-
Network Access Quarantine Control vs. Network Access Protection
With the number of mobile devices and remote workers growing, network quarantining has been a popular topic lately. Contributor and NAQC expert Jonathan Hassell compares the features of NAQC with t...28 Jul 2006
-
Network Virtualization, Chapter 3: A basic virtualized enterprise
In this excerpt from Network Virtualization by Victor Moreno and Kumar Reddy, learn the technical requirements posed by the need to virtualize the network, as well as an architectural framework com...28 Jul 2006
-
Troubleshooting wireless networks: A systematic approach
Troubleshooting wireless networks can take up a lot of time for network operations staff with a wireless LAN (WLAN) environment. Wireless guru Lisa Phifer discusses the tools and processes involved...28 Jul 2006
-
The bot invasion
Bots are invading a computer near you. Microsoft MVP Tony Bradley explains the evolution of bot code, the rise of botnets and how you can prevent bots from infecting your networks.27 Jul 2006
-
Network management gets easier thanks to new standards
Large or small, companies are faced with managing networks that, thanks to dropping hardware prices, are forever growing in size and complexity. Steve Rokov, marketing director for Avocent's embedd...27 Jul 2006
-
Network security vs. network performance -- the line is blurring
Securing your network is vital to your organizations livelihood, survival and future. But often, while securing the network, network performance is affected in adverse ways. Finding a happy medium ...27 Jul 2006
-
terminal proxy server (TPS)
A terminal proxy server (TPS) is a program that acts as an interface for voice over Internet Protocol (VoIP) telephone sets... (Continued)26 Jul 2006
-
Network policy: 'No wireless' restriction enforced at Blue Cross
Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it -- until a team of auditors said the company had better do something.26 Jul 2006
-
Open source router challenges proprietary networking market
Vyatta is taking on the midrange routing market, offering an open source enterprise routing alternative for companies seeking more flexibility than has traditionally been possible with proprietary ...25 Jul 2006
-
router
In packet-switched networks such as the Internet, a router is a device or, in some cases, software in a computer, that determines the next network point to which a packet should be forwarded toward...24 Jul 2006
-
neural network
In information technology, a neural network is a system of programs and data structures that approximates the operation of the human brain.21 Jul 2006
-
All-in-One Guide: VPNs
All-in-One Guide: VPNs21 Jul 2006
-
Identity management appliances reduce password cost
An identity management appliance that's well-implemented can eliminate password administration overhead while strengthening network security and improving productivity. Learn about the benefits of ...21 Jul 2006
-
Decentralizing patch management
Brien Posey explains reasons why centralized patch management is often ineffective in large or geographically dispersed networks and offers some alternative arrangements for these types of organiza...21 Jul 2006
-
DNS for a wireless network: Router Expert
DNS services are essential for building a secure wireless LAN. Our Router Expert provides complete instructions for setting up a DNS server, including implementing BIND, configuring a non-authorita...21 Jul 2006
-
Cisco's NAC play: Good for users, or just for Cisco's bottom line?
Expert opinion on how subtle moves in Cisco's NAC department suggest that the company wants to be a major security player -- selling lots and lots of equipment in the process.19 Jul 2006
-
Cisco NAC appliance secures enterprise networks
Cisco NAC as a framework is a daunting task. But it was made easier with its latest NAC 4.0 appliance, which analysts say can ease the NAC transition for network engineers.19 Jul 2006
-
Open source network tools
Some of the most commonly used, enterprise-ready open source tools are used for networking applications; likewise, many networking tasks can be accomplished quickly and cheaply using open source to...18 Jul 2006
-
Detecting hack attacks: Application logging is critical
Now that networks are fairly well-protected, attackers are targeting application servers. In this tip, security expert Mike Chapple explains how implementing application layer logging is becoming a...18 Jul 2006
-
NetDirector, an introduction: Free, simple server management
NetDirector provides a free, customizable, easy way for network and systems administrators to configure network services and manage groups of Linux, Solaris, or BSD servers. The open source tool is...17 Jul 2006
Network Management Strategies for the CIO