Network Security Monitoring and Analysis
- August 14, 2008
With security information and event management platform QRadar, Wayne State University has secured its open network without locking down its systems.
- July 02, 2008
WildPackets has launched its latest network forensics appliance, the Omnipliance SuperCore, which features vastly increased storage capacity and support for 10 GbE networks. The Omnipliance SuperCore features up to 64 terabytes of local storage and ...
- May 22, 2008
Networking professionals should be ready to take a leadership role in defining and executing data loss prevention strategies.
- May 14, 2008
Most network security products focus on keeping the bad guys -- Trojans, viruses and hackers -- outside of the network, but data loss prevention (DLP) keeps the good stuff -- sensitive enterprise data -- in. With more business data leaks tainting ...
- April 28, 2008
eTelemetry announced at Interop that it has added bandwidth throttling and filtering technologies to Metron 2.0, the new version of its Web activity monitoring appliance.
- November 20, 2007
Network security is top priority for one of the world's largest law firms, which recently deployed endpoint security tools to help enforce its strict security policies.
- July 30, 2007
A packet sniffer may seem like a humble addition to a network professional's toolkit, but when used correctly, packet sniffers (also known as protocol analyzers) can home in on any number of network problems. "Practical Packet Analysis: Using ...
- March 14, 2007
Network downtime resulting from security attacks is costing companies a bundle, but steps can be taken to prevent the added expense.
- February 15, 2007
Network security is achievable if network pros gain control and test their systems, says author Kevin Beaver in his new book Hacking For Dummies, 2nd Edition.
- February 15, 2007
Let us know what security tools you use to secure and test your network and you'll be entered into a drawing to win "Hacking for Dummies" by Kevin Beaver.
- January 10, 2007
Network security is tricky business. In his new book Hack the Stack, author and security expert Michael Gregg outlines how to secure the network using the OSI model.
- November 29, 2006
When they made it to the playoffs, the Detroit Tigers had to plan for a boom in network traffic. With that boom came the potential for threats.
- September 07, 2006
Cisco and SAP team up to market governance, risk and compliance (GRC) and networking combo. The application/networking vendor relationship highlights SONA's first major proof point to networking professionals.
- August 22, 2006
Networking monitoring tools have helped Vanderbilt University's network team to uncover unwanted and troubling traffic. In some cases, the tools have turned the team into crime fighters.
- August 09, 2006
The mission of our Network Defenders series is to provide user stories in which networks were breached or broken by a security threat, and then later fixed with various technology solutions that improved the level of enterprise security. These users...