Network Security Best Practices and Products

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Network security hits home run for Detroit Tigers

    When they made it to the playoffs, the Detroit Tigers had to plan for a boom in network traffic. With that boom came the potential for threats. 

  • Juniper rounds out Unified Access Control

    Juniper Networks this week bolstered its network access control (NAC) offering by rolling out the latest version of its Unified Access Control (UAC) solution. 

  • NAC and endpoint security frameworks: Which way to go?

    We've all heard about the Cisco and Microsoft initiatives for NAC, plus the standards-based Trusted Network Connect. What's the difference between these approaches and which, if any, should you choose to secure your endpoints and keep your local netw... 

  • Network access control: Should you implement now?

    Implementing network access control (NAC) is a big step, and deciding whether and when to start is daunting. Networking experts say the sooner the better, but before going into NAC full throttle, enterprises must first determine their motivation. 

  • Defending an expansive definition of NAC

    There is a good bit of controversy about what constitutes a complete NAC solution. Broadening our definition and expectations will enable networking pros to tightly integrate NAC into the IT infrastructure and leverage it as a true access control sys... 

  • Video, audio are network drains

    Network misuse is rampant, according to a recent survey. Employees using the corporate network for recreation or high-bandwidth business can put a strain on network resources, but network engineers can combat that with filtering and monitoring. 

  • Data leakage protection: Where does it fit in the network?

    Network-based antivirus and antispam products are getting a face-lift with next-generation content filtering, but is data leakage protection best served in the network or at the endpoint? 

  • Users anticipate joint Cisco and Microsoft security

    Users are keen on checking out Microsoft and Cisco's interoperable security architecture outlined this week by both companies. When it comes to enterprise security, however, Cisco still gets more respect from IT shops. 

  • Data-leakage security threat to meet its protection match

    Security-aware network managers fretting over headlines about intellectual property loss may find hope in the emerging data-leakage protection industry. 

  • Microsoft and Cisco ready to demo NAP/NAC

    There is harmony at last between two high-tech elephants. At a Boston security conference, Microsoft and Cisco will demonstrate how their competing security technologies will co-exist.