Network Security Best Practices and Products

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Network access control vendors: Attraction vs. retention

    Network access control (NAC) vendors who are the most attractive to potential users aren't always the ones that are deployed and used, a recent study by Current Analysis found. 

  • Using a packet sniffer for network packet analysis

    A packet sniffer may seem like a humble addition to a network professional's toolkit, but when used correctly, packet sniffers (also known as protocol analyzers) can home in on any number of network problems. "Practical Packet Analysis: Using Wiresha... 

  • Network security: Overlay versus perimeter security model debated at Catalyst

    Traditional network perimeter security models using firewalls may soon be pushed out in favor of leveraging VPNs for network security, which could ease the security burden for networking staff, according to Dave Passmore. In a phone interview with Te... 

  • Network security, content security markets to grow in 2007

    The network security appliance and software markets are expected to continue growing steadily in 2007, while content security sales will begin to affect most enterprises' networking budgets. 

  • Networking trends for 2007: Predictions from networking professionals

    In the network, the basic plumbing -- your routers, switches and cabling -- may stay more or less the same, at least for a few years. But the way you think about and manage that plumbing changes frequently. SearchNetworking.com canvassed its readers ... 

  • Scan your network for devices

    There are dozens of different devices that can link to the network. SecureWave recently released a free tool that allows network administrators to determine which devices have been hooked up and when. 

  • NAC implementation slows as networking budgets grow

    Network Access Control (NAC) implementations will decrease, despite growth in networking budgets, according to TheInfoPro's Wave 2 Networking study. 

  • Spam -- stop it at the network edge

    Spam has become much more than just a nuisance; it can slow or crash the network. F5 recently added a module to its Big IP platform to stop spam at the network edge. 

  • Network security hits home run for Detroit Tigers

    When they made it to the playoffs, the Detroit Tigers had to plan for a boom in network traffic. With that boom came the potential for threats. 

  • Juniper rounds out Unified Access Control

    Juniper Networks this week bolstered its network access control (NAC) offering by rolling out the latest version of its Unified Access Control (UAC) solution.