Network Security Best Practices and Products

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How to troubleshoot Cisco PIX ASDM installation problems

    In part two of this tip, look at some common problems that arise with ASDM installation. 

  • Understanding the differences between IDS and IPS

    We all know that the Internet is a haven for cyber criminals who use the connectivity to launch an unprecedented number of attacks against enterprise networks. IDS and IPS have been developed to combat these threats, but they are not one in the same.... 

  • The network administrator's guide to forensic first response

    The time between discovery of an incident and the handover of digital evidence is critical for the possibility of successful evidence retrieval. Mishandled evidence, whether to be used in court or solely in house, can damage the integrity of the inv... 

  • Placing systems in a firewall topology

    Factors to consider when deciding where to place individual systems in a firewall topology, such as bastion host, screened subnet and multi-homed firewalls. 

  • Surefire network security strategies

    Tired of fighting the latest worms and viruses? Following our preventative steps can make your network more resistant and fend off future problems. 

  • Maximizing IDS/IPS implementations

    This tip looks at problems administrators face when implementing IDS/IPS systems and provides suggestions on how to increase the amount of valid information they provide. 

  • Hardening your router in 9 easy steps

    For most enterprise LANs, the router has become one of the most critical security appliances in use. Configured properly, it can keep all but the most determined bad guys out, and if you want, it can even keep the good guys in. But an improperly conf... 

  • Testing Group Policy security

    So you've hardened Group Policy settings to protect Windows from attacks -- but are you sure all of those settings are working? Contributor Kevin Beaver offers several methods for testing Group Policy. 

  • How to choose a firewall

    Despite the development and evolution of security technologies, the firewall remains a vital component of any network architecture, and today's organizations have myriad options to choose from. This tip outlines five basic questions you should ask wh... 

  • Popular VLAN attacks and how to avoid them

    Learn how to secure a VLAN from popular attacks such as the VLAN hopping attack.