Network Security Best Practices and Products

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • VPN lockdown: Evaluating cloud vs. managed VPN providers

    Virtual private networks (VPNs) are essential for protecting corporate data. As we explore in this issue of Network Evolution, the pressure to support an increasing number of mobile users and more advanced mobile use cases has created challeng... 

  • BYOD (bring your own device)

    BYOD (bring your own device) is the increasing trend of employees bringing their own devices to work. Smartphones are the most common example but employees also take tablets, laptops and USB drives into the workplace. BYOD is part of the larger tren... 

  • Metasploit Project - Metasploit Framework

    The Metasploit Project is an open source computer security project that provides a public resource for researching and developing exploit code. 

  • MIEL e-Security

    MIEL e-Security is a Mumbai-based organization that provides information security services and solutions to organizations worldwide. 

  • National eGovernance Service Delivery Gateway (NSDG)

    National eGovernance Service Delivery Gateway (NSDG) is a mission mode project (MMP) under the National e-Governance Plan (NeGP) that acts as a central repository for government data. It facilitates interoperability and exchange of data throughout th... 

  • stateful inspection

    Stateful inspection is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall. Stateful inspection is also known as dynamic packet filtering. 

  • Cisco Information Security Specialist (CISS)

    Cisco Information Security Specialist (CISS) is an entry-level certification attesting that the holder has demonstrated the foundational knowledge and skills required to install and support a Cisco Self-Defending Network... (Continued) 

  • firewall

    A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. 

  • dynamic packet filter

    A dynamic packet filter is a firewall facility that can monitor the state of active connections and use this information to determine which network packets to allow through the firewall. 

  • rule base

    In the context of a computer server acting as a firewall, a rule base is a set of rules that govern what is and what is not allowed through the firewall. 

  • packet filtering

    On the Internet, packet filtering is the process of passing or blocking packets at a network interface based on source and destination addresses, ports, or protocols. 

  • See more Definitions on Network Security Best Practices and Products
  • In 2013, Cisco network security product strategy to key on integration

    Video: Cisco SVP Chris Young details the vendor's 2013 network security product strategy, specifically combining more features into its line of ASA firewalls. 

  • Choosing the right unified network security strategy

    Network security threats are constantly evolving, and your network security strategy must evolve with them. Learn about new security best practices, including application-aware firewalls and unified threat management, in this video with Josh Corman a... 

  • Cloud computing security risks: Private and public clouds

    Cloud computing security risks are a major threat to your cloud network. Learn about cloud computing security risks in the private and public clouds and how cloud providers are handling these cloud security issues. 

  • Tips to secure your network against data theft

    If you're looking for a new take on network security, listen to our three-part podcast series on preventing data theft and leakage with Christopher Burgess, author of the recent book, "Secrets Stolen, Fortunes Lost: Preventing Intellectual Property T... 

  • Embedded network security

    The line between networking and security products keeps getting fainter, but is there an end in sight? This podcast explores what to expect in the next 12 to 18 months and how IT professionals specializing in networking or security should prepare the... 

About Network Security Best Practices and Products

Network security products abound, but how do you select the best devices, applications and strategies? This section provides product information on next-generation firewalls, intrusion detection and prevention systems (IPS), unified threat management (UM) systems, network access control (NAC) and packet and application-layer monitoring tools. Also learn about new strategies for defense-in-depth, including firewall and IPS placement, DMZ configuration and application-layer security.