News

Network Security Best Practices and Products

  • March 15, 2007 15 Mar'07

    Networking trends for 2007: Predictions from networking professionals

    In the network, the basic plumbing -- your routers, switches and cabling -- may stay more or less the same, at least for a few years. But the way you think about and manage that plumbing changes frequently. SearchNetworking.com canvassed its readers...

  • January 03, 2007 03 Jan'07

    Scan your network for devices

    There are dozens of different devices that can link to the network. SecureWave recently released a free tool that allows network administrators to determine which devices have been hooked up and when.

  • December 20, 2006 20 Dec'06

    NAC implementation slows as networking budgets grow

    Network Access Control (NAC) implementations will decrease, despite growth in networking budgets, according to TheInfoPro's Wave 2 Networking study.

  • November 30, 2006 30 Nov'06

    Spam -- stop it at the network edge

    Spam has become much more than just a nuisance; it can slow or crash the network. F5 recently added a module to its Big IP platform to stop spam at the network edge.

  • November 29, 2006 29 Nov'06

    Network security hits home run for Detroit Tigers

    When they made it to the playoffs, the Detroit Tigers had to plan for a boom in network traffic. With that boom came the potential for threats.

  • November 14, 2006 14 Nov'06

    Juniper rounds out Unified Access Control

    Juniper Networks this week bolstered its network access control (NAC) offering by rolling out the latest version of its Unified Access Control (UAC) solution.

  • November 07, 2006 07 Nov'06

    NAC and endpoint security frameworks: Which way to go?

    We've all heard about the Cisco and Microsoft initiatives for NAC, plus the standards-based Trusted Network Connect. What's the difference between these approaches and which, if any, should you choose to secure your endpoints and keep your local ...

  • November 03, 2006 03 Nov'06

    Network access control: Should you implement now?

    Implementing network access control (NAC) is a big step, and deciding whether and when to start is daunting. Networking experts say the sooner the better, but before going into NAC full throttle, enterprises must first determine their motivation.

  • October 26, 2006 26 Oct'06

    Defending an expansive definition of NAC

    There is a good bit of controversy about what constitutes a complete NAC solution. Broadening our definition and expectations will enable networking pros to tightly integrate NAC into the IT infrastructure and leverage it as a true access control ...

  • October 25, 2006 25 Oct'06

    Video, audio are network drains

    Network misuse is rampant, according to a recent survey. Employees using the corporate network for recreation or high-bandwidth business can put a strain on network resources, but network engineers can combat that with filtering and monitoring.

  • October 18, 2006 18 Oct'06

    Data leakage protection: Where does it fit in the network?

    Network-based antivirus and antispam products are getting a face-lift with next-generation content filtering, but is data leakage protection best served in the network or at the endpoint?

  • September 11, 2006 11 Sep'06

    Users anticipate joint Cisco and Microsoft security

    Users are keen on checking out Microsoft and Cisco's interoperable security architecture outlined this week by both companies. When it comes to enterprise security, however, Cisco still gets more respect from IT shops.

  • August 29, 2006 29 Aug'06

    Data-leakage security threat to meet its protection match

    Security-aware network managers fretting over headlines about intellectual property loss may find hope in the emerging data-leakage protection industry.

  • August 24, 2006 24 Aug'06

    Microsoft and Cisco ready to demo NAP/NAC

    There is harmony at last between two high-tech elephants. At a Boston security conference, Microsoft and Cisco will demonstrate how their competing security technologies will co-exist.

  • August 08, 2006 08 Aug'06

    Possible Cisco zero-day exploit revealed at Black Hat

    Details of an alleged flaw related to SIP and PIX appliances, briefly mentioned in a Wednesday Black Hat presentation, are being kept under wraps as Cisco and US-CERT investigate.

-ADS BY GOOGLE

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close