Network Security Best Practices and Products

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Quiz: In the spammer's lair

    After you've reviewed our LearnIT series on defeating spam in the enterprise quiz yourself to see what you've learned about spam. 

  • Vendor combines firewall, VPN, IDS

    Internet Security Systems has released an all-in-one product that combines a firewall, VPN, antivirus and IDS. An analyst says combination products could be the next big network security trend. 

  • Preaching the merits of protocol analysis

    Meet the networking industry's Pat Robertson. No, Laura Chappell doesn't save souls; she saves networks. As founder and senior protocol analyst with the San Jose, Calif.-based Protocol Analysis Institute, she travels from enterprise to enterprise, pr... 

  • The barriers between you and a 'hack-proof' network

    At the upcoming Networking Decisions conference, taking place Nov. 5-7 in Atlanta, network security expert Jeffrey Posluns will offer his insights on what it takes to successfully evaluate the security of an enterprise infrastructure. The founder of ... 

  • How does a firewall work?

    A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. (The term also implies the security policy that is used with the programs.) An enterprise w... 

  • Emergence of WPA threatens gateway vendors

    Analysts say that, unless wireless LAN gateway vendors evolve to address customers' changing enterprise management needs, they could be facing extinction at the hands of Cisco and others. 

  • Balancing Web filtering and employee privacy

    Employers are increasingly concerned with how their employees use the Internet; legal liability and lost productivity can result from goofing off, viewing offensive material or downloading huge files that clog up the network. These concerns have spur... 

  • HP pushes 'access control on steroids'

    As part of its new Adaptive Network Architecture Service, Hewlett-Packard is offering a network access control tool that enables admins to grant external parties limited access to network resources without punching holes in the corporate firewall. 

  • Firewalls charred by network complexity

    Experts discussing the future of firewalls at the recent Burton Group Catalyst Conference 2003 say that the complexity in networks and applications desperately needs to be addressed. 

  • MPLS and VPN Architectures: Multicast VPN

    This chapter describes in detail how to achieve multicast services between multiple sites of a VPN that has an existing multicast network or is intending to deploy multicast.