Email Alerts
-
Implementing Cisco ASA tools for effective network traffic monitoring
This chapter on controlling network access explains how to implement Cisco ASA tools to ensure effective network traffic monitoring. Book Chapter
-
Analysts make predictions on 2013 networking trends
Networking analysts predict what 2013 has in store for data centers, campus LANs, network management, security and software-defined networks. Feature
-
Mobile device security best practices for BYOD
BYOD policies require a new set of mobile device security best practices. Instead of thinking, “Block access,” network managers must now think, “Enable access safely." Feature
-
Network auditing tools for war driving: Video and quiz
Test your knowledge of network auditing tools by viewing this video and taking the quiz that follows. Know how to best tackle network access points and get a chance to be rewarded. Quiz
-
Managed intrusion prevention services handle sophisticated attacks
Adopting managed intrusion prevention services can help avert increasingly sophisticated network attacks. Feature
-
Cisco Live London: Uncle John promises to fix Cisco security strategy
Fast Packet blogger Greg Ferro reports from Cisco Live London where (after a marketing exec was stripped down by orphans!) Uncle John promised a stronger focus on Cisco security strategies as well as network automation and management. Strangely, Cham... Fast Packet
-
Cisco ASA and BGP peering problems: Command line tips
If you run into BGP peering problems because of a Cisco ASA or PIX firewallin the middle, there are a few simple command line fixes that will quickly solve the problem. Fast Packet blogger Brandon Carroll explains. Fast Packet
-
Creating a firewall policy fault model with automatic correction
Firewall policy problems may be at the heart of firewalls that mistakenly block legitimate traffic or allow in troubled traffic. At LISA 2010, researchers propose creating a firewall policy fault model that can be used to implement automated correcti... Research Report
-
Wireshark network analyzer: The open source network monitoring tool
Wireshark, an open source network monitoring tool, can help networking pros in a variety of ways. This chapter excerpt from Wireshark expert Laura Chappell includes a checklist of what Wireshark can do for your network, as well as a free chapter down... Chapter Excerpt
-
Top 10 reasons to learn Wireshark, the open source network analyzer
All network analysts should learn Wireshark, the open source network analyzer. This top 10 list of reasons includes what it could mean for your career and your network. Top 10
- See more Essential Knowledge on Network Security Best Practices and Products
-
Forgot your password? FIDO Alliance works on authentication alternatives
Password-based authentication is becoming more taxing for users, especially on mobile devices. The FIDO Alliance is developing alternatives. News | 10 May 2013
-
New McAfee IPS offers 40 Gbps throughput
The new NS series of McAfee IPS appliances offers 40 Gbps. McAfee has also acquired NGFW vendor Stonesoft. News | 09 May 2013
-
Networking blogs: Tips for network strategies, handling tech support
Bloggers in this week's roundup advise ditching tech-specific plans for more general corporate strategies, and approaching tech support with caution. Fast packet | 04 Apr 2013
-
Networking blogs: Snags in wireless management, tips for smart storage
In this week's networking roundup, bloggers discuss the good and bad of wireless management and why IT should trust their smart storage technology. Fast packet | 26 Mar 2013
-
Networking blogs: Better BYOD policies, Aerohive updates HiveManager
In this networking blog roundup, learn why better BYOD policies are user-oriented, and find out what the HiveManager update means for WLAN security. Fast packet | 20 Mar 2013
-
Network Innovation Award: Palo Alto Networks next-generation firewalls
Palo Alto has won the SearchNetworking Network Innovation Award for next-generation firewalls that work throughout campus and data center networks. News | 15 Mar 2013
-
Dell SonicWall SuperMassive 9000 fills enterprise firewall gap
The SuperMassive 9000 series fills the gap between Dell SonicWall's SMB and service provider firewall products. News | 05 Mar 2013
-
New F5 firewall pits ADC vendor against crowded market
F5 Networks announced a new firewall that integrates with the company's existing application delivery and security products. News | 31 Jan 2013
-
Infoblox launches DNS firewall and network security management
Network control vendor Infoblox expands into security with a DNS firewall and a firewall management product, and adds a branch Trinzic box. News | 29 Jan 2013
-
Networking in 2013: Will enterprise network security management get easier?
