Network Security Monitoring and Analysis

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Securing the new network architecture: Security for distributed, dynamic networks

    In years past, companies relied on network edge security to establish a perimeter separating trusted insiders from everyone else. However, the distributed and dynamic nature of modern networks, combined with targeted threats against applications and ... 

  • Network security: Using unified threat management (UTM)

    Network security products vary in use and protection. If you're looking at options to secure your network, use this introduction on Unified Threat Management (UTM) to learn about what UTM's advantages are compared to traditional security models. 

  • Network analysis -- Enhancing security assessments

    Network security assessment doesn't have to rely on expensive automated tools. In this tip, learn how to use data from freely available tools to produce a comprehensive view of network security. 

  • Content filtering -- Taming the wild Web

    Delivering safe, fast, transparent Web access that meets workforce needs has never been more challenging. Nearly four out of five FBI-surveyed companies report that employees abuse Internet privileges by downloading pornography or pirated software. E... 

  • Security Spotlight: Network Behavior Analysis goes long and wide

    Need to bulk up your network's backcourt defense? Network Behavior Analysis (NBA) is a new approach to network security that passively monitors your traffic patterns to prevent zero-day exploits, worm outbreaks and employee abuse. Learn more in this ... 

  • BackTrack: The gotta-have, free, network security tool you've never heard of

    Get the power of Linux-based security tools on Windows with this free suite of open source security tools. Contributor and vulnerability assessment expert Kevin Beaver introduces BackTrack and explains its network security testing features. 

  • Detecting hack attacks: Application logging is critical

    Now that networks are fairly well-protected, attackers are targeting application servers. In this tip, security expert Mike Chapple explains how implementing application layer logging is becoming a crucial addition to every organization's security st... 

  • Nmap: A valuable open source tool for network security

    Open source tool Nmap is a popular choice amongst hackers and security pros alike for network mapping and testing for network vulnerabilities. 

  • Securing the internal Windows network

    Hardening your network from the outside world is a good idea, but don't forget to watch out for internal threats. Security testing expert Kevin Beaver provides a testing to-do list for securing your Windows network from within. 

  • How to recover your network after a security breach

    If you have the time and money to invest in some of the more impressive network management systems, you can possibly recover your network after a security attack by clicking a few buttons. However, if you're on a budget, with a typical medium-sized n...