Email Alerts
-
WAN security vendor: To go network hardware provider or third-party?
Network hardware providers and third-party vendors have very different WAN security offerings. How do you choose? Feature
-
Implementing Cisco ASA tools for effective network traffic monitoring
This chapter on controlling network access explains how to implement Cisco ASA tools to ensure effective network traffic monitoring. Book Chapter
-
Analysts make predictions on 2013 networking trends
Networking analysts predict what 2013 has in store for data centers, campus LANs, network management, security and software-defined networks. Feature
-
Mobile device security best practices for BYOD
BYOD policies require a new set of mobile device security best practices. Instead of thinking, “Block access,” network managers must now think, “Enable access safely." Feature
-
Network auditing tools for war driving: Video and quiz
Test your knowledge of network auditing tools by viewing this video and taking the quiz that follows. Know how to best tackle network access points and get a chance to be rewarded. Quiz
-
Managed intrusion prevention services handle sophisticated attacks
Adopting managed intrusion prevention services can help avert increasingly sophisticated network attacks. Feature
-
Cisco Live London: Uncle John promises to fix Cisco security strategy
Fast Packet blogger Greg Ferro reports from Cisco Live London where (after a marketing exec was stripped down by orphans!) Uncle John promised a stronger focus on Cisco security strategies as well as network automation and management. Strangely, Cham... Fast Packet
-
Cisco ASA and BGP peering problems: Command line tips
If you run into BGP peering problems because of a Cisco ASA or PIX firewallin the middle, there are a few simple command line fixes that will quickly solve the problem. Fast Packet blogger Brandon Carroll explains. Fast Packet
-
Creating a firewall policy fault model with automatic correction
Firewall policy problems may be at the heart of firewalls that mistakenly block legitimate traffic or allow in troubled traffic. At LISA 2010, researchers propose creating a firewall policy fault model that can be used to implement automated correcti... Research Report
-
Wireshark network analyzer: The open source network monitoring tool
Wireshark, an open source network monitoring tool, can help networking pros in a variety of ways. This chapter excerpt from Wireshark expert Laura Chappell includes a checklist of what Wireshark can do for your network, as well as a free chapter down... Chapter Excerpt
- See more Essential Knowledge on Network Security Best Practices and Products
-
Sourcefire deal boosts Cisco vulnerability research labs, security biz
Cisco's acquisition of Sourcefire boosts its intrusion revenue business and infuses valuable vulnerability research talent. News | 24 Jul 2013
-
Cisco security strategy: Q&A with CTO Bret Hartman
Cisco security CTO Bret Hartman explains how software and SDN are shaping Cisco's security strategy. Q&A | 17 Jul 2013
-
Networking blogs: CCIE exam advice, integrating the overlay network
In this week's blog roundup, get CCIE exam study tips, find out how CISOs can keep control of IT, and learn more about integrating overlay networking. Fast Packet | 27 Jun 2013
-
Networking blogs: Forensics tools in IDS space, analyzing Juniper
In this week's blog roundup, read why network forensics tools may be the next IDS and get some perspective on Juniper's business strategies. News | 19 Jun 2013
-
Marble Security's cloud-based mobile security service augments MDM
Marble Security released its new cloud-based mobile security service that can work with MDM tools for protection of employee-owned mobile devices. News | 18 Jun 2013
-
Mobile service providers are target of F5 firewall product
F5 has engineered a mobile provider firewall software that takes an application-specific approach. News | 18 Jun 2013
-
Damballa Failsafe adds P2P malware profiler to catch slippery hackers
Fraudsters are using P2P protocols to improve resiliency of malware command and control. Damballa responds with a P2P malware profiler. News | 12 Jun 2013
-
Networking blogs: Agile approach to development, VMware's hybrid cloud
This week, bloggers endorse the Agile approach to development and offer their reaction to VMware's new hybrid cloud service. Fast Packet | 30 May 2013
-
Forgot your password? FIDO Alliance works on authentication alternatives
Password-based authentication is becoming more taxing for users, especially on mobile devices. The FIDO Alliance is developing alternatives. News | 10 May 2013
-
New McAfee IPS offers 40 Gbps throughput
The new NS series of McAfee IPS appliances offers 40 Gbps. McAfee has also acquired NGFW vendor Stonesoft. News | 09 May 2013
- See more News on Network Security Best Practices and Products
-
Network penetration testing isn't working: Why you still get hacked
Security architect Glen Kemp says that enterprises must do more than deploy automated penetration testing to ensure Website security. Opinion
-
Robust network security solutions still lacking
As network attacks grow in intensity, network administrators are still seeking tools to block intrusions. Opinion
-
Networking blogs: The evolution of network access control
In this week's blog roundup, get an expert's insights on Cisco's unique approach to SDN, and find out why EMC thinks EVAS has bright future. Fast Packet
-
Supporting BYOD security policies with Juniper's Secure Access SSL VPN
Understanding all the features within Juniper's Secure Access and MAG gateways will help companies fortify their BYOD policies. Tip
-
Networking blogs: Big data security trifecta, distributed firewalls
In this week's blog roundup, read about the three areas big data security needs to encompass, and get expert insight on distributed firewalls. Fast Packet
-
Setting a network security policy for a virtual environment
In this expert tip, Michael Gregg reveals the most important aspects of a reliable network security policy for your virtualized environment. Expert Tip
-
How to implement cloud-based security services
Implementing cloud-based security services has rewards, but network pros must evaluate the cloud provider's architecture for security and reliability. Expert Tip
-
SSL certificate management: A practical guide
Certificate management is faced by many but understood by few. This guide provides a refresher of the basics and covers common tasks. Tip
-
Are application signatures the new firewall-rules bloat?
