Network Security Monitoring and Analysis
- November 05, 2009
Network automation is coming, whether network engineers are ready for it or not. It may still lag behind more general IT process automation, but network management tools are evolving, and enterprises are demanding that engineers reduce complexity ...
- October 07, 2009
Network security risks of outsourcing tech jobs worry IT executives, according to a new survey. Without the right protections, outsourcing could expose companies to a network security breach.
- April 23, 2009
Even as mobile workers connect to the network from a wide variety of devices, the network firewall remains the bedrock of network security. But the role of the firewall is evolving from perimeter defender to gatekeeper.
- November 13, 2008
While Intel's network security logged meticulous employee access data, red flags weren't raised to stop one potential thief until he had made off with the data.
- October 30, 2008
When Concord Hospital needed to install a network behavioral analysis (NBA) tool into a Nortel network built on multi-link trunking, the hospital's network chief had to convince Nortel to collaborate with his preferred NBA vendor.
- October 23, 2008
Cisco security guru Christopher Burgess has some radical suggestions for network security to beef up data leak prevention: Trust your users, and let them help decide policy.
- August 20, 2008
Dipping your feet in networking data visualization doesn't take expensive software: just Excel and a little help from your friends.
- August 14, 2008
With security information and event management platform QRadar, Wayne State University has secured its open network without locking down its systems.
- July 02, 2008
WildPackets has launched its latest network forensics appliance, the Omnipliance SuperCore, which features vastly increased storage capacity and support for 10 GbE networks. The Omnipliance SuperCore features up to 64 terabytes of local storage and ...
- May 22, 2008
Networking professionals should be ready to take a leadership role in defining and executing data loss prevention strategies.
- May 14, 2008
Most network security products focus on keeping the bad guys -- Trojans, viruses and hackers -- outside of the network, but data loss prevention (DLP) keeps the good stuff -- sensitive enterprise data -- in. With more business data leaks tainting ...
- April 28, 2008
eTelemetry announced at Interop that it has added bandwidth throttling and filtering technologies to Metron 2.0, the new version of its Web activity monitoring appliance.
- November 20, 2007
Network security is top priority for one of the world's largest law firms, which recently deployed endpoint security tools to help enforce its strict security policies.
- July 30, 2007
A packet sniffer may seem like a humble addition to a network professional's toolkit, but when used correctly, packet sniffers (also known as protocol analyzers) can home in on any number of network problems. "Practical Packet Analysis: Using ...
- March 14, 2007
Network downtime resulting from security attacks is costing companies a bundle, but steps can be taken to prevent the added expense.