-
Intrusion detection and prevention systems
30 Oct 2009
-
Enterprises demand next-generation firewalls with IPS, app visibility
Next-generation firewalls are getting plenty of hype, but not many vendors have completely solved the firewall architecture challenges involved in combining firewalls with IPS and other network sec...29 Oct 2009
-
wireless mesh network (WMN)
A wireless mesh network (WMN) is a mesh network created through the connection of wireless access points installed at each network user's locale.28 Oct 2009
-
802.11n wireless APs bring IP video to sprawling Illinois high school
Teachers at Lyons Township High School, a school of nearly 4,000 students, are bringing Wi-Fi and IP video to the classroom with wireless tablets and an 802.11n wireless solution.27 Oct 2009
-
How can I calculate perimeter firewall throughput?
Learn how to use a capture filter in Wireshark, to determine network throughput on a firewall by monitoring incoming packets and using a simple equation to find a baseline throughput, from our expe...27 Oct 2009
-
Where can I find a wire driver that unblocks recognized passwords?
Learn some Windows tools that can be used to automatically recover wireless passwords by collecting and analyzing packets sent from the device and relaying the password, from our expert Michael Gregg.27 Oct 2009
-
Anomaly-based intrusion protection configuration and installation
Network behavior analysis may be the answer to preventing zero-day attacks. You must install an anomaly-based intrusion protection system (IPS) or intrusion detection system (IDS). This article exp...27 Oct 2009
-
Desktop virtualization network challenges: A primer
Virtual desktop infrastructure is seeing speedy uptake, but desktop virtualization network challenges mean investing in load balancing, traffic prioritization and even more bandwidth to support rea...23 Oct 2009
-
FCoE network roadmap: Do you need a unified fabric strategy?
Some vendors are coming to the table with FCoE network roadmaps, but others are still releasing switches that can't necessarily support any converged enhanced Ethernet protocol in the data center. ...22 Oct 2009
-
What network loss testing tools/methods calculate dropped packets from a PC?
Learn how to drop incoming packets on your network connection for testing purposes and the various emulators and methods available to do so, from our expert Lindi Horton.21 Oct 2009
-
Why is access denied to my Active Directory (AD) users and computers?
Learn how to troubleshoot administrative domain access errors on your network in your Active Directory user list from our expert, Lindi Horton.21 Oct 2009
-
Network user management
While networking professionals protect their network perimeters, they must be just as careful to manage users on the inside. How can admins enforce network security policies and allocate user permi...20 Oct 2009
-
No data cable? Wireless mesh networking the answer for Wi-Fi backhaul
Mesh technology earned its chops as the backbone of metro-area wireless networks, but wireless mesh networking has found footing as a Wi-Fi backhaul option in the enterprise space as well.15 Oct 2009
-
Integrated wireless and wired LAN: Brocade-Motorola deal ups the ante
The Brocade-Motorola partnership aims for integrated wireless and wired LAN architecture that will place controllers and wireless intrusion detection directly into Brocade's wired switches, and wil...15 Oct 2009
-
Meru reinvents wireless LAN troubleshooting and management
Meru uses its single channel architecture to reinvent wireless LAN troubleshooting. Its Service Assurance Module, part of Meru's wireless LAN management suite, allows access points to emulate clien...14 Oct 2009
-
Preventing hacker attacks with network behavior analysis IPS
Deter enterprise network attacks by learning how network behavior analysis can be used to protect data. Understand the advantages and disadvantages of anomaly-based and signature-based protection a...13 Oct 2009
-
Green enterprise: Three networking investments that make a difference
Building green enterprise IT systems can mean making networking investments that support unified communications through network quality of service, traffic monitoring and mobility.10 Oct 2009
-
802.11n WLAN architecture strategies: The 2.4 vs. 5 ghz. band debate
802.11n WLAN architecture that enables use of both 2.4 ghz band and 5 ghz band can result in stronger WLAN performance and the ability to handle more clients and applications on the network. The Fa...09 Oct 2009
-
stateful inspection
Stateful inspection is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall. Stateful inspe...08 Oct 2009
-
Network security risks multiply when enterprises begin outsourcing
Network security risks of outsourcing tech jobs worry IT executives, according to a new survey. Without the right protections, outsourcing could expose companies to a network security breach.07 Oct 2009
Network Management Strategies for the CIO