We've all heard of firewall-rules bloat, but the problem could get worse considering all of the application signatures that must be maintained in next-generation firewalls. Tip
-
Do you need virtual firewalls? What to consider first
With virtual firewalls, you can avoid routing traffic out of the virtual environment to pass through a physical firewall. But there are challenges to consider in going virtual. Tip
-
Network access security challenges: Mobility requires new strategies
With employees accessing core applications on personal devices, engineers are facing new network access security challenges that require intelligence on all components. Tip
-
How to find a VPN firewall solution for your enterprise
Choosing a VPN firewall solution is no easy task as the market is saturated with options. Use these tips to learn how to find a VPN firewall solution for your enterprise. Tip
- See more Tips on Network Security Best Practices and Products
-
Will bring your own device security make you sacrifice convenience?
Employee-owned devices can seriously undermine security. But bring your own device is probably here to stay. So what should IT do? Expert Answer
-
Can network security devices replace firewalls?
There are many new network security devices on the market today. Expert Chris Partsenidis opines on whether these can replace firewalls. Answer
-
What kind of security protections does a cloud service provider offer?
Amy Larsen-DeCarlo writes that enterprises can expect similar security protections from cloud providers as they get from traditional hosting services. Answer
-
Developing data security policy for BYOD
Expert Rainer Enders offers tips for a data security policy that will ensure personal data remains secure on enterprise devices -- and vice versa. Answer
-
Enterprise security: What's the best mobile device management system?
VPN expert Rainer Enders shows the difference between mobile device management systems and enterprise application stores for mobile device security. Answer
-
Disadvantages to a layered approach
Security expert Michael Gregg discusses the disadvantages to a layered approach to enterprise security. Ask the Expert
-
What are two common devices that control outbound network access?
Read here to discover devices that will control outbound network access and enable and allow network access. Ask the Expert
-
How do I change my security setting to allow ActiveX?
Learn how to change your security settings to allow ActiveX in Internet Explorer 6 or later, from our enterprise security expert Michael Gregg. Ask the Expert
-
Is there a way to trace my stolen laptop computer?
Learn some useful preliminary techniques on how to safeguard your computer should it get stolen and make it recoverable using certain trace software, from our expert Michael Gregg. Ask the Expert
-
Should organizations separate technical from administrative security?
