Network Security Best Practices and Products News
July 01, 2015
Cisco plans to acquire OpenDNS and use its security-as-a-service products to reduce the number of IoT threats customers face.
June 23, 2015
TechTarget purchasing intentions survey reveals that security remains the top networking challenge for IT pros in 2015.
May 13, 2015
Tor Project shuts down its AWS bridge effort, Tor Cloud, but encouraged developers to set up their own Tor bridges to promote anonymous cloud usage.
April 15, 2015
PCI DSS 3.1 grants merchants about 14 months to nix flawed SSL and TLS protocols, but demands they quickly provide detailed new documentation on how they plan to make the transition.
Network Security Best Practices and Products Get Started
Bring yourself up to speed with our introductory content
With the proliferation of mobile devices, guest access to enterprise networks is more common. IT can maintain security with tools such as identity management and per-session security keys. Continue Reading
A firewall is a network security system, either hardware or software based, that controls incoming and outgoing network traffic based on a set of rules. Continue Reading
To keep your network data secure, start with this introduction to firewalls. This tutorial provides an overview of what firewalls are and what benefits they provide, how they work and different firewall types. Get important information you'll need ... Continue Reading
Evaluate Network Security Best Practices and Products Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The line between unified threat management systems and next-gen firewalls has grown increasingly unclear. Here, learn more about UTM vs. NGFW and choose the right technology for your enterprise. Continue Reading
SN blogs: This week, an analyst urged vendors to keep focus on WAN optimization; the rise of big data analytics is forcing firms to see what's next. Continue Reading
Expert Brad Causey takes a close look at Web application firewalls, explains how WAF technology can prevent Internet-based attacks from known and unknown applications threats, and offers advice on WAF management and deployment. Continue Reading
Product ReviewsPowered by IT Central Station
It's worth the investment, but score calculation needs to be improved. I had to manually re-calculate scoring at times.Powered by IT Central Station
Valuable Features: The interface is pretty good, as all the instructions are clear enough. The way you can create groups or scheduling scans and...Continue Reading
The installation of the local hardware scanner appliance is easy, but the asset tagging needs lots of improvements.Powered by IT Central Station
Valuable Features: Vulnerability management Policy compliance Scalability • Improvements to My Organization: As a leading IT services...Continue Reading
Powered by IT Central Station
Valuable Features: The top one for me is that the vulnerabilities are kept up to date. • Improvements to My Organization: It has reduced the...Continue Reading
Manage Network Security Best Practices and Products
Learn to apply best practices and optimize your operations.
If you think your organization hasn't suffered a network security breach in the last six months, you're just not looking closely enough, according to Eric Cole at RSA Conference 2015. Continue Reading
As network attacks become more sophisticated, IT must equip itself with new network defense tactics. Continue Reading
Up and coming threat intelligence tools aim to improve data security and even standardize threat intelligence across the industry. Expert Kevin Beaver explains how. Continue Reading
Problem Solve Network Security Best Practices and Products Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
After the latest wave of attacks, including the most recent on Sony, network security pros are losing sleep. Can new platforms stop today's network security threats? Continue Reading
The next generation of Wi-Fi technology, 802.11ac Wave 2, will be able to push multiple gigabits of data per second, but most enterprise networks wouldn't be able to take full advantage of it with the infrastructure they have in place today. That's ... Continue Reading
Transforming the image of security Continue Reading