Email Alerts
-
Quick Takes: OASIS looks at security
The Organization for the Advancement of Structured Information Standards has organized a new committee to develop Web services security standards and a new study found two-thirds of data storage centers use storage area networks. Article | 26 Jul 2002
-
Catalyst Conference 2002: Real considerations for remote access VPNs
Some customers, vendors and analysts hashed out the pros and cons of remote access virtual private networks and decided they are superior to traditional dial-in scenarios for all but the smallest deployments. Article | 16 Jul 2002
-
Catalyst Conference 2002: Dwindling budgets, security challenges
SAN FRANCISCO -- In the age of wireless and open networks, networking managers are grappling with security issues such as where to put the firewall and how to make networks secure in the era of Web services, when business applications interoperate. W... Interview | 15 Jul 2002
-
Intrusion detection systems grow up
Security is a key consideration for network design. Here network security engineer Michael Martin talks about what intrusion detection systems (IDS) will and won't do for networks. Martin says that for an IDS to be useful in real world conditions, it... Interview | 21 Jun 2002
-
SSL VPNs: Great for basic access but not for power users
A recent study from Infonetics research finds that Secure Sockets Layer (SSL) virtual private networks (VPNs) are poised to fill a market niche not covered by traditional Internet Protocol Secure (IPsec) VPNs. Ted Studwell, vice president for enginee... Interview | 20 Jun 2002
-
Quick Takes: Security devices and identity management
New security products have been released by InfoExpress and Business Layers. Article | 17 May 2002
-
Security consultants: The new shark in the pool
SearchNetworking's Dr. Network says he's found new competitors for lawyers -- in the bottom-feeding department. Article | 18 Mar 2002
-
Bad Packets: Crypto limits won't work
In response to the terrorist attacks of Sept. 11, some U.S. policymakers are calling for limitation on encryption technology. Article | 26 Sep 2001
-
Outsourcing and network security: A good match?
Hiring another company to handle your network security? In the eyes of many network managers, that's tantamount to hiring mercenaries to guard the castle. Article | 30 Jul 2001
Network Management Strategies for the CIO