- Network Security Best Practices and Products
- Wireless Network Security
- Network Security Monitoring and Analysis
- Network Access Control
Email Alerts
-
Networking blogs: The evolution of network access control
In this week's blog roundup, get an expert's insights on Cisco's unique approach to SDN, and find out why EMC thinks EVAS has bright future.Fast Packet
-
Cisco security strategy: Q&A with CTO Bret Hartman
Cisco security CTO Bret Hartman explains how software and SDN are shaping Cisco's security strategy.Q&A | 17 Jul 2013
-
Supporting BYOD security policies with Juniper's Secure Access SSL VPN
Understanding all the features within Juniper's Secure Access and MAG gateways will help companies fortify their BYOD policies.Tip
-
Networking blogs: Big data security trifecta, distributed firewalls
In this week's blog roundup, read about the three areas big data security needs to encompass, and get expert insight on distributed firewalls.Fast Packet
-
Network penetration testing isn't working: Why you still get hacked
Security architect Glen Kemp says that enterprises must do more than deploy automated penetration testing to ensure Website security.Opinion
-
Networking blogs: CCIE exam advice, integrating the overlay network
In this week's blog roundup, get CCIE exam study tips, find out how CISOs can keep control of IT, and learn more about integrating overlay networking.Fast Packet | 27 Jun 2013
-
Networking blogs: Forensics tools in IDS space, analyzing Juniper
In this week's blog roundup, read why network forensics tools may be the next IDS and get some perspective on Juniper's business strategies.News | 19 Jun 2013
-
Will bring your own device security make you sacrifice convenience?
Employee-owned devices can seriously undermine security. But bring your own device is probably here to stay. So what should IT do?Expert Answer
-
Marble Security's cloud-based mobile security service augments MDM
Marble Security released its new cloud-based mobile security service that can work with MDM tools for protection of employee-owned mobile devices.News | 18 Jun 2013
-
Mobile service providers are target of F5 firewall product
F5 has engineered a mobile provider firewall software that takes an application-specific approach.News | 18 Jun 2013
- VIEW MORE ON : Network Security Best Practices and Products
-
Download Network Evolution E-Zine
Gain expert insight into how to build your network infrastructure to enable the changing face of IT. Tackle your everyday networking challenges with expert advice to keep your network up and running.Feature
-
Enterprise security: What's the best mobile device management system?
VPN expert Rainer Enders shows the difference between mobile device management systems and enterprise application stores for mobile device security.Answer
-
Is WEP cracking still a worrisome WLAN security issue?
Wireless expert Lisa A. Phifer explains to what extent WEP cracking remains a worrisome issue. It all depends on your company's WLAN security policy.Answer
-
Is 802.1X authentication good enough for WLAN access control?
Wireless expert Lisa A. Phifer explains why you shouldn't stop using 802.1X authentication methods for enterprise WLAN access control.Answer
-
How the 802.11ac standard impacts security
The upcoming 802.11ac standard is an improvement over 802.11n, but how could security be impacted? Wireless expert Lisa A. Phifer explains.Answer
-
Zappos cloud security strategy: Distributed management
-
Are application signatures the new firewall-rules bloat?
We've all heard of firewall-rules bloat, but the problem could get worse considering all of the application signatures that must be maintained in next-generation firewalls.Tip
-
Do you need virtual firewalls? What to consider first
With virtual firewalls, you can avoid routing traffic out of the virtual environment to pass through a physical firewall. But there are challenges to consider in going virtual.Tip
-
Wireless sniffing best practices using Wireshark
Wireless sniffing using Wireshark lets engineers troubleshoot poor performance and connectivity problems, as well as analyze traffic activity on the network.Book Chapter
-
Coping with BYOD
From virtual desktop infrastructure to NAC, network engineers are testing a host of technologies to handle mobility.Network Evolution Ezine
- VIEW MORE ON : Wireless Network Security
-
Networking blogs: The evolution of network access control
In this week's blog roundup, get an expert's insights on Cisco's unique approach to SDN, and find out why EMC thinks EVAS has bright future.Fast Packet
-
Networking blogs: Big data security trifecta, distributed firewalls
In this week's blog roundup, read about the three areas big data security needs to encompass, and get expert insight on distributed firewalls.Fast Packet
-
Networking blogs: Forensics tools in IDS space, analyzing Juniper
In this week's blog roundup, read why network forensics tools may be the next IDS and get some perspective on Juniper's business strategies.News | 19 Jun 2013
-
Cisco's pxGrid framework creates context-aware security with Cisco ISE
Cisco introduces pxGrid, a new framework for sharing contextual information between security technologies, beginning with Cisco ISE.News | 13 Jun 2013
-
Damballa Failsafe adds P2P malware profiler to catch slippery hackers
Fraudsters are using P2P protocols to improve resiliency of malware command and control. Damballa responds with a P2P malware profiler.News | 12 Jun 2013
-
Setting a network security policy for a virtual environment
In this expert tip, Michael Gregg reveals the most important aspects of a reliable network security policy for your virtualized environment.Expert Tip
-
WAN security vendor: To go network hardware provider or third-party?
Network hardware providers and third-party vendors have very different WAN security offerings. How do you choose?Feature
-
Networking blogs: Agile approach to development, VMware's hybrid cloud
This week, bloggers endorse the Agile approach to development and offer their reaction to VMware's new hybrid cloud service.Fast Packet | 30 May 2013
-
How to implement cloud-based security services
Implementing cloud-based security services has rewards, but network pros must evaluate the cloud provider's architecture for security and reliability.Expert Tip
-
New McAfee IPS offers 40 Gbps throughput
The new NS series of McAfee IPS appliances offers 40 Gbps. McAfee has also acquired NGFW vendor Stonesoft.News | 09 May 2013
- VIEW MORE ON : Network Security Monitoring and Analysis
-
Will bring your own device security make you sacrifice convenience?
Employee-owned devices can seriously undermine security. But bring your own device is probably here to stay. So what should IT do?Expert Answer
-
How to implement cloud-based security services
Implementing cloud-based security services has rewards, but network pros must evaluate the cloud provider's architecture for security and reliability.Expert Tip
-
Enterprise security: What's the best mobile device management system?
VPN expert Rainer Enders shows the difference between mobile device management systems and enterprise application stores for mobile device security.Answer
-
Network Innovation Awards granted for emerging network technologies
SearchNetworking.com's Network Innovation Award goes to a variety of companies that have made advances in a range of networking technologies.News | 06 Aug 2012
-
Michael Morisy
Michael Morisy is the Features Writer for TechTarget Networking Media.Contributor
-
Global manufacturer revamps access control with ForeScout NAC
Global manufacturer installs ForeScout NAC to lock down ports and simplify guest network access control.News | 17 Jul 2012
-
Are application signatures the new firewall-rules bloat?
We've all heard of firewall-rules bloat, but the problem could get worse considering all of the application signatures that must be maintained in next-generation firewalls.Tip
-
Do you need virtual firewalls? What to consider first
With virtual firewalls, you can avoid routing traffic out of the virtual environment to pass through a physical firewall. But there are challenges to consider in going virtual.Tip
-
Deep packet inspection vendors: Quite the diverse crew
Deep packet inspection vendors can vary from traditional network infrastructure vendors to third-party specialists. Here we run down a smattering of providers and their offerings.Tip
-
Deep packet inspection tools: Proxy vs. stream-based
As more enterprises consider deep packet inspection tools, network managers must choose the technique that works best for them.Tip
- VIEW MORE ON : Network Access Control
Network Management Strategies for the CIO