Network Security Best Practices and Products
- March 15, 2007
In the network, the basic plumbing -- your routers, switches and cabling -- may stay more or less the same, at least for a few years. But the way you think about and manage that plumbing changes frequently. SearchNetworking.com canvassed its readers...
- January 03, 2007
There are dozens of different devices that can link to the network. SecureWave recently released a free tool that allows network administrators to determine which devices have been hooked up and when.
- December 20, 2006
Network Access Control (NAC) implementations will decrease, despite growth in networking budgets, according to TheInfoPro's Wave 2 Networking study.
- November 30, 2006
Spam has become much more than just a nuisance; it can slow or crash the network. F5 recently added a module to its Big IP platform to stop spam at the network edge.
- November 29, 2006
When they made it to the playoffs, the Detroit Tigers had to plan for a boom in network traffic. With that boom came the potential for threats.
- November 14, 2006
Juniper Networks this week bolstered its network access control (NAC) offering by rolling out the latest version of its Unified Access Control (UAC) solution.
- November 07, 2006
We've all heard about the Cisco and Microsoft initiatives for NAC, plus the standards-based Trusted Network Connect. What's the difference between these approaches and which, if any, should you choose to secure your endpoints and keep your local ...
- November 03, 2006
Implementing network access control (NAC) is a big step, and deciding whether and when to start is daunting. Networking experts say the sooner the better, but before going into NAC full throttle, enterprises must first determine their motivation.
- October 26, 2006
There is a good bit of controversy about what constitutes a complete NAC solution. Broadening our definition and expectations will enable networking pros to tightly integrate NAC into the IT infrastructure and leverage it as a true access control ...
- October 25, 2006
Network misuse is rampant, according to a recent survey. Employees using the corporate network for recreation or high-bandwidth business can put a strain on network resources, but network engineers can combat that with filtering and monitoring.
- October 18, 2006
Network-based antivirus and antispam products are getting a face-lift with next-generation content filtering, but is data leakage protection best served in the network or at the endpoint?
- September 11, 2006
Users are keen on checking out Microsoft and Cisco's interoperable security architecture outlined this week by both companies. When it comes to enterprise security, however, Cisco still gets more respect from IT shops.
- August 29, 2006
Security-aware network managers fretting over headlines about intellectual property loss may find hope in the emerging data-leakage protection industry.
- August 24, 2006
There is harmony at last between two high-tech elephants. At a Boston security conference, Microsoft and Cisco will demonstrate how their competing security technologies will co-exist.
- August 08, 2006
Details of an alleged flaw related to SIP and PIX appliances, briefly mentioned in a Wednesday Black Hat presentation, are being kept under wraps as Cisco and US-CERT investigate.