Email Alerts
-
Choosing the right unified network security strategy
Network security threats are constantly evolving, and your network security strategy must evolve with them. Learn about new security best practices, including application-aware firewalls and unified threat management, in this video with Josh Corman a... Video
-
Top networking news 2010: Data center networks and multi-vendor mania
In our review of top networking news of 2010, see how we covered the rise of the multi-vendor network, major changes in data center networks and security, the emergence of ubiquitous wireless LAN and the challenges networking pros face in building th... News
-
Cloud computing security risks: Private and public clouds
Cloud computing security risks are a major threat to your cloud network. Learn about cloud computing security risks in the private and public clouds and how cloud providers are handling these cloud security issues. Video
-
Zero day protection with network access control, intrusion prevention
A global executive relocation service provider improved its zero-day protection capabilities with a combination of network access control and an intrusion prevention system. Article
-
Creating a firewall policy fault model with automatic correction
Firewall policy problems may be at the heart of firewalls that mistakenly block legitimate traffic or allow in troubled traffic. At LISA 2010, researchers propose creating a firewall policy fault model that can be used to implement automated correcti... Research Report
-
Application-layer firewalls defend against attacks up the stack
Application-layer firewalls must be combined with lower-level network security firewalls in order to implement a network firewall strategy that defends against low-level attacks as well as application-aware attacks. Tip
-
Network security infrastructure consolidation: What's your strategy?
Network security hardware and software vendors are offering enterprises options to consolidate network security infrastructure so that they can reduce management overhead and power consumption in the data center. But enterprises must avoid adding com... Article
-
Cisco Borderless Networks: Complete solution or marketing hype?
Cisco's Borderless Networks strategy promises customers a new paradigm for supporting enterprise mobility and ensuring mobile network security. However, network engineers are struggling to understand how a seemingly disparate collection of products f... Article
-
Disadvantages to a layered approach
Security expert Michael Gregg discusses the disadvantages to a layered approach to enterprise security. Ask the Expert
-
Next-generation firewalls not ready to replace all legacy firewalls
Application-aware firewalls enhance network security by offering deeper visibility, but enterprises will hang on to old-style firewalls. Article
Network Management Strategies for the CIO