Gartner analyst Greg Young predicts network security management will get a 2013 makeover with more correlation among vendors. SDN security draws scrutiny. News | 14 Jan 2013
- See more News on Network Security Best Practices and Products
-
How to implement cloud-based security services
Implementing cloud-based security services has rewards, but network pros must evaluate the cloud provider's architecture for security and reliability. Expert Tip
-
SSL certificate management: A practical guide
Certificate management is faced by many but understood by few. This guide provides a refresher of the basics and covers common tasks. Tip
-
Are application signatures the new firewall-rules bloat?
We've all heard of firewall-rules bloat, but the problem could get worse considering all of the application signatures that must be maintained in next-generation firewalls. Tip
-
Do you need virtual firewalls? What to consider first
With virtual firewalls, you can avoid routing traffic out of the virtual environment to pass through a physical firewall. But there are challenges to consider in going virtual. Tip
-
Network access security challenges: Mobility requires new strategies
With employees accessing core applications on personal devices, engineers are facing new network access security challenges that require intelligence on all components. Tip
-
How to find a VPN firewall solution for your enterprise
Choosing a VPN firewall solution is no easy task as the market is saturated with options. Use these tips to learn how to find a VPN firewall solution for your enterprise. Tip
-
Can your security strategy handle networked facilities management?
Linking building and power management systems to converged Ethernet networks brings new security concerns. Tip
-
How to connect virtual environments to DMZ network architecture
Connecting virtualized environments to DMZ network architecture creates new challenges. Network managers must learn new design methodologies to protect virtual traffic in the DMZ. Tip
-
Best practices for connecting virtualization hosts to DMZ networks
DMZ networks can be used to protect virtualization hosts, but best practices must be considered, including combing virtual and physical firewalls and locking down virtual switches. Tip
-
Planning a virtualization firewall strategy
Creating a virtualization firewall strategy entails determining exactly how you want to protect your virtual environments and then implementing firewall segmentation for security. Tip
- See more Tips on Network Security Best Practices and Products
-
Can network security devices replace firewalls?
There are many new network security devices on the market today. Expert Chris Partsenidis opines on whether these can replace firewalls. Answer
-
What kind of security protections does a cloud service provider offer?
Amy Larsen-DeCarlo writes that enterprises can expect similar security protections from cloud providers as they get from traditional hosting services. Answer
-
Developing data security policy for BYOD
Expert Rainer Enders offers tips for a data security policy that will ensure personal data remains secure on enterprise devices -- and vice versa. Answer
-
Enterprise security: What's the best mobile device management system?
VPN expert Rainer Enders shows the difference between mobile device management systems and enterprise application stores for mobile device security. Answer
-
Disadvantages to a layered approach
Security expert Michael Gregg discusses the disadvantages to a layered approach to enterprise security. Ask the Expert
-
How do I change my security setting to allow ActiveX?
Learn how to change your security settings to allow ActiveX in Internet Explorer 6 or later, from our enterprise security expert Michael Gregg. Ask the Expert
-
What are two common devices that control outbound network access?
Read here to discover devices that will control outbound network access and enable and allow network access. Ask the Expert
-
Is there a way to trace my stolen laptop computer?
Learn some useful preliminary techniques on how to safeguard your computer should it get stolen and make it recoverable using certain trace software, from our expert Michael Gregg. Ask the Expert
-
Should organizations separate technical from administrative security?
Learn from our expert how to organize technical security control in your business without hindering network and inter-departmental communication. Ask the Expert
-
What network equipment is needed to secure a small business LAN?
