Network Security Monitoring and Analysis

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • The most important security lesson for employees

    Social engineering may be the most significant security threat organizations face when it comes to educating their employees. Security expert Michael Gregg explains why, and provides instructions for preventing the manipulation of your employees, in ... 

  • Public security slip forces Georgia Capitol to lock down WLAN

    More than three years after a TV news crew exposed security flaws in the WLAN at the Georgia State Capitol building, the governor's office is trying again to go wireless. 

  • Monitoring goes out-of-band

    A new data access switch from Gigamon boosts the number of SPAN ports on the network for out-of-band monitoring. 

  • Endpoint security threats meet their match

    Securing the network at every endpoint is changing with some new products that limit, prohibit and protect endpoints and users. 

  • Cisco unveils steps toward self-defending network

    In his keynote, CEO John Chambers touted product enhancements that advance his push for networks that can defend themselves without human intervention. 

  • Flood of NAC products toughens security decisions

    The continuing flood of network access control products is forcing networking pros to weigh all of the options before securing their networks. 

  • Wireless LAN management: Managing security compliance

    Find out the security threats that need to be addressed to make your network compliant with security regulations. 

  • FastFacts on spyware

    This quick guide will get you up to speed on spyware with a definition, tips on recognizing the warning signs of spyware and advice for removing it from your computer. 

  • IM threats grow, response lags

    Reports from IMlogic and Akonix show that IM threats are growing while IT shops are behind in their preparedness. In fact, many firms are still totally unaware of just how much danger actually exists. 

  • Property management company beefs up network security

    Enterprises could learn a lesson from Managed Services Inc., which rolled out wired and wireless network access to dozens of its properties nationwide, but in doing so found security could suffer.