Network Security Best Practices and Products

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • NAC and endpoint security frameworks: Which way to go?

    We've all heard about the Cisco and Microsoft initiatives for NAC, plus the standards-based Trusted Network Connect. What's the difference between these approaches and which, if any, should you choose to secure your endpoints and keep your local netw... 

  • Network access control: Should you implement now?

    Implementing network access control (NAC) is a big step, and deciding whether and when to start is daunting. Networking experts say the sooner the better, but before going into NAC full throttle, enterprises must first determine their motivation. 

  • Defending an expansive definition of NAC

    There is a good bit of controversy about what constitutes a complete NAC solution. Broadening our definition and expectations will enable networking pros to tightly integrate NAC into the IT infrastructure and leverage it as a true access control sys... 

  • Video, audio are network drains

    Network misuse is rampant, according to a recent survey. Employees using the corporate network for recreation or high-bandwidth business can put a strain on network resources, but network engineers can combat that with filtering and monitoring. 

  • Data leakage protection: Where does it fit in the network?

    Network-based antivirus and antispam products are getting a face-lift with next-generation content filtering, but is data leakage protection best served in the network or at the endpoint? 

  • Users anticipate joint Cisco and Microsoft security

    Users are keen on checking out Microsoft and Cisco's interoperable security architecture outlined this week by both companies. When it comes to enterprise security, however, Cisco still gets more respect from IT shops. 

  • Data-leakage security threat to meet its protection match

    Security-aware network managers fretting over headlines about intellectual property loss may find hope in the emerging data-leakage protection industry. 

  • Microsoft and Cisco ready to demo NAP/NAC

    There is harmony at last between two high-tech elephants. At a Boston security conference, Microsoft and Cisco will demonstrate how their competing security technologies will co-exist. 

  • Possible Cisco zero-day exploit revealed at Black Hat

    Details of an alleged flaw related to SIP and PIX appliances, briefly mentioned in a Wednesday Black Hat presentation, are being kept under wraps as Cisco and US-CERT investigate. 

  • Cisco security flaw under scrutiny

    Cisco continues to investigate a potential PIX firewall flaw, but it and other vendors say sharing security information quickly and indiscriminately is always the best policy.