Learn from our expert how to organize technical security control in your business without hindering network and inter-departmental communication. Ask the Expert
- See more Expert Advice on Network Security Best Practices and Products
-
BYOD (bring your own device)
BYOD (bring your own device) is the increasing trend of employees bringing their own devices to work. Smartphones are the most common example but employees also take tablets, laptops and USB drives into the workplace. BYOD is part of the larger tren... Definition
-
Metasploit Project - Metasploit Framework
The Metasploit Project is an open source computer security project that provides a public resource for researching and developing exploit code. Definition
-
MIEL e-Security
MIEL e-Security is a Mumbai-based organization that provides information security services and solutions to organizations worldwide. Definition
-
National eGovernance Service Delivery Gateway (NSDG)
National eGovernance Service Delivery Gateway (NSDG) is a mission mode project (MMP) under the National e-Governance Plan (NeGP) that acts as a central repository for government data. It facilitates interoperability and exchange of data throughout th... Definition
-
stateful inspection
Stateful inspection is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall. Stateful inspection is also known as dynamic packet filtering. Definition
-
Cisco Information Security Specialist (CISS)
Cisco Information Security Specialist (CISS) is an entry-level certification attesting that the holder has demonstrated the foundational knowledge and skills required to install and support a Cisco Self-Defending Network... (Continued) Definition
-
firewall
A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. Definition
-
dynamic packet filter
A dynamic packet filter is a firewall facility that can monitor the state of active connections and use this information to determine which network packets to allow through the firewall. Definition
-
rule base
In the context of a computer server acting as a firewall, a rule base is a set of rules that govern what is and what is not allowed through the firewall. Definition
-
packet filtering
On the Internet, packet filtering is the process of passing or blocking packets at a network interface based on source and destination addresses, ports, or protocols. Definition
- See more Definitions on Network Security Best Practices and Products
-
In 2013, Cisco network security product strategy to key on integration
Video: Cisco SVP Chris Young details the vendor's 2013 network security product strategy, specifically combining more features into its line of ASA firewalls. Video
-
Choosing the right unified network security strategy
Network security threats are constantly evolving, and your network security strategy must evolve with them. Learn about new security best practices, including application-aware firewalls and unified threat management, in this video with Josh Corman a... Video
-
Cloud computing security risks: Private and public clouds
Cloud computing security risks are a major threat to your cloud network. Learn about cloud computing security risks in the private and public clouds and how cloud providers are handling these cloud security issues. Video
-
Tips to secure your network against data theft
If you're looking for a new take on network security, listen to our three-part podcast series on preventing data theft and leakage with Christopher Burgess, author of the recent book, "Secrets Stolen, Fortunes Lost: Preventing Intellectual Property T... Podcast
-
Embedded network security
The line between networking and security products keeps getting fainter, but is there an end in sight? This podcast explores what to expect in the next 12 to 18 months and how IT professionals specializing in networking or security should prepare the... Podcast
-
Sourcefire deal boosts Cisco vulnerability research labs, security biz
Cisco's acquisition of Sourcefire boosts its intrusion revenue business and infuses valuable vulnerability research talent. News
-
Networking blogs: The evolution of network access control
In this week's blog roundup, get an expert's insights on Cisco's unique approach to SDN, and find out why EMC thinks EVAS has bright future. Fast Packet
-
Cisco security strategy: Q&A with CTO Bret Hartman
Cisco security CTO Bret Hartman explains how software and SDN are shaping Cisco's security strategy. Q&A
-
Supporting BYOD security policies with Juniper's Secure Access SSL VPN
Understanding all the features within Juniper's Secure Access and MAG gateways will help companies fortify their BYOD policies. Tip
-
Networking blogs: Big data security trifecta, distributed firewalls
In this week's blog roundup, read about the three areas big data security needs to encompass, and get expert insight on distributed firewalls. Fast Packet
-
Network penetration testing isn't working: Why you still get hacked
Security architect Glen Kemp says that enterprises must do more than deploy automated penetration testing to ensure Website security. Opinion
-
Networking blogs: CCIE exam advice, integrating the overlay network
In this week's blog roundup, get CCIE exam study tips, find out how CISOs can keep control of IT, and learn more about integrating overlay networking. Fast Packet
-
Networking blogs: Forensics tools in IDS space, analyzing Juniper
In this week's blog roundup, read why network forensics tools may be the next IDS and get some perspective on Juniper's business strategies. News
-
Will bring your own device security make you sacrifice convenience?
Employee-owned devices can seriously undermine security. But bring your own device is probably here to stay. So what should IT do? Expert Answer
-
Marble Security's cloud-based mobile security service augments MDM
Marble Security released its new cloud-based mobile security service that can work with MDM tools for protection of employee-owned mobile devices. News
- See more All on Network Security Best Practices and Products
About Network Security Best Practices and Products
Network security products abound, but how do you select the best devices, applications and strategies? This section provides product information on next-generation firewalls, intrusion detection and prevention systems (IPS), unified threat management (UM) systems, network access control (NAC) and packet and application-layer monitoring tools. Also learn about new strategies for defense-in-depth, including firewall and IPS placement, DMZ configuration and application-layer security.
Network Management Strategies for the CIO