Email Alerts
-
Why hiding the SSID won't solve PCI DSS wireless compliance
Although the PCI DSS wireless guidelines released last year sought to dispel any confusion about wireless LAN security risks, enterprises are still neglecting security requirements and falling prey to old WLAN wives' tales. Hiding SSIDs isn't enough.... Article
-
Magic Quadrant says now is the time for next-generation firewalls
Vendors have been slow to deliver next-generation firewalls, but Gartner's Magic Quadrant for enterprise firewalls says that is about to change. Enterprises need an intelligent firewall that has IPS capabilities and application visibility. Article
-
Using LAN edge switch security features for network defense-in-depth
Enterprises are turning their focus to the largely unused LAN edge switch security features that can enable the use of ACLs and VLANs for port management and traffic monitoring. LAN edge switches also support network access authentication and can be ... Guide
-
Integrating LAN edge switch security and network access control
The best form of network edge security is to integrate LAN edge switch security features with network access control devices so that networking teams can use VLANs, ACLs and health checks at the switch alongside NAC's behavior analysis. Tip
-
Configuring LAN edge switches for network access authentication
Intelligent edge switches can play a role in network access authentication, but these functions are often overlooked. Tip
-
Better than encryption? Unisys Stealth offers data parsing technology
The Unisys Stealth Solution uses data parsing -- an information dispersal algorithm -- along with VPN technology in a network security solution that enables data in motion to be completely unrecognizable to users without the right key. Article
-
To comply with PCI, network segmentation planned at nonprofit
Meeting the Payment Card Industry Data Security Standard (PCI DSS) requires more than adding firewalls. To stay compliant with PCI, network segmentation is how one Midwestern nonprofit plans to tackle the job. Article
-
SSL VPN tutorial
Some companies see SSL VPNs as a simpler, cheaper way to provide remote access to corporate data. Find out about SSL VPN usage, compare IPsec vs. SSL and decide what's right for your network in this SSL VPN tutorial. Tutorial
-
2010 predictions: What's the worst network security threat this year?
Hear enterprise network security expert Michael Gregg speak about the worst computer networking threats facing businesses in this 2010 predictions podcast. Slideshow
-
Best of 2009: Computer networking advice
Are you looking for a top 10 list of networking industry issues? Then look no further. Get the best of 2009's computer networking advice from our enterprise IT expert panel, and learn answers to questions that spoke to the year's most prevalent probl... Interview
Network Management Strategies for the CIO