Network Security Best Practices and Products

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How to choose the best firewall for your enterprise

    Learn how to choose the best firewall for your enterprise. This guide gives you purchasing advice, tells you which IT team is responsible for the perimeter security solution and offers a checklist of risks you must assess before making deciding which... 

  • Introduction to firewalls: Types of firewalls

    To keep your network data secure, read this introduction to firewalls. You'll understand what they are, how they work, which types exist, which ones to buy and how to audit network traffic through this guide. 

  • OSI -- Securing the stack

    Secure your network with our OSI model reference that links to all the tips in our "OSI -- securing the stack" series by security expert and author Michael Gregg. The series is based on his book, "Hack the Stack." 

  • Network Infrastructure -- Chapter 9 of "Hacking for Dummies"

    This chapter will help you in selecting tools, scanning network hosts, assessing security with a network analyzer, and will guide you in preventing denial-of-service and infrastructure vulnerabilities. 

  • Network security threats and answers, by industry

    Michael Gregg offers network pros in various industries security advice and step-by-step solutions to help lock down the network. 

  • NAC appliances: Shortcut to access control

    Many network managers are interested in NAC, but a full-blown installation requires a large commitment and investment. To fill the gap between consumer interest and investment, several vendors offer "NAC-in-a-box" appliances that deliver many of NAC'... 

  • Network access control -- More than endpoint security

    Network access control (NAC) holds a great deal of promise for network security, but sorting out the market and product options is a challenge. In this special report, you'll learn how to gauge if your enterprise is ready for NAC, what the difference... 

  • NAC underneath the covers: Endpoint health assessments

    The main focus of NAC these days is to assess and endpoint and determine that it's "healthy" before it's allowed network access. But vendors have different methods of doing so. Here you'll find the questions you need to ask your vendor in order to un... 

  • Network access control

    No network security topic is hotter these days than network access control (NAC). The general concept behind NAC is to secure the network by giving it the power to decide which endpoint devices to let in, namely those that are compliant with all rele... 

  • Application firewalls offer specialized protection

    Network security's most dangerous attacks are aimed at specific application protocols, coding flaws, and configuration errors. Application firewall appliances can help network engineers defeat these increasingly focused and specialized attacks.