Email Alerts
-
Deep packet inspection tools: Proxy vs. stream-based
As more enterprises consider deep packet inspection tools, network managers must choose the technique that works best for them. Tip
-
Network access security challenges: Mobility requires new strategies
With employees accessing core applications on personal devices, engineers are facing new network access security challenges that require intelligence on all components. Tip
-
Planning a virtualization firewall strategy
Creating a virtualization firewall strategy entails determining exactly how you want to protect your virtual environments and then implementing firewall segmentation for security. Tip
-
Firewall change management and automation can curb human error
Firewall change management can enable firewall management automation so that human errors will be less likely to destroy performance and network admins will know the status of their firewall configuration. Tip
-
Do Web application firewalls complicate enterprise security strategy?
Using Web application firewalls should only be one slice of your overall enterprise network security strategy. Even then, users must be aware that application firewalls can leave behind vulnerabilities. Tip
-
Application-layer firewalls defend against attacks up the stack
Application-layer firewalls must be combined with lower-level network security firewalls in order to implement a network firewall strategy that defends against low-level attacks as well as application-aware attacks. Tip
-
How to plan an out-of-band network management system
To design out-of-band network management systems that are both cost efficient and effective, networking teams must consider which assets are crucial for visibility and just how much information they need to see. Tip
-
Application-specific network intrusion detection systems emerge
Integrating network intrusion detection systems can mean using both anomaly and signature-based detection in application-specific tools. Tip
-
Anomaly-based intrusion protection configuration and installation
Network behavior analysis may be the answer to preventing zero-day attacks. You must install an anomaly-based intrusion protection system (IPS) or intrusion detection system (IDS). This article explains step-by-step measures to configure your enterpr... Tip
-
Using nmap for Linux administration and security
The open source tool nmap is ideal for network troubleshooting, scanning and auditing. The tool can be used to identify devices on the network as well as the services running on them. It can also identify advanced information, such as operating syste... Tip
Network Management Strategies for the CIO