Email Alerts
-
Firewall change management and automation can curb human error
Firewall change management can enable firewall management automation so that human errors will be less likely to destroy performance and network admins will know the status of their firewall configuration. Tip
-
Do Web application firewalls complicate enterprise security strategy?
Using Web application firewalls should only be one slice of your overall enterprise network security strategy. Even then, users must be aware that application firewalls can leave behind vulnerabilities. Tip
-
Application-layer firewalls defend against attacks up the stack
Application-layer firewalls must be combined with lower-level network security firewalls in order to implement a network firewall strategy that defends against low-level attacks as well as application-aware attacks. Tip
-
How to plan an out-of-band network management system
To design out-of-band network management systems that are both cost efficient and effective, networking teams must consider which assets are crucial for visibility and just how much information they need to see. Tip
-
Application-specific network intrusion detection systems emerge
Integrating network intrusion detection systems can mean using both anomaly and signature-based detection in application-specific tools. Tip
-
Anomaly-based intrusion protection configuration and installation
Network behavior analysis may be the answer to preventing zero-day attacks. You must install an anomaly-based intrusion protection system (IPS) or intrusion detection system (IDS). This article explains step-by-step measures to configure your enterpr... Tip
-
Using nmap for Linux administration and security
The open source tool nmap is ideal for network troubleshooting, scanning and auditing. The tool can be used to identify devices on the network as well as the services running on them. It can also identify advanced information, such as operating syste... Tip
-
Securing the new network architecture: Security for distributed, dynamic networks
In years past, companies relied on network edge security to establish a perimeter separating trusted insiders from everyone else. However, the distributed and dynamic nature of modern networks, combined with targeted threats against applications and ... Tip
-
Network security: Using unified threat management (UTM)
Network security products vary in use and protection. If you're looking at options to secure your network, use this introduction on Unified Threat Management (UTM) to learn about what UTM's advantages are compared to traditional security models. Tip
-
Network analysis -- Enhancing security assessments
Network security assessment doesn't have to rely on expensive automated tools. In this tip, learn how to use data from freely available tools to produce a comprehensive view of network security. Tip
Network Management Strategies for the CIO