's new product release and how self-sufficient networking teams should try to be in an area of increasing complexity. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
News
16 Feb 2018
Making the most of incident detection and response
This week, bloggers look into incident detection strategies, a new anomaly detection tool from ExtraHop and how Ethernet VPN differs from virtual private LAN service. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
News
13 Feb 2018
ExtraHop intros Reveal(x) cybersecurity analytics software
ExtraHop fortifies its packet capture platform with cybersecurity analytics software, Reveal(x); Mist introduces a virtual network assistant powered by artificial intelligence. Continue Reading
By- Chuck Moozakis, Editor at Large
-
News
31 Jan 2018
What is happening with AI in cybersecurity?
This week, bloggers focus on the growing role of AI in cybersecurity, achieving simple, stable networks and running EVPN in a single data center fabric. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
Feature
31 Jan 2018
SD-WAN security remains customer and vendor focus
Most SD-WAN vendors offer common features when it comes to SD-WAN security, but some tout security differentiators embedded in their services. Continue Reading
By- Jennifer English, Executive Editor
-
Answer
22 Jan 2018
How can you use perfect forward secrecy for mobile security?
How can companies increase data protection in mobile communications environments and enhance perfect forward secrecy to safeguard user activity? Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
News
16 Jan 2018
Cybersecurity skills shortage continues to worsen
This week, bloggers explore the cybersecurity skills shortage, the challenges of deploying edge computing and how best to mitigate Meltdown in a software-centric environment. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
News
11 Jan 2018
No need to rush network patching for Spectre and Meltdown
Security experts said Spectre and Meltdown pose a low risk to corporate networking gear. Nevertheless, vendor patches should be applied following thorough testing. Continue Reading
By- Antone Gonsalves, News Director
-
News
04 Jan 2018
Cisco ETA security integrated into Catalyst, ASR, ISR
Cisco has integrated Encrypted Traffic Analytics into Catalyst switches and ASR and ISR routers. Cisco ETA searches encrypted traffic for malware activity. Continue Reading
By- Antone Gonsalves, News Director
-
Feature
15 Dec 2017
Three reasons to implement an NAC system
The growth in devices on the network has heightened the need for network access control products. This article presents scenarios where an enterprise might need an NAC system. Continue Reading
By -
Opinion
01 Dec 2017
The future of networking technology is playing out right now
To prepare for the future of networking technology, IT managers must understand evolving concepts like hyper-convergence, SD-WAN and intent-based networking. Continue Reading
By- Jean DerGurahian, Features and E-Zine Editor
-
News
30 Nov 2017
Aporeto app security uncoupled from network infrastructure
Aporeto app security startup has introduced security software that achieves scale by decoupling application security from the network infrastructure of a hybrid cloud environment. Continue Reading
By- Antone Gonsalves, News Director
-
Tip
08 Nov 2017
Need help making Wi-Fi secure? Consider some 'classic' approaches
Keeping your Wi-Fi secure is a challenge, to say the least. Security hasn't kept up with Wi-Fi advances, but there are steps you can take to keep your Wi-Fi network protected. Continue Reading
By -
News
03 Nov 2017
What endpoint security systems do companies need?