Learn how to effectively manage and secure a relatively small LAN that connects to the internet without compromising security. Ask the Expert
- See more Expert Advice on Network Security Best Practices and Products
-
BYOD (bring your own device)
BYOD (bring your own device) is the increasing trend of employees bringing their own devices to work. Smartphones are the most common example but employees also take tablets, laptops and USB drives into the workplace. BYOD is part of the larger tren... Definition
-
Metasploit Project - Metasploit Framework
The Metasploit Project is an open source computer security project that provides a public resource for researching and developing exploit code. Definition
-
MIEL e-Security
MIEL e-Security is a Mumbai-based organization that provides information security services and solutions to organizations worldwide. Definition
-
National eGovernance Service Delivery Gateway (NSDG)
National eGovernance Service Delivery Gateway (NSDG) is a mission mode project (MMP) under the National e-Governance Plan (NeGP) that acts as a central repository for government data. It facilitates interoperability and exchange of data throughout th... Definition
-
stateful inspection
Stateful inspection is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall. Stateful inspection is also known as dynamic packet filtering. Definition
-
Cisco Information Security Specialist (CISS)
Cisco Information Security Specialist (CISS) is an entry-level certification attesting that the holder has demonstrated the foundational knowledge and skills required to install and support a Cisco Self-Defending Network... (Continued) Definition
-
firewall
A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. Definition
-
dynamic packet filter
A dynamic packet filter is a firewall facility that can monitor the state of active connections and use this information to determine which network packets to allow through the firewall. Definition
-
rule base
In the context of a computer server acting as a firewall, a rule base is a set of rules that govern what is and what is not allowed through the firewall. Definition
-
packet filtering
On the Internet, packet filtering is the process of passing or blocking packets at a network interface based on source and destination addresses, ports, or protocols. Definition
- See more Definitions on Network Security Best Practices and Products
-
In 2013, Cisco network security product strategy to key on integration
Video: Cisco SVP Chris Young details the vendor's 2013 network security product strategy, specifically combining more features into its line of ASA firewalls. Video
-
Choosing the right unified network security strategy
Network security threats are constantly evolving, and your network security strategy must evolve with them. Learn about new security best practices, including application-aware firewalls and unified threat management, in this video with Josh Corman a... Video
-
Cloud computing security risks: Private and public clouds
Cloud computing security risks are a major threat to your cloud network. Learn about cloud computing security risks in the private and public clouds and how cloud providers are handling these cloud security issues. Video
-
Tips to secure your network against data theft
If you're looking for a new take on network security, listen to our three-part podcast series on preventing data theft and leakage with Christopher Burgess, author of the recent book, "Secrets Stolen, Fortunes Lost: Preventing Intellectual Property T... Podcast
-
Embedded network security
The line between networking and security products keeps getting fainter, but is there an end in sight? This podcast explores what to expect in the next 12 to 18 months and how IT professionals specializing in networking or security should prepare the... Podcast
-
Forgot your password? FIDO Alliance works on authentication alternatives
Password-based authentication is becoming more taxing for users, especially on mobile devices. The FIDO Alliance is developing alternatives. News
-
How to implement cloud-based security services
Implementing cloud-based security services has rewards, but network pros must evaluate the cloud provider's architecture for security and reliability. Expert Tip
-
New McAfee IPS offers 40 Gbps throughput
The new NS series of McAfee IPS appliances offers 40 Gbps. McAfee has also acquired NGFW vendor Stonesoft. News
-
Can network security devices replace firewalls?
There are many new network security devices on the market today. Expert Chris Partsenidis opines on whether these can replace firewalls. Answer
-
What kind of security protections does a cloud service provider offer?
Amy Larsen-DeCarlo writes that enterprises can expect similar security protections from cloud providers as they get from traditional hosting services. Answer
-
In 2013, Cisco network security product strategy to key on integration
Video: Cisco SVP Chris Young details the vendor's 2013 network security product strategy, specifically combining more features into its line of ASA firewalls. Video
-
SSL certificate management: A practical guide
Certificate management is faced by many but understood by few. This guide provides a refresher of the basics and covers common tasks. Tip
-
Networking blogs: Tips for network strategies, handling tech support
Bloggers in this week's roundup advise ditching tech-specific plans for more general corporate strategies, and approaching tech support with caution. Fast packet
-
Networking blogs: Snags in wireless management, tips for smart storage
In this week's networking roundup, bloggers discuss the good and bad of wireless management and why IT should trust their smart storage technology. Fast packet
-
Networking blogs: Better BYOD policies, Aerohive updates HiveManager
In this networking blog roundup, learn why better BYOD policies are user-oriented, and find out what the HiveManager update means for WLAN security. Fast packet
- See more All on Network Security Best Practices and Products
About Network Security Best Practices and Products
Network security products abound, but how do you select the best devices, applications and strategies? This section provides product information on next-generation firewalls, intrusion detection and prevention systems (IPS), unified threat management (UM) systems, network access control (NAC) and packet and application-layer monitoring tools. Also learn about new strategies for defense-in-depth, including firewall and IPS placement, DMZ configuration and application-layer security.
Network Management Strategies for the CIO