Email Alerts
-
Preaching the merits of protocol analysis
Meet the networking industry's Pat Robertson. No, Laura Chappell doesn't save souls; she saves networks. As founder and senior protocol analyst with the San Jose, Calif.-based Protocol Analysis Institute, she travels from enterprise to enterprise, pr... Interview | 27 Oct 2003
-
The barriers between you and a 'hack-proof' network
At the upcoming Networking Decisions conference, taking place Nov. 5-7 in Atlanta, network security expert Jeffrey Posluns will offer his insights on what it takes to successfully evaluate the security of an enterprise infrastructure. The founder of ... Interview | 23 Oct 2003
-
How does a firewall work?
A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. (The term also implies the security policy that is used with the programs.) An enterprise w... Article | 22 Oct 2003
-
Emergence of WPA threatens gateway vendors
Analysts say that, unless wireless LAN gateway vendors evolve to address customers' changing enterprise management needs, they could be facing extinction at the hands of Cisco and others. Article | 14 Oct 2003
-
Balancing Web filtering and employee privacy
Employers are increasingly concerned with how their employees use the Internet; legal liability and lost productivity can result from goofing off, viewing offensive material or downloading huge files that clog up the network. These concerns have spur... Interview | 20 Aug 2003
-
HP pushes 'access control on steroids'
As part of its new Adaptive Network Architecture Service, Hewlett-Packard is offering a network access control tool that enables admins to grant external parties limited access to network resources without punching holes in the corporate firewall. Article | 30 Jul 2003
-
Firewalls charred by network complexity
Experts discussing the future of firewalls at the recent Burton Group Catalyst Conference 2003 say that the complexity in networks and applications desperately needs to be addressed. Article | 15 Jul 2003
-
MPLS and VPN Architectures: Multicast VPN
This chapter describes in detail how to achieve multicast services between multiple sites of a VPN that has an existing multicast network or is intending to deploy multicast. Article | 06 Jun 2003
-
Cisco Networking Simplified: Security
This chapter excerpt lays out the basic principles of network security in an easy-to-read format with helpful illustrations. Article | 06 Jun 2003
-
CCIE Security: Operating Systems and Cisco Security Applications
This chapter excerpt reviews two of today's most common end user operating systems, UNIX and Windows NT. Article | 14 May 2003
Network Management Strategies for the CIO