This week, bloggers look into advances in endpoint security systems, achieving greater functionality with AirCheck G2 and the continued role of the command-line interface in an API era. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
News
13 Oct 2017
Cybersecurity evolution brings shifts for network security
Bloggers explore cybersecurity evolution and its impact on network security, new network fabrics from Extreme and take a deep dive on routing protocols, such as BFD. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
News
20 Sep 2017
Aruba launches 360 Secure Fabric user behavioral analytics system
Artificial intelligence and machine learning are key components of the newly launched Aruba 360 Secure Fabric user behavioral analytics security software. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
News
07 Sep 2017
VMware network security improves with AppDefense launch
Bloggers examine AppDefense -- a new VMware network security offering -- and look into synchronizing BGP and OSPF, as well as the capabilities of new Savvius analytics. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
News
30 Aug 2017
VeloCloud's SD-WAN security program adds more partners
VeloCloud introduced new members to its SD-WAN security program, while Canonical Ltd. and SnapRoute combine technologies to develop an integrated white box switching stack. Continue Reading
By- Jennifer English, Executive Editor
-
Feature
25 Aug 2017
Learn what network access control systems can do for you
Network access control systems keep rogue or compromised devices off of corporate networks. See how they work and the other security technologies with which they work. Continue Reading
By -
News
18 Aug 2017
WatchGuard launches new firewall appliances, 5G focus of MWC
Bloggers examine WatchGuard firewall appliances, explore transparency as a vendor virtue and assess the role of 5G in future SD-WAN deployments. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
News
28 Jul 2017
2017 cybersecurity trends at the Black Hat conference
This week, bloggers look into 2017 cybersecurity trends leading up to the Black Hat conference, Movidius deep learning and Mist's approach to WLAN. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
News
27 Jun 2017
Cisco and Apple alliance deepens, targets security and Wi-Fi projects
With Cisco's Ericsson partnership on hold for now, the Cisco and Apple CEOs hinted at joint work on Wi-Fi and security at Cisco annual customer conference. Continue Reading
By- Antone Gonsalves, News Director
-
Answer
08 Jun 2017
How to cut false security, malware alerts in hybrid cloud
The bad news: IT teams are deluged by false security and malware alerts with their hybrid clouds. The good news: New tools are here to help. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
News
11 Apr 2017
VeloCloud introduces SD-WAN security partnership program
VeloCloud introduced a partner program that lets security vendor partners develop integrated SD-WAN security services. Current partners include Fortinet, IBM Security and Check Point. Continue Reading
By- Jennifer English, Executive Editor
-
News
28 Mar 2017
Session stickiness in the race for load-balancer performance
This week, bloggers look into load-balancer performance, congressional changes to ISP rules and software-defined perimeters. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
News
15 Mar 2017
Assessing the Google Cloud security strategy
This week, bloggers assess the Google Cloud security strategy, Cisco's lessons from OpenStack and Arista's new containerized network operating system. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
News
09 Mar 2017
New York cybersecurity regulations could have big impact nationwide
This week, bloggers assess the effect of New York cybersecurity regulations, whether the network edge will grow in importance and how customers create complexity. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
Tip
09 Feb 2017
Cloud security tips to consider when mulling external data centers
The old security rules don't apply when moving workloads to the cloud. These cloud security tips will help you make the right decision. Continue Reading
By- Michael Gregg, Superior Solutions, Inc.
-
News
05 Jan 2017
Looking at cybersecurity initiatives in 2016 and 2017
This week, bloggers explore cybersecurity initiatives, Google Compute Engine and new Versa SD-WAN options. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
News
11 Nov 2016
President-elect silent on federal cybersecurity policies
This week, bloggers look ahead to the new administration's cybersecurity policies, how to close gaps in app delivery management and the best way to optimize data centers. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
News
26 Oct 2016
Why one Gartner analyst is 'not sorry' about DDoS attack program
This week, bloggers look into the DDoS attack program that leveraged IoT devices, Webscale's cloud-resource-allocation platform and alternative views of digital transformation. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
News
24 Aug 2016
IT professionals aim to operationalize threat intel in the enterprise
This week, networking bloggers look into operationalizing threat intel, Google Fiber's deployment and home lab spending. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
