Network Security Best Practices and Products

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Two-factor authentication and compliance: What it is and isn't

    The Federal Financial Institutions Examination Council has mandated that federal institutions deploy two-factor authentication for online banking. But what constitutes two-factor authentication is open to interpretation. 

  • How to ensure your next firewall isn't a dud

    A firewall can be an invaluable tool when it comes to securing your network. On the other hand, a less-than-stellar firewall can leave your network open to attack and leave you with a false sense of security. Following a few simple steps when selecti... 

  • Protecting your network against spoofed IP packets

    These days, the vast majority of administrators go to great lengths to protect the files on their network. Typically, elaborate firewalls are used to keep outsiders away from file servers. The files residing on those servers often lie behind an intri... 

  • What to do when you've been hacked

    Network hacking attacks are more common that most of us would like to admit. In the second installment of his series on managing secure networks, Michael Gregg looks at six questions you need to ask of your organization if you've been hacked, and sug... 

  • Using Netsh with Windows Firewall

    This tip examines how to configure and troubleshoot Windows Firewall using the Netsh command-line utility. The procedures covered apply to both the Windows XP Service Pack 2 and Windows Server 2003 Service Pack 1 operating system platforms. 

  • Application firewall tips and tricks

    Network firewalls only examine packet information at the transport layer and below. For a more thorough examination of network traffic, organizations can deploy application firewalls, which work at the application layer of the TCP/IP stack to interce... 

  • How to use IPsec filtering rules to filter network traffic

    Learn how to control what enters and exits your PCs by using IPsec filtering rules to filter particular protocol and port combinations for both inbound and outbound network traffic. 

  • Guide to intrusion detection and prevention

    This guide covers intrusion detection and prevention. 

  • Network security checklist

    While 100% security is hardly a possibility, there are several things that you can do to make your network more secure. Learn about them with this network security checklist. 

  • Cisco PIX ASDM: How to install

    Learn some helpful hints for installing and troubleshooting Cisco's Adaptive Security Device Manager (ASDM) for PIX firewalls in this two-part tip.