Network Security Best Practices and Products

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Intrusion detection systems -- introduction to IDS and IPCop

    This article, excerpted from the book "Configuring IPCop Firewalls: Closing Borders with Open Source," explores how intrusion detection systems (IDS) and intrusion prevention systems (IPS) including Snort and IPCop protect the network from malicious ... 

  • Spam -- stop it at the network edge

    Spam has become much more than just a nuisance; it can slow or crash the network. F5 recently added a module to its Big IP platform to stop spam at the network edge. 

  • Network security hits home run for Detroit Tigers

    When they made it to the playoffs, the Detroit Tigers had to plan for a boom in network traffic. With that boom came the potential for threats. 

  • How does the VPN concentrator work?

    In this Q&A, our expert, Puneet Mehta, explains how the VPN concentrator works. 

  • Intrusion detection vs. intrusion prevention

    Our expert, Puneet Mehta, tells us what the key difference is between intrusion detection and intrusion prevention, in this expert response. 

  • Juniper rounds out Unified Access Control

    Juniper Networks this week bolstered its network access control (NAC) offering by rolling out the latest version of its Unified Access Control (UAC) solution. 

  • Security Spotlight: SSL VPN appliances simplify secure access

    By leveraging the ubiquitous Web browser as a client platform, SSL VPN appliances represent a promising alternative for delivering simple-but-secure off-site access to private business services and data. In this tip, Lisa Phifer explores why you shou... 

  • NAC appliances: Shortcut to access control

    Many network managers are interested in NAC, but a full-blown installation requires a large commitment and investment. To fill the gap between consumer interest and investment, several vendors offer "NAC-in-a-box" appliances that deliver many of NAC'... 

  • Network access control -- More than endpoint security

    Network access control (NAC) holds a great deal of promise for network security, but sorting out the market and product options is a challenge. In this special report, you'll learn how to gauge if your enterprise is ready for NAC, what the difference... 

  • NAC and endpoint security frameworks: Which way to go?

    We've all heard about the Cisco and Microsoft initiatives for NAC, plus the standards-based Trusted Network Connect. What's the difference between these approaches and which, if any, should you choose to secure your endpoints and keep your local netw...