- Network Security Best Practices and Products
- Wireless Network Security
- Network Security Monitoring and Analysis
- Network Access Control
Email Alerts
-
Can network security devices replace firewalls?
There are many new network security devices on the market today. Expert Chris Partsenidis opines on whether these can replace firewalls.Answer
-
What kind of security protections does a cloud service provider offer?
Amy Larsen-DeCarlo writes that enterprises can expect similar security protections from cloud providers as they get from traditional hosting services.Answer
-
In 2013, Cisco network security product strategy to key on integration
Video: Cisco SVP Chris Young details the vendor's 2013 network security product strategy, specifically combining more features into its line of ASA firewalls.Video
-
SSL certificate management: A practical guide
Certificate management is faced by many but understood by few. This guide provides a refresher of the basics and covers common tasks.Tip
-
Networking blogs: Tips for network strategies, handling tech support
Bloggers in this week's roundup advise ditching tech-specific plans for more general corporate strategies, and approaching tech support with caution.Fast packet | 04 Apr 2013
-
Networking blogs: Snags in wireless management, tips for smart storage
In this week's networking roundup, bloggers discuss the good and bad of wireless management and why IT should trust their smart storage technology.Fast packet | 26 Mar 2013
-
Networking blogs: Better BYOD policies, Aerohive updates HiveManager
In this networking blog roundup, learn why better BYOD policies are user-oriented, and find out what the HiveManager update means for WLAN security.Fast packet | 20 Mar 2013
-
Network Innovation Award: Palo Alto Networks next-generation firewalls
Palo Alto has won the SearchNetworking Network Innovation Award for next-generation firewalls that work throughout campus and data center networks.News | 15 Mar 2013
-
Dell SonicWall SuperMassive 9000 fills enterprise firewall gap
The SuperMassive 9000 series fills the gap between Dell SonicWall's SMB and service provider firewall products.News | 05 Mar 2013
-
Developing data security policy for BYOD
Expert Rainer Enders offers tips for a data security policy that will ensure personal data remains secure on enterprise devices -- and vice versa.Answer
- VIEW MORE ON : Network Security Best Practices and Products
-
Download Network Evolution E-Zine
Gain expert insight into how to build your network infrastructure to enable the changing face of IT. Tackle your everyday networking challenges with expert advice to keep your network up and running.Feature
-
Enterprise security: What's the best mobile device management system?
VPN expert Rainer Enders shows the difference between mobile device management systems and enterprise application stores for mobile device security.Answer
-
Is WEP cracking still a worrisome WLAN security issue?
Wireless expert Lisa A. Phifer explains to what extent WEP cracking remains a worrisome issue. It all depends on your company's WLAN security policy.Answer
-
Is 802.1X authentication good enough for WLAN access control?
Wireless expert Lisa A. Phifer explains why you shouldn't stop using 802.1X authentication methods for enterprise WLAN access control.Answer
-
How the 802.11ac standard impacts security
The upcoming 802.11ac standard is an improvement over 802.11n, but how could security be impacted? Wireless expert Lisa A. Phifer explains.Answer
-
Zappos cloud security strategy: Distributed management
-
Are application signatures the new firewall-rules bloat?
We've all heard of firewall-rules bloat, but the problem could get worse considering all of the application signatures that must be maintained in next-generation firewalls.Tip
-
Do you need virtual firewalls? What to consider first
With virtual firewalls, you can avoid routing traffic out of the virtual environment to pass through a physical firewall. But there are challenges to consider in going virtual.Tip
-
Wireless sniffing best practices using Wireshark
Wireless sniffing using Wireshark lets engineers troubleshoot poor performance and connectivity problems, as well as analyze traffic activity on the network.Book Chapter
-
Coping with BYOD
From virtual desktop infrastructure to NAC, network engineers are testing a host of technologies to handle mobility.Network Evolution Ezine
- VIEW MORE ON : Wireless Network Security
-
Network security assessment: Test firewalls, IDS in multiple ways
Network administrators need to test internal systems such as firewalls and IPS/IDS devices to ensure their networks are safe.Tip
-
Network security assessment: Internal testing relies on various tools
Network administrators need to know what steps to take to protect their networks against internal threats.Tip
-
Networking Update: Cisco buys Ubiquisys, strategies for analyzing VoFi
In this week's roundup, bloggers discuss Cisco's acquisition of Ubiquisys and offer strategies for VoFi analysis and engineering firewall policies.Fast Packet | 10 Apr 2013
-
SSL certificate management: A practical guide
Certificate management is faced by many but understood by few. This guide provides a refresher of the basics and covers common tasks.Tip
-
How does advanced malware use the network against you?
Find out how advanced malware can be detected by tracking its abnormal network behavior.Feature
-
Advanced threat protection: Behavior-profiling network communications
Advanced threat protection specializes in detecting advanced and persistent malware inside networks?Feature
-
Networking blogs: Better BYOD policies, Aerohive updates HiveManager
In this networking blog roundup, learn why better BYOD policies are user-oriented, and find out what the HiveManager update means for WLAN security.Fast packet | 20 Mar 2013
-
Network Innovation Award: Palo Alto Networks next-generation firewalls
Palo Alto has won the SearchNetworking Network Innovation Award for next-generation firewalls that work throughout campus and data center networks.News | 15 Mar 2013
-
What to consider when choosing an MDM system
Choosing an MDM system can be a complicated process, but expert Rainer Enders breaks down the considerations into straightforward terms in this tip.Answer
-
Networking blog roundup: Cisco NAM; why BGP matters in an SDN world
In this week's networking blog roundup, bloggers consider the significance of the new Cisco NAM and troubleshoot high CPU usage in an ASA firewall.Fast Packet | 25 Feb 2013
- VIEW MORE ON : Network Security Monitoring and Analysis
-
Enterprise security: What's the best mobile device management system?
VPN expert Rainer Enders shows the difference between mobile device management systems and enterprise application stores for mobile device security.Answer
-
Network Innovation Awards granted for emerging network technologies
SearchNetworking.com's Network Innovation Award goes to a variety of companies that have made advances in a range of networking technologies.News | 06 Aug 2012
-
Michael Morisy
Michael Morisy is the Features Writer for TechTarget Networking Media.Contributor
-
Global manufacturer revamps access control with ForeScout NAC
Global manufacturer installs ForeScout NAC to lock down ports and simplify guest network access control.News | 17 Jul 2012
-
Are application signatures the new firewall-rules bloat?
We've all heard of firewall-rules bloat, but the problem could get worse considering all of the application signatures that must be maintained in next-generation firewalls.Tip
-
Do you need virtual firewalls? What to consider first
With virtual firewalls, you can avoid routing traffic out of the virtual environment to pass through a physical firewall. But there are challenges to consider in going virtual.Tip
-
Deep packet inspection vendors: Quite the diverse crew
Deep packet inspection vendors can vary from traditional network infrastructure vendors to third-party specialists. Here we run down a smattering of providers and their offerings.Tip
-
Deep packet inspection tools: Proxy vs. stream-based
As more enterprises consider deep packet inspection tools, network managers must choose the technique that works best for them.Tip
-
Coping with BYOD
From virtual desktop infrastructure to NAC, network engineers are testing a host of technologies to handle mobility.Network Evolution Ezine
-
Network access security challenges: Mobility requires new strategies
With employees accessing core applications on personal devices, engineers are facing new network access security challenges that require intelligence on all components.Tip
- VIEW MORE ON : Network Access Control
Network Management Strategies for the CIO