Network Security Monitoring and Analysis

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Using a packet sniffer for network packet analysis

    A packet sniffer may seem like a humble addition to a network professional's toolkit, but when used correctly, packet sniffers (also known as protocol analyzers) can home in on any number of network problems. "Practical Packet Analysis: Using Wiresha... 

  • Network downtime from security attacks proves costly

    Network downtime resulting from security attacks is costing companies a bundle, but steps can be taken to prevent the added expense. 

  • 'Hacking for Dummies' giveaway contest

    Let us know what security tools you use to secure and test your network and you'll be entered into a drawing to win "Hacking for Dummies" by Kevin Beaver. 

  • Network hacking for dummies: Not just for dummies anymore

    Network security is achievable if network pros gain control and test their systems, says author Kevin Beaver in his new book Hacking For Dummies, 2nd Edition. 

  • Network security -- Taking the layered approach

    Network security is tricky business. In his new book Hack the Stack, author and security expert Michael Gregg outlines how to secure the network using the OSI model. 

  • Network security hits home run for Detroit Tigers

    When they made it to the playoffs, the Detroit Tigers had to plan for a boom in network traffic. With that boom came the potential for threats. 

  • Cisco, SAP team-up marries network with risk management

    Cisco and SAP team up to market governance, risk and compliance (GRC) and networking combo. The application/networking vendor relationship highlights SONA's first major proof point to networking professionals. 

  • Network visibility thwarts crime, identifies unwanted traffic

    Networking monitoring tools have helped Vanderbilt University's network team to uncover unwanted and troubling traffic. In some cases, the tools have turned the team into crime fighters. 

  • Network Defenders

    The mission of our Network Defenders series is to provide user stories in which networks were breached or broken by a security threat, and then later fixed with various technology solutions that improved the level of enterprise security. These users ... 

  • Security is the name of the game at Interop

    Messaging security was a hot Interop topic, rivaled only by every other aspect of security. Vendors rolled out wares to protect messaging systems and other points on the network.