The mission of our Network Defenders series is to provide user stories in which networks were damaged by a security breach, then later fixed with various technology solutions that improved the level of enterprise security. These users learned from their experiences and came out stronger for them. As they say, "Fool me once, shame on you; fool me twice …."
'No wireless' policy enforced at Blue Cross
Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it -- until a team of auditors said the company had better do something.
Security flap opens financial services firm's eyes
Thomas Weisel Partners, a financial services firm, caught a bug; a worm really. But now they monitor network traffic more closely to ensure it doesn't happen again.
Wireless trespasser stopped dead in his tracks
A security expert working at a California government office spotted an unauthorized person trying to bridge onto the wired network through a wireless NIC card. He put a stop to it.
Jelly Belly sweetens remote access
Candy-maker Jelly Belly's network was so secure even top executives couldn't get in through the VPN. The company solved the sticky situation with a pair of boxes from Network Engines.
Public security slip forces Georgia Capitol to lock down WLAN
More than three years after a TV news crew exposed security flaws in the WLAN at the Georgia State Capitol building, the governor's office is trying again to go wireless.
Staying apps aware keeps Continental in the air
Three years after getting slammed by the SQL Slammer worm, Continental's network is secure. ConSentry Network's role-based provisioning technology keeps apps, users in check.
University's messaging system gets green light after red light woes
Everything went smoothly when the University of Miami deployed a 10,000 mailbox unified voice messaging system, until users wanted to tweak the message waiting light.
Property management company beefs up network security
Enterprises could learn a lesson from Managed Services Inc., which rolled out wired and wireless network access to dozens of its properties nationwide, but in doing so found security could suffer.
Dig deeper on Network Security Monitoring and Analysis