Network Security Best Practices and Products

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How to configure Windows Server 2008 advanced firewall MMC snap-in

    Find out new features of the Windows Server 2008 Advanced Firewall -- and how to configure this powerful host-based firewall using the new MMC snap-in -- in this tip. 

  • Governance, compliance, security: How are these network problems?

    Issues of governance, compliance and security are becoming the responsibility of network operations staff because increasingly complex, componentized services are carried on the network. Network staff must cooperate with other teams to ensure good co... 

  • Prevent unauthorized USB devices with software restriction policies, third-party apps

    In the conclusion of his series on preventing unauthorized USB device use on your network, Brien Posey discusses the pros and cons of using software restriction policies such as certificate rules, hash rules, Internet zone rules, and path rules to pr... 

  • Using Windows Vista group policy to prevent unauthorized USB device use

    One of the largest internal threats to network security, and a major source of worry for network administrators, is the use of USB storage devices. USB storage devices can be used to steal large quantities of data from your network. Anything a user h... 

  • USB storage devices: Two ways to stop the threat to network security

    USB storage devices pose a significant threat to network security. Disabling USB ports is an extremely effective way of preventing USB storage devices on your network; however, these sorts of techniques also prevent the use of authorized USB devices.... 

  • Network security: Using unified threat management (UTM)

    Network security products vary in use and protection. If you're looking at options to secure your network, use this introduction on Unified Threat Management (UTM) to learn about what UTM's advantages are compared to traditional security models. 

  • Network security: Empower users without endangering IT

    Like it or not, the security of a network often depends on the participation of end users. Rather than developing an "us vs. them" mindset, you can empower your users with the right policies, guidelines and access methods. In this tip, learn 10 ways ... 

  • Secure Cisco routers against IOS flaw attack

    Learn how to secure Cisco routers against the recently announced Cisco IOS flaw, which could be exploited by hackers. Find out how to determine which routers are affected and ways to protect yourself from this vulnerability, including steps to disabl... 

  • Reduce branch office threats in 10 steps

    Many organizations host business-critical applications in branch offices, but doing so exposes them to many new threats. Here we examine the potential threats to your branch offices and discuss 10 surefire ways to reduce or mitigate them. 

  • Content filtering -- Taming the wild Web

    Delivering safe, fast, transparent Web access that meets workforce needs has never been more challenging. Nearly four out of five FBI-surveyed companies report that employees abuse Internet privileges by downloading pornography or pirated software. E...