Network Security Monitoring and Analysis

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Wireless trespasser stopped dead in his tracks

    A security expert working at a California government office spotted an unauthorized person trying to bridge onto the wired network through a wireless NIC card. He put a stop to it. 

  • Gartner underscores five overblown threats

    Two Gartner analysts debunk five overhyped security risks they claim are causing companies to miss out on some key emerging technologies. 

  • Auditor's office wards off potential wireless threats

    Because of its strict anti-wireless policy, the Washington State Auditor's Office needed a way to ensure that no one inside or outside could tap into the state network wirelessly. 

  • Data theft prompts firm to lock down, protect network

    After a disgruntled employee made off with several CDs' worth of critical data, a Michigan automotive data reseller realized it had to install better protection at the endpoints, not at the network core or perimeter. 

  • Public security slip forces Georgia Capitol to lock down WLAN

    More than three years after a TV news crew exposed security flaws in the WLAN at the Georgia State Capitol building, the governor's office is trying again to go wireless. 

  • Monitoring goes out-of-band

    A new data access switch from Gigamon boosts the number of SPAN ports on the network for out-of-band monitoring. 

  • Endpoint security threats meet their match

    Securing the network at every endpoint is changing with some new products that limit, prohibit and protect endpoints and users. 

  • Cisco unveils steps toward self-defending network

    In his keynote, CEO John Chambers touted product enhancements that advance his push for networks that can defend themselves without human intervention. 

  • Flood of NAC products toughens security decisions

    The continuing flood of network access control products is forcing networking pros to weigh all of the options before securing their networks. 

  • IM threats grow, response lags

    Reports from IMlogic and Akonix show that IM threats are growing while IT shops are behind in their preparedness. In fact, many firms are still totally unaware of just how much danger actually exists.