• May 01, 2007 01 May'07

    Traversal Using Relay NAT (TURN)

    Traversal Using Relay NAT (TURN) is a protocol, currently at the working draft stage, that is intended to govern the reception of data over a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) connection by a single communications ...  Continue Reading

  • May 01, 2007 01 May'07

    OSI: Securing the Stack, Layer 8 -- Social engineering and security policy

    Network security is essential at every layer of the OSI model, including the mythical eighth layer, where users interact with technology. Since hackers can use social engineering to exploit people, it is important to train your users and implement ...  Continue Reading

  • May 01, 2007 01 May'07

    Reduce branch office threats in 10 steps

    Many organizations host business-critical applications in branch offices, but doing so exposes them to many new threats. Here we examine the potential threats to your branch offices and discuss 10 surefire ways to reduce or mitigate them.  Continue Reading

-ADS BY GOOGLE

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close