Network Security Best Practices and Products

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Using LAN edge switch security features for network defense-in-depth

    Enterprises are turning their focus to the largely unused LAN edge switch security features that can enable the use of ACLs and VLANs for port management and traffic monitoring. LAN edge switches also support network access authentication and can be ... 

  • SSL VPN tutorial

    Some companies see SSL VPNs as a simpler, cheaper way to provide remote access to corporate data. Find out about SSL VPN usage, compare IPsec vs. SSL and decide what's right for your network in this SSL VPN tutorial. 

  • 2010 predictions: What's the worst network security threat this year?

    Hear enterprise network security expert Michael Gregg speak about the worst computer networking threats facing businesses in this 2010 predictions podcast. 

  • Integrating NAC with network security tools

    Integrating network access control solutions with other network security tools and network inventory applications can produce a more complete user and machine identity to strengthen every policy across the network. 

  • How does a firewall work?

    A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. An enterprise with an intranet that allows its workers access to the wider Internet install... 

  • Securing Wireless Systems -- 'Build Your Own Security Lab: A Field Guide for Network Testing,' Chapt

    In order to secure your wireless network you must learn some wireless basics and know how to attack your system. In Securing Wireless Systems, Chapter 9 of 'Build Your Own Security Lab: A Field Guide for Network Testing,' author Michael Gregg discuss... 

  • Securing the new network architecture

    In modern networks, security is less about locking down a perimeter and more about controlling access and behavior and ensuring data safety in a dynamic and mobile environment. 

  • Creating Remote Access and Site-to-Site VPNs with ISA Firewalls: from 'The Best Damn Firewall Book P

    This chapter gives an excellent overview of ISA firewall VPN networking as well as solutions to create everything from remote access PPTP VPN servers to L2TP/IPSec site-to-site VPNs. Learn how to support outbound VPN connections through the ISA firew... 

  • How to choose the best firewall for your enterprise

    Learn how to choose the best firewall for your enterprise. This guide gives you purchasing advice, tells you which IT team is responsible for the perimeter security solution and offers a checklist of risks you must assess before making deciding which... 

  • Introduction to firewalls: Types of firewalls

    To keep your network data secure, read this introduction to firewalls. You'll understand what they are, how they work, which types exist, which ones to buy and how to audit network traffic through this guide.