Email Alerts
-
Networking vendors aim to improve server virtualization security
Server virtualization security is no longer guaranteed by creating physical security zones for different classes of virtual machines on host servers. Networking and network security vendors are introducing virtual security products that apply securit... Article
-
Cisco network security strategy: Where is it going?
The Cisco network security strategy goes under the microscope as we attempt to move past the FUD and help dubious networking pros understand the future of Cisco security products in a rapidly changing technology world. Article
-
Wireshark network analyzer: The open source network monitoring tool
Wireshark, an open source network monitoring tool, can help networking pros in a variety of ways. This chapter excerpt from Wireshark expert Laura Chappell includes a checklist of what Wireshark can do for your network, as well as a free chapter down... Chapter Excerpt
-
Top 10 reasons to learn Wireshark, the open source network analyzer
All network analysts should learn Wireshark, the open source network analyzer. This top 10 list of reasons includes what it could mean for your career and your network. Top 10
-
Why hiding the SSID won't solve PCI DSS wireless compliance
Although the PCI DSS wireless guidelines released last year sought to dispel any confusion about wireless LAN security risks, enterprises are still neglecting security requirements and falling prey to old WLAN wives' tales. Hiding SSIDs isn't enough.... Article
-
Magic Quadrant says now is the time for next-generation firewalls
Vendors have been slow to deliver next-generation firewalls, but Gartner's Magic Quadrant for enterprise firewalls says that is about to change. Enterprises need an intelligent firewall that has IPS capabilities and application visibility. Article
-
Using LAN edge switch security features for network defense-in-depth
Enterprises are turning their focus to the largely unused LAN edge switch security features that can enable the use of ACLs and VLANs for port management and traffic monitoring. LAN edge switches also support network access authentication and can be ... Guide
-
Integrating LAN edge switch security and network access control
The best form of network edge security is to integrate LAN edge switch security features with network access control devices so that networking teams can use VLANs, ACLs and health checks at the switch alongside NAC's behavior analysis. Tip
-
Configuring LAN edge switches for network access authentication
Intelligent edge switches can play a role in network access authentication, but these functions are often overlooked. Tip
-
Better than encryption? Unisys Stealth offers data parsing technology
The Unisys Stealth Solution uses data parsing -- an information dispersal algorithm -- along with VPN technology in a network security solution that enables data in motion to be completely unrecognizable to users without the right key. Article
Network Management Strategies for the CIO