Network Security Best Practices and Products News
January 29, 2015
Brocade is promoting router encryption in the release of its MLXe security module, but expert opinions fall short of unanimous endorsement.
December 16, 2014
Shrinking data centers, wireless upgrades, cloud access and new security approaches dominate 2015 networking projects.
November 26, 2014
User Activity Monitoring is as important as asset monitoring for enterprise network security, finds research from Enterprise Management Associates.
October 30, 2014
New enterprise firewalls from Fortinet and SonicWall offer carrier-class speeds and feeds at a nice price.
Network Security Best Practices and Products Get Started
Bring yourself up to speed with our introductory content
A firewall is a network security system, either hardware or software based, that controls incoming and outgoing network traffic based on a set of rules. Continue Reading
To keep your network data secure, start with this introduction to firewalls. This tutorial provides an overview of what firewalls are and what benefits they provide, how they work and different firewall types. Get important information you'll need ... Continue Reading
SN blogs: How can SDN be used to fortify network security? And is it time to be worried about software libraries? Continue Reading
Evaluate Network Security Best Practices and Products Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
SN blogs: This week, an analyst urged vendors to keep focus on WAN optimization; the rise of big data analytics is forcing firms to see what's next. Continue Reading
Expert Brad Causey takes a close look at Web application firewalls, explains how WAF technology can prevent Internet-based attacks from known and unknown applications threats, and offers advice on WAF management and deployment. Continue Reading
The IETF is asking for help as it defines the opportunistic security standard. What does this mean to the enterprise? Continue Reading
Product ReviewsPowered by IT Central Station
Cost effective but when we originally purchased LANGuardian, some features needed further development.Powered by IT Central Station
Valuable Features: The ability to detect and decipher torrent traffic for the purpose of identifying what some refer to as "copyright violators"....Continue Reading
Powered by IT Central Station
Valuable Features: Provides a detailed view of internet bandwidth consumption. • Improvements to My Organization: We can track users who...Continue Reading
Delivers higher frequency of scans & better aggregation of results. Ticket management has room for improvement.Powered by IT Central Station
Valuable Features: Integrity of scanners; never do I need to worry….“Is this scanner going to bring down a host?”. • Improvements to My...Continue Reading
Manage Network Security Best Practices and Products
Learn to apply best practices and optimize your operations.
Up and coming threat intelligence tools aim to improve data security and even standardize threat intelligence across the industry. Expert Kevin Beaver explains how. Continue Reading
Multipath TCP could soon bring improved redundancy and uptime to a network near you, but what does it mean for network security? Expert Kevin Beaver explains. Continue Reading
Expert Fernando Gont explains how to probe whether your IPv6 address components are vulnerable to attack. Continue Reading
Problem Solve Network Security Best Practices and Products Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
After the latest wave of attacks, including the most recent on Sony, network security pros are losing sleep. Can new platforms stop today's network security threats? Continue Reading
The next generation of Wi-Fi technology, 802.11ac Wave 2, will be able to push multiple gigabits of data per second, but most enterprise networks wouldn't be able to take full advantage of it with the infrastructure they have in place today. That's ... Continue Reading
Transforming the image of security Continue Reading