Network Security Best Practices and Products

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Quick Takes: OASIS looks at security

    The Organization for the Advancement of Structured Information Standards has organized a new committee to develop Web services security standards and a new study found two-thirds of data storage centers use storage area networks. 

  • Catalyst Conference 2002: Real considerations for remote access VPNs

    Some customers, vendors and analysts hashed out the pros and cons of remote access virtual private networks and decided they are superior to traditional dial-in scenarios for all but the smallest deployments. 

  • Catalyst Conference 2002: Dwindling budgets, security challenges

    SAN FRANCISCO -- In the age of wireless and open networks, networking managers are grappling with security issues such as where to put the firewall and how to make networks secure in the era of Web services, when business applications interoperate. W... 

  • Intrusion detection systems grow up

    Security is a key consideration for network design. Here network security engineer Michael Martin talks about what intrusion detection systems (IDS) will and won't do for networks. Martin says that for an IDS to be useful in real world conditions, it... 

  • SSL VPNs: Great for basic access but not for power users

    A recent study from Infonetics research finds that Secure Sockets Layer (SSL) virtual private networks (VPNs) are poised to fill a market niche not covered by traditional Internet Protocol Secure (IPsec) VPNs. Ted Studwell, vice president for enginee... 

  • Quick Takes: Security devices and identity management

    New security products have been released by InfoExpress and Business Layers. 

  • Security consultants: The new shark in the pool

    SearchNetworking's Dr. Network says he's found new competitors for lawyers -- in the bottom-feeding department. 

  • Bad Packets: Crypto limits won't work

    In response to the terrorist attacks of Sept. 11, some U.S. policymakers are calling for limitation on encryption technology. 

  • Outsourcing and network security: A good match?

    Hiring another company to handle your network security? In the eyes of many network managers, that's tantamount to hiring mercenaries to guard the castle.