Email Alerts
-
Can your security strategy handle networked facilities management?
Linking building and power management systems to converged Ethernet networks brings new security concerns. Tip
-
How to connect virtual environments to DMZ network architecture
Connecting virtualized environments to DMZ network architecture creates new challenges. Network managers must learn new design methodologies to protect virtual traffic in the DMZ. Tip
-
Best practices for connecting virtualization hosts to DMZ networks
DMZ networks can be used to protect virtualization hosts, but best practices must be considered, including combing virtual and physical firewalls and locking down virtual switches. Tip
-
Planning a virtualization firewall strategy
Creating a virtualization firewall strategy entails determining exactly how you want to protect your virtual environments and then implementing firewall segmentation for security. Tip
-
Firewall change management and automation can curb human error
Firewall change management can enable firewall management automation so that human errors will be less likely to destroy performance and network admins will know the status of their firewall configuration. Tip
-
Do Web application firewalls complicate enterprise security strategy?
Using Web application firewalls should only be one slice of your overall enterprise network security strategy. Even then, users must be aware that application firewalls can leave behind vulnerabilities. Tip
-
Application-layer firewalls defend against attacks up the stack
Application-layer firewalls must be combined with lower-level network security firewalls in order to implement a network firewall strategy that defends against low-level attacks as well as application-aware attacks. Tip
-
Integrating LAN edge switch security and network access control
The best form of network edge security is to integrate LAN edge switch security features with network access control devices so that networking teams can use VLANs, ACLs and health checks at the switch alongside NAC's behavior analysis. Tip
-
Configuring LAN edge switches for network access authentication
Intelligent edge switches can play a role in network access authentication, but these functions are often overlooked. Tip
-
Preventing hacker attacks with network behavior analysis IPS
Deter enterprise network attacks by learning how network behavior analysis can be used to protect data. Understand the advantages and disadvantages of anomaly-based and signature-based protection and how to use them together to secure your network ag... Tip
Network Management Strategies for the CIO