Email Alerts
-
Using Windows Vista group policy to prevent unauthorized USB device use
One of the largest internal threats to network security, and a major source of worry for network administrators, is the use of USB storage devices. USB storage devices can be used to steal large quantities of data from your network. Anything a user h... Tip
-
Without an application-layer firewall, do I run network security risks?
Are you leaving yourself wide open by not using an application-layer firewall? Find out in this expert response with network security expert Puneet Mehta. Ask the Expert
-
Network access control server eases guest access
Cisco Network Admission Control Guest Server, released today, can relieve some of the headaches of guest network access while also acting as a building block to a broader network access control (NAC) rollout. Article
-
Do social networking products (blogs) pose network security threats?
Find out how a social networking product or program like a blog might pose a network security threat, in this expert response. Ask the Expert
-
What types of network firewalls are there?
Learn what network firewall types exist to protect your network, in this response with enterprise security expert Michael Gregg. Ask the Expert
-
USB storage devices: Two ways to stop the threat to network security
USB storage devices pose a significant threat to network security. Disabling USB ports is an extremely effective way of preventing USB storage devices on your network; however, these sorts of techniques also prevent the use of authorized USB devices.... Tip
-
BICSI separation requirements between cross-connect points
Our network infrastructure expert explains what the BICSI and NEC requirements are for separation between a 45 KVA transformer and a CAT 6 cross-connect point, in this expert response. Ask the Expert
-
Juniper updates network access control
Juniper Networks has updated its Unified Access Control NAC products to include better pre- and post-admission, identity and role awareness and other new features. Article
-
Network security: Using unified threat management (UTM)
Network security products vary in use and protection. If you're looking at options to secure your network, use this introduction on Unified Threat Management (UTM) to learn about what UTM's advantages are compared to traditional security models. Tip
-
Does a firewall need two static IPs for port forwarding?
See if it takes two static IPs to accomplish port forwarding in a Cisco firewall, in this expert response from network security expert Puneet Mehta. Ask the Expert
Network Management Strategies for the CIO