Email Alerts
-
Hospital gains network visibility by convincing vendors to collaborate
When Concord Hospital needed to install a network behavioral analysis (NBA) tool into a Nortel network built on multi-link trunking, the hospital's network chief had to convince Nortel to collaborate with his preferred NBA vendor. Article
-
What software monitors and locks users from accessing my router?
Learn which software programs monitors and locks unauthorized users from accessing your router for Internet use in this expert response with our network security expert, Michael Gregg. Ask the Expert
-
Data leak prevention starts with trusting your users
Cisco security guru Christopher Burgess has some radical suggestions for network security to beef up data leak prevention: Trust your users, and let them help decide policy. Article
-
NagVis -- 'Nagios: System and Network Monitoring, Second Edition,' Chapter 18
Open source network monitoring tool, Nagios, catches problems to help you spend less time troubleshooting. To read about the Nagios add-on, NagVis1, see this chapter download of the book "Nagios: System and Network Monitoring, Second Edition." You wi... Chapter Download
-
What is a genetic algorithm and where can I learn more about them online?
Learn about genetic algorithms as well as where to find online resources for understanding them. Ask the Expert
-
Networking data visualization not just for pointy-headed bosses
Dipping your feet in networking data visualization doesn't take expensive software: just Excel and a little help from your friends. Article
-
Visual Security Analysis -- 'Applied Security Visualization,' Chapter 5
Visually analyzing security data can be separated into three classes: reporting, historical analysis, and real-time monitoring. In chapter 5 from the book, 'Applied Security Visualization,' historical analysis is discussed in four sections: time-seri... Chapter Download
-
SIEM platform secures university's open network
With security information and event management platform QRadar, Wayne State University has secured its open network without locking down its systems. Article
-
Network forensics appliance gets storage boost and 10 GbE support
WildPackets has launched its latest network forensics appliance, the Omnipliance SuperCore, which features vastly increased storage capacity and support for 10 GbE networks. The Omnipliance SuperCore features up to 64 terabytes of local storage and s... Article
-
Securing the new network architecture: Security for distributed, dynamic networks
In years past, companies relied on network edge security to establish a perimeter separating trusted insiders from everyone else. However, the distributed and dynamic nature of modern networks, combined with targeted threats against applications and ... Tip
Network Management Strategies for the CIO