Network Security Best Practices and Products

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Firewall implementation: Perimeter security placement and management

    For your enterprise firewall implementation, understand where your perimeter security goes, how many you need, what precautions to be aware of and know how to manage and maintain your firewall. 

  • OSI -- Securing the stack

    Secure your network with our OSI model reference that links to all the tips in our "OSI -- securing the stack" series by security expert and author Michael Gregg. The series is based on his book, "Hack the Stack." 

  • Network Infrastructure -- Chapter 9 of "Hacking for Dummies"

    This chapter will help you in selecting tools, scanning network hosts, assessing security with a network analyzer, and will guide you in preventing denial-of-service and infrastructure vulnerabilities. 

  • Network security threats and answers, by industry

    Michael Gregg offers network pros in various industries security advice and step-by-step solutions to help lock down the network. 

  • NAC appliances: Shortcut to access control

    Many network managers are interested in NAC, but a full-blown installation requires a large commitment and investment. To fill the gap between consumer interest and investment, several vendors offer "NAC-in-a-box" appliances that deliver many of NAC'... 

  • Network access control -- More than endpoint security

    Network access control (NAC) holds a great deal of promise for network security, but sorting out the market and product options is a challenge. In this special report, you'll learn how to gauge if your enterprise is ready for NAC, what the difference... 

  • NAC underneath the covers: Endpoint health assessments

    The main focus of NAC these days is to assess and endpoint and determine that it's "healthy" before it's allowed network access. But vendors have different methods of doing so. Here you'll find the questions you need to ask your vendor in order to un... 

  • Network access control

    No network security topic is hotter these days than network access control (NAC). The general concept behind NAC is to secure the network by giving it the power to decide which endpoint devices to let in, namely those that are compliant with all rele... 

  • Application firewalls offer specialized protection

    Network security's most dangerous attacks are aimed at specific application protocols, coding flaws, and configuration errors. Application firewall appliances can help network engineers defeat these increasingly focused and specialized attacks. 

  • Firewalls for Dummies, Chapter 1: Why do you need a firewall?

    Firewalls for Dummies, Chapter 1, by Brian Komar, Ronald Beekelaar and Joern Wettern provides an excellent overview of what a firewall is, what it does and how it works. Further, it explains when you might need a firewall, covering issues like Intern...