Network Security Best Practices and Products

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Phishers and spambots -- appliances that fight back

    Most email security appliances are designed to deflect unsolicited inbound SMTP traffic. In this edition of our Security Spotlight Lisa Phifer examines the benefits of deploying an email security appliance and addresses what specifically to look for ... 

  • Intrusion detection systems -- introduction to IDS and IPCop

    This article, excerpted from the book "Configuring IPCop Firewalls: Closing Borders with Open Source," explores how intrusion detection systems (IDS) and intrusion prevention systems (IPS) including Snort and IPCop protect the network from malicious ... 

  • Security Spotlight: SSL VPN appliances simplify secure access

    By leveraging the ubiquitous Web browser as a client platform, SSL VPN appliances represent a promising alternative for delivering simple-but-secure off-site access to private business services and data. In this tip, Lisa Phifer explores why you shou... 

  • OSI: Securing the Stack, Layer 3 -- The role of ICMP

    Michael Gregg examines the security vulnerabilities of Internet Control Message Protocol (ICMP) and how to help secure OSI Layer 3, the network layer. 

  • Security Spotlight: Network Behavior Analysis goes long and wide

    Need to bulk up your network's backcourt defense? Network Behavior Analysis (NBA) is a new approach to network security that passively monitors your traffic patterns to prevent zero-day exploits, worm outbreaks and employee abuse. Learn more in this ... 

  • OSI: Securing the stack, Layer 1 -- Physical security threats

    Security expert Michael Gregg kicks off his layer-by-layer discussion of OSI model network security with this tip on securing Layer 1 against physical security threats. 

  • BackTrack: The gotta-have, free, network security tool you've never heard of

    Get the power of Linux-based security tools on Windows with this free suite of open source security tools. Contributor and vulnerability assessment expert Kevin Beaver introduces BackTrack and explains its network security testing features. 

  • Data destruction

    How often do we hear about sensitive data falling into the wrong hands? And that data is usually on laptops, imagine the embarrassment if that data was found on something that was thrown away? Contributor Brien Posey explains the need for proper data... 

  • Network intrusion prevention: An allegory

    Security expert Rich Loeber discusses the importance of computer intrusion prevention and provides steps for protecting your network -- as well as keeping geese off your beach. 

  • Network Access Quarantine Control vs. Network Access Protection

    With the number of mobile devices and remote workers growing, network quarantining has been a popular topic lately. Contributor and NAQC expert Jonathan Hassell compares the features of NAQC with the forthcoming NAP program and advises on if and when...