Network Security Best Practices and Products

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Content filtering -- Taming the wild Web

    Delivering safe, fast, transparent Web access that meets workforce needs has never been more challenging. Nearly four out of five FBI-surveyed companies report that employees abuse Internet privileges by downloading pornography or pirated software. E... 

  • Network security threats and answers, by industry

    Michael Gregg offers network pros in various industries security advice and step-by-step solutions to help lock down the network. 

  • What is the difference between circuit-switched and packet-switched networks?

    Find out the difference between circuit-switched and packet-switched networks in this Q&A, plus whether or not Ethernet MACs are needed to build up a LAN. 

  • Scan your network for devices

    There are dozens of different devices that can link to the network. SecureWave recently released a free tool that allows network administrators to determine which devices have been hooked up and when. 

  • NAC implementation slows as networking budgets grow

    Network Access Control (NAC) implementations will decrease, despite growth in networking budgets, according to TheInfoPro's Wave 2 Networking study. 

  • Phishers and spambots -- appliances that fight back

    Most email security appliances are designed to deflect unsolicited inbound SMTP traffic. In this edition of our Security Spotlight Lisa Phifer examines the benefits of deploying an email security appliance and addresses what specifically to look for ... 

  • Intrusion detection systems -- introduction to IDS and IPCop

    This article, excerpted from the book "Configuring IPCop Firewalls: Closing Borders with Open Source," explores how intrusion detection systems (IDS) and intrusion prevention systems (IPS) including Snort and IPCop protect the network from malicious ... 

  • Spam -- stop it at the network edge

    Spam has become much more than just a nuisance; it can slow or crash the network. F5 recently added a module to its Big IP platform to stop spam at the network edge. 

  • Network security hits home run for Detroit Tigers

    When they made it to the playoffs, the Detroit Tigers had to plan for a boom in network traffic. With that boom came the potential for threats. 

  • Intrusion detection vs. intrusion prevention

    Our expert, Puneet Mehta, tells us what the key difference is between intrusion detection and intrusion prevention, in this expert response.