News
11 Jul 2016
Cisco lifts branch security with latest software release
Cisco introduced at its Live conference branch security software for the ISR router. The networking company also improved malware protection in the Meraki MX appliance. Continue Reading
By- Antone Gonsalves, News Director
-
News
30 Jun 2016
CloudLock to make Cisco security portfolio better at cloud security
Cisco spends $293 million on technology that secures mobile users' access to the cloud. It's the latest addition to the Cisco security portfolio. Continue Reading
By- Antone Gonsalves, News Director
-
News
29 Jun 2016
Using microsegmentation to create a secure communication channel
This week, bloggers look at a startup using microsegmentation to create a secure communication channel, FireEye and customized managed network services. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
News
02 Jun 2016
SS8 takes new approach to cyberthreat intelligence
SS8 launches BreachDetect, a Layer 7 'time machine' for breach detection in enterprises and a new addition to the cyberthreat intelligence marketplace. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
News
26 Apr 2016
Juniper provides container firewall to banks, cloud
Juniper Networks has added a container firewall to its SRX portfolio. The latest product provides container protection for banks, carriers and cloud providers. Continue Reading
By- Antone Gonsalves, News Director
-
News
29 Feb 2016
Versa Networks updates software-defined security offerings
Versa Networks says new security features will help providers create safer branch networks; SDN could make medical devices more secure; and Aryaka claimed two SDN-related patents. Continue Reading
By- Alissa Irei, Senior Site Editor
-
News
14 Jan 2016
Patch offered for breach in Juniper firewalls
This week, a patch becomes available for Juniper firewalls, analysts parse IT employment statistics for 2015 and Aruba deploys 802.11ac for the U.S. Army. Continue Reading
By- Eamon McCarthy Earls, Former Associate Site Editor, TechTarget
-
Buyer's Guide
15 Dec 2015
Network security basics: A Buyer's Guide
Getting network security basics right is critical. This SearchNetworking Buyer's Guide helps you purchase the best products for your enterprise. Continue Reading
-
Feature
16 Nov 2015
Blue Coat ProxySG: Secure Web gateway overview
With features like authentication and Web filtering, the Blue Coat ProxySG secure Web gateway can be deployed as a physical appliance, a virtual machine or a cloud-based service. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Feature
09 Nov 2015
Palo Alto WildFire: Malware sandbox product overview
Tightly integrated with existing Palo Alto next-generation firewalls, the Palo Alto WildFire cloud-based malware sandbox service supports both public and private cloud deployments. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Answer
06 Oct 2015
How can enterprises manage the cybersecurity skills gap?
Due to the demand for professionals with backgrounds in both computer science and networking, filling cybersecurity jobs is difficult. Technology will have to play a bigger role. Continue Reading
By- Julian Weinberger, NCP engineering
-
News
09 Sep 2015
Security in SDN effort puts Fortinet in limelight
Fortinet introduces a framework for security in SDN, as startups attract market spotlight. Continue Reading
By- Antone Gonsalves, News Director
-
Tip
21 Aug 2015
OPM hack two months later: What was learned?
Network security expert Michele Chubirka shares her thoughts about June's OPM hack and what steps IT should take to fend off future attacks. Continue Reading
-
Feature
04 Aug 2015
Facing network breach threats, visibility is key
In this Q&A, an IT pro at Penn Mutual shares how his dual strategy of user education and Layer 7 visibility helps prevent network breaches. Continue Reading
-
Tip
10 Jul 2014
How to buy: Assessing next-gen firewalls
Is there a next-gen firewall in your future? Our How to Buy guide offers advice you need to ensure you purchase the best platform to meet your needs. Continue Reading
By- Dave Shackleford, Voodoo Security
-
Opinion
25 Feb 2014
RSA security conference still relevant in today's landscape?
The RSA conference convenes in San Francisco this week. But, asks Michele Chubirka, is the meeting really focusing on the critical issues? Continue Reading
-
News
23 Sep 2010
Next-generation firewalls not ready to replace all legacy firewalls
Application-aware firewalls enhance network security by offering deeper visibility, but enterprises will hang on to old-style firewalls. Continue Reading
By- Shamus McGillicuddy, Enterprise Management Associates
-
News
16 Sep 2010
Networking vendors aim to improve server virtualization security
Server virtualization security is no longer guaranteed by creating physical security zones for different classes of virtual machines on host servers. Networking and network security vendors are introducing virtual security products that apply security controls and policies directly to virtual machines within virtual hosts. Continue Reading
By- Shamus McGillicuddy, Enterprise Management Associates
-
Answer
25 Nov 2006
Intrusion detection vs. intrusion prevention
