Email Alerts
-
Intrusion detection systems -- introduction to IDS and IPCop
This article, excerpted from the book "Configuring IPCop Firewalls: Closing Borders with Open Source," explores how intrusion detection systems (IDS) and intrusion prevention systems (IPS) including Snort and IPCop protect the network from malicious ... Tip
-
Spam -- stop it at the network edge
Spam has become much more than just a nuisance; it can slow or crash the network. F5 recently added a module to its Big IP platform to stop spam at the network edge. Article
-
Network security hits home run for Detroit Tigers
When they made it to the playoffs, the Detroit Tigers had to plan for a boom in network traffic. With that boom came the potential for threats. Article
-
How does the VPN concentrator work?
In this Q&A, our expert, Puneet Mehta, explains how the VPN concentrator works. Ask the Expert
-
Intrusion detection vs. intrusion prevention
Our expert, Puneet Mehta, tells us what the key difference is between intrusion detection and intrusion prevention, in this expert response. Ask the Expert
-
Juniper rounds out Unified Access Control
Juniper Networks this week bolstered its network access control (NAC) offering by rolling out the latest version of its Unified Access Control (UAC) solution. Article
-
Security Spotlight: SSL VPN appliances simplify secure access
By leveraging the ubiquitous Web browser as a client platform, SSL VPN appliances represent a promising alternative for delivering simple-but-secure off-site access to private business services and data. In this tip, Lisa Phifer explores why you shou... Tip
-
NAC appliances: Shortcut to access control
Many network managers are interested in NAC, but a full-blown installation requires a large commitment and investment. To fill the gap between consumer interest and investment, several vendors offer "NAC-in-a-box" appliances that deliver many of NAC'... Tech Article
-
Network access control -- More than endpoint security
Network access control (NAC) holds a great deal of promise for network security, but sorting out the market and product options is a challenge. In this special report, you'll learn how to gauge if your enterprise is ready for NAC, what the difference... Special Report
-
NAC and endpoint security frameworks: Which way to go?
We've all heard about the Cisco and Microsoft initiatives for NAC, plus the standards-based Trusted Network Connect. What's the difference between these approaches and which, if any, should you choose to secure your endpoints and keep your local netw... Article
Network Management Strategies for the CIO