Network Security Monitoring and Analysis
- April 13, 2011
In his series offering Cisco ASA firewall advice, Fast Packet blogger Brandon Carroll explains the new Cisco ASA 8.4 feature, Stateful Failover with Dynamic Routing Protocols.
- February 16, 2011
With its new network security architecture, SecureX, Cisco tries to transcend next-generation firewall hype by focusing on more than application awareness. It's all about the context of who, what, where, when and how network connections are ...
- January 17, 2011
Firewall management software allowed an information security executive to clean up firewall rules within his organization and impose firewall change management policy.
- January 11, 2011
If you run into BGP peering problems because of a Cisco ASA or PIX firewallin the middle, there are a few simple command line fixes that will quickly solve the problem. Fast Packet blogger Brandon Carroll explains.
- September 23, 2010
Application-aware firewalls enhance network security by offering deeper visibility, but enterprises will hang on to old-style firewalls.
- March 25, 2010
The Unisys Stealth Solution uses data parsing -- an information dispersal algorithm -- along with VPN technology in a network security solution that enables data in motion to be completely unrecognizable to users without the right key.
- December 21, 2009
SearchNetworking.com asked Forrester Research senior analyst John Kindervag to predict what the new year will bring for network security. He says venture capital firms will look to cash out of startups, and new uber-devices that combine UTM with ...
- December 09, 2009
Mobility has exposed enterprises to more sophisticated security threats, forcing them to spend more on network security, particularly intrusion prevention systems and SSL VPN solutions to improve mobile computing security. Analysts say this has led ...
- November 05, 2009
Network automation is coming, whether network engineers are ready for it or not. It may still lag behind more general IT process automation, but network management tools are evolving, and enterprises are demanding that engineers reduce complexity ...
- October 07, 2009
Network security risks of outsourcing tech jobs worry IT executives, according to a new survey. Without the right protections, outsourcing could expose companies to a network security breach.
- April 23, 2009
Even as mobile workers connect to the network from a wide variety of devices, the network firewall remains the bedrock of network security. But the role of the firewall is evolving from perimeter defender to gatekeeper.
- November 13, 2008
While Intel's network security logged meticulous employee access data, red flags weren't raised to stop one potential thief until he had made off with the data.
- October 30, 2008
When Concord Hospital needed to install a network behavioral analysis (NBA) tool into a Nortel network built on multi-link trunking, the hospital's network chief had to convince Nortel to collaborate with his preferred NBA vendor.
- October 23, 2008
Cisco security guru Christopher Burgess has some radical suggestions for network security to beef up data leak prevention: Trust your users, and let them help decide policy.
- August 20, 2008
Dipping your feet in networking data visualization doesn't take expensive software: just Excel and a little help from your friends.