Email Alerts
-
Prevent unauthorized USB devices with software restriction policies, third-party apps
In the conclusion of his series on preventing unauthorized USB device use on your network, Brien Posey discusses the pros and cons of using software restriction policies such as certificate rules, hash rules, Internet zone rules, and path rules to pr... Tip
-
Firewall implementation: Perimeter security placement and management
For your enterprise firewall implementation, understand where your perimeter security goes, how many you need, what precautions to be aware of and know how to manage and maintain your firewall. Learning Guide
-
How to choose the best firewall for your enterprise
Learn how to choose the best firewall for your enterprise. This guide gives you purchasing advice, tells you which IT team is responsible for the perimeter security solution and offers a checklist of risks you must assess before making deciding which... Learning Guide
-
Introduction to firewalls: Types of firewalls
To keep your network data secure, read this introduction to firewalls. You'll understand what they are, how they work, which types exist, which ones to buy and how to audit network traffic through this guide. Learning Guide
-
Can users on my LAN view my computer from other machines?
Learn how users on your LAN can view your machines from other computers in this response from network security expert Puneet Mehta. Ask the Expert
-
Cisco Trusted Security to boost network security, management
Cisco's newly announced Trusted Security (TrustSec) platform is intended to simplify and improve aspects of network security management by adding role-based access control (RBAC) to Cisco's switches. Article
-
Using Windows Vista group policy to prevent unauthorized USB device use
One of the largest internal threats to network security, and a major source of worry for network administrators, is the use of USB storage devices. USB storage devices can be used to steal large quantities of data from your network. Anything a user h... Tip
-
Without an application-layer firewall, do I run network security risks?
Are you leaving yourself wide open by not using an application-layer firewall? Find out in this expert response with network security expert Puneet Mehta. Ask the Expert
-
Network access control server eases guest access
Cisco Network Admission Control Guest Server, released today, can relieve some of the headaches of guest network access while also acting as a building block to a broader network access control (NAC) rollout. Article
-
Do social networking products (blogs) pose network security threats?
Find out how a social networking product or program like a blog might pose a network security threat, in this expert response. Ask the Expert
Network Management Strategies for the CIO