Network Security Monitoring and Analysis

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Network security hits home run for Detroit Tigers

    When they made it to the playoffs, the Detroit Tigers had to plan for a boom in network traffic. With that boom came the potential for threats. 

  • Cisco, SAP team-up marries network with risk management

    Cisco and SAP team up to market governance, risk and compliance (GRC) and networking combo. The application/networking vendor relationship highlights SONA's first major proof point to networking professionals. 

  • Network visibility thwarts crime, identifies unwanted traffic

    Networking monitoring tools have helped Vanderbilt University's network team to uncover unwanted and troubling traffic. In some cases, the tools have turned the team into crime fighters. 

  • Network Defenders

    The mission of our Network Defenders series is to provide user stories in which networks were breached or broken by a security threat, and then later fixed with various technology solutions that improved the level of enterprise security. These users ... 

  • Security is the name of the game at Interop

    Messaging security was a hot Interop topic, rivaled only by every other aspect of security. Vendors rolled out wares to protect messaging systems and other points on the network. 

  • Wireless trespasser stopped dead in his tracks

    A security expert working at a California government office spotted an unauthorized person trying to bridge onto the wired network through a wireless NIC card. He put a stop to it. 

  • Gartner underscores five overblown threats

    Two Gartner analysts debunk five overhyped security risks they claim are causing companies to miss out on some key emerging technologies. 

  • Auditor's office wards off potential wireless threats

    Because of its strict anti-wireless policy, the Washington State Auditor's Office needed a way to ensure that no one inside or outside could tap into the state network wirelessly. 

  • Data theft prompts firm to lock down, protect network

    After a disgruntled employee made off with several CDs' worth of critical data, a Michigan automotive data reseller realized it had to install better protection at the endpoints, not at the network core or perimeter. 

  • Public security slip forces Georgia Capitol to lock down WLAN

    More than three years after a TV news crew exposed security flaws in the WLAN at the Georgia State Capitol building, the governor's office is trying again to go wireless.