Network Security Monitoring and Analysis

  • August 14, 2008 14 Aug'08

    SIEM platform secures university's open network

    With security information and event management platform QRadar, Wayne State University has secured its open network without locking down its systems.

  • July 02, 2008 02 Jul'08

    Network forensics appliance gets storage boost and 10 GbE support

    WildPackets has launched its latest network forensics appliance, the Omnipliance SuperCore, which features vastly increased storage capacity and support for 10 GbE networks. The Omnipliance SuperCore features up to 64 terabytes of local storage and ...

  • May 22, 2008 22 May'08

    When it comes to data loss prevention, networking should be part of the conversation

    Networking professionals should be ready to take a leadership role in defining and executing data loss prevention strategies.

  • May 14, 2008 14 May'08

    What is data loss prevention? -- An introduction to DLP

    Most network security products focus on keeping the bad guys -- Trojans, viruses and hackers -- outside of the network, but data loss prevention (DLP) keeps the good stuff -- sensitive enterprise data -- in. With more business data leaks tainting ...

  • April 28, 2008 28 Apr'08

    Internet monitoring vendor adds throttling, filtering, to its appliance

    eTelemetry announced at Interop that it has added bandwidth throttling and filtering technologies to Metron 2.0, the new version of its Web activity monitoring appliance.

  • November 20, 2007 20 Nov'07

    Endpoint security locks down law firm's network

    Network security is top priority for one of the world's largest law firms, which recently deployed endpoint security tools to help enforce its strict security policies.

  • July 30, 2007 30 Jul'07

    Using a packet sniffer for network packet analysis

    A packet sniffer may seem like a humble addition to a network professional's toolkit, but when used correctly, packet sniffers (also known as protocol analyzers) can home in on any number of network problems. "Practical Packet Analysis: Using ...

  • March 14, 2007 14 Mar'07

    Network downtime from security attacks proves costly

    Network downtime resulting from security attacks is costing companies a bundle, but steps can be taken to prevent the added expense.

  • February 15, 2007 15 Feb'07

    Network hacking for dummies: Not just for dummies anymore

    Network security is achievable if network pros gain control and test their systems, says author Kevin Beaver in his new book Hacking For Dummies, 2nd Edition.

  • February 15, 2007 15 Feb'07

    'Hacking for Dummies' giveaway contest

    Let us know what security tools you use to secure and test your network and you'll be entered into a drawing to win "Hacking for Dummies" by Kevin Beaver.

  • January 10, 2007 10 Jan'07

    Network security -- Taking the layered approach

    Network security is tricky business. In his new book Hack the Stack, author and security expert Michael Gregg outlines how to secure the network using the OSI model.

  • November 29, 2006 29 Nov'06

    Network security hits home run for Detroit Tigers

    When they made it to the playoffs, the Detroit Tigers had to plan for a boom in network traffic. With that boom came the potential for threats.

  • September 07, 2006 07 Sep'06

    Cisco, SAP team-up marries network with risk management

    Cisco and SAP team up to market governance, risk and compliance (GRC) and networking combo. The application/networking vendor relationship highlights SONA's first major proof point to networking professionals.

  • August 22, 2006 22 Aug'06

    Network visibility thwarts crime, identifies unwanted traffic

    Networking monitoring tools have helped Vanderbilt University's network team to uncover unwanted and troubling traffic. In some cases, the tools have turned the team into crime fighters.

  • August 09, 2006 09 Aug'06

    Network Defenders

    The mission of our Network Defenders series is to provide user stories in which networks were breached or broken by a security threat, and then later fixed with various technology solutions that improved the level of enterprise security. These users...