Our expert, Puneet Mehta, tells us what the key difference is between intrusion detection and intrusion prevention, in this expert response. Continue Reading
By- Puneet Mehta, SDG
-
Feature
16 Nov 2006
"Network Security: The Complete Reference," Chapter 10: Network device security
Chapter 10 focuses on using routers and switches to increase the security of the network as well as providing appropriate configuration steps for protecting the devices themselves against attacks. Continue Reading
-
Report
07 Nov 2006
Network access control -- More than endpoint security
Network access control (NAC) holds a great deal of promise for network security, but sorting out the market and product options is a challenge. In this special report, you'll learn how to gauge if your enterprise is ready for NAC, what the difference is between the major systems, and whether an appliance approach may be the best option. Then peek under the covers at the actual endpoint functionality and how you can further leverage this technology in the future. Continue Reading
-
Tip
02 Nov 2006
How IPsec provides secure communications
IPsec provides secure site-to-site VPNs, remote access and host-to-host communication. In this tip, we peek inside the tunnel and examine how IPsec works. Continue Reading
By- David Jacobs, The Jacobs Group
-
Tip
19 Oct 2006
How SSL and TLS secure network transactions
SSL and TLS are protocols that were developed primarily to protect Web transactions, but they can be used to protect any type of network traffic that utilizes TCP at the transport layer, including the popular SSL VPN. In this tip, learn how SSL and TLS were developed and how they work. Continue Reading
By- David Jacobs, The Jacobs Group
-
Tip
03 Aug 2006
VPNs for disaster recovery: IPsec vs. SSL
Using a VPN as a failover mechanism when a primary communications link may be unavailable due to a disaster can be a smart move -- as well as an easy one to implement. In this tip, learn about the pros and cons of IPsec and SSL VPN options for disaster recovery. Continue Reading
By- Justin Korelc and Ed Tittel
-
Tip
22 Jun 2006
How to move an SSL certificate between Exchange servers
SearchExchange.com contributor Serdar Yegulalp provides step-by-step instructions on how to move an SSL certificate from one Exchange server to another, and explains a couple of gotchas to watch out for during the process. Continue Reading
-
Tip
07 Jun 2006
Five steps to stamp out unsafe Wi-Fi use
Lisa Phifer helps dispel the top myths of wireless security and explains five steps that network administrators can take to lead their users toward safer Wi-Fi usage. Continue Reading
By- Lisa Phifer, Core Competence
-
Feature
10 Apr 2006
To block or not to block: Rogue containment methods
Wireless network monitoring systems are quickly moving from detection alone to detection and prevention. In particular, many now provide options to "block" rogue devices, preventing wireless or wired network access. This tip explores how these containment features work, their potential side-effects, and what network administrators should consider before activating them. Continue Reading
-
Feature
10 Apr 2006
Fighting wireless DoS attacks
Despite recent 802.11 security advances, WLANs remain very vulnerable to Denial of Service attacks. While you may not be able to prevent DoS attacks, a WIDS can help you detect when DoS attacks occur and where they come from, so that you can track the intruder down and bring him to justice -- or at least scare him away. This tip offers practical advice on how to recognize and respond to DoS attacks launched against your WLAN. Continue Reading
By- Lisa Phifer, Core Competence
-
Tip
15 Mar 2006
Using Snort, Nessus and Tripwire for network security
Why pay a proprietary vendor a ton of money for a security application you can get for little or no money? In this tip, learn the pros and cons of open source network security tools Snort, Nessus and Tripwire. Continue Reading
-
Tip
02 Jan 2006
OSI: Securing the Stack, Layer 5 -- session hijacking
To help secure your systems against session hijacking, this tip walks you through the steps hackers use to hijack active sessions and take over your network. You'll also learn how to detect and prevent session hijacking attacks, a major security concern at the session layer -- Layer 5 of the OSI model. Continue Reading
By- Michael Gregg, Superior Solutions, Inc.
-
Tip
02 Dec 2005
Network security checklist
While 100% security is hardly a possibility, there are several things that you can do to make your network more secure. Learn about them with this network security checklist. Continue Reading
By- Chris Cox
-
Tip
31 Oct 2005
Cache poisoning attacks and how to prevent them
Want something scary to think about? A compromise of your name servers could cut you off from the Internet or redirect your customers to a competitor. It could even shunt sensitive electronic mail through an intermediate mail server or reroute your users to an exact replica of a popular Web site, where their keystrokes, including account names and passwords, are captured. In this tip, Cricket Liu provides a checklist of measures you can take to secure your DNS infrastructure. Continue Reading
By- Cricket Liu, Infoblox