- Network Security: Tools, Products, Software
- Network Protocols and Security
- Secure VPN Setup and Configuration
- Network Intrusion Detection and Analysis
- Wireless Network Security: Setup and Tools
- NAC and Endpoint Security Management
Email Alerts
-
Deploying network security devices: Tips to avoid failed deployments
John Burke offers advice on effectively deploying network security devices to protect sensitive data and manage the mobility boom in the enterprise.Tip
-
Evaluating network security virtualization products
Don't risk making mistakes when you evaluate network security virtualization products. Our six key points will keep you on track.Tip
-
Targeted attack protection: Step-by-step preparation and mitigation
Targeted attacks can be stopped with a defense-in-depth strategy. Michael Cobb explains how to implement a targeted attack prevention plan.Tip
-
Prioritizing the need to update Cisco routers: Is it urgent?
Matthew Pascucci discusses how to prioritize the need to update Cisco routers, and offers patch management tips for enterprises.Answer
-
Software-defined networking: Exploring SDN security pros and cons
Matthew Pascucci offers an intro to software-defined networking and explains why SDN security relies on securing the SDN controller at all costs.Tip
-
security information and event management (SIEM)
Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of organization’s information technology (IT) security. Definition
-
Network Security Technologies
This section of our Eye On IT Security Series examines the latest in network security appliances, including the latest features finding their way into intrusion prevention and intrusion detection systems, unified threat management, and network monitoring and forensics technology.partOfGuideSeries
-
Cisco SecureX strategy gets boost with application-aware firewall
Under new leadership, the networking giant's security group relaunched Cisco SecureX with several new products, including an application-aware firewall.News | 28 Feb 2012
-
Defense in Depth 2.0
This video will offer an executive overview of not only the key business and technical issues that have necessitated a dramatic change in defense in depth design, but also how to develop a strategy that can be used to drive an organization’s layered defense tactics amid a threat landscape that has evolved rapidly in the last 1-2 years.Video
-
Lumension adds to its endpoint security products with EIC
Lumension announced the Endpoint Intelligence Center to protect endpoint computers from threats, malware and third-party software vulnerabilities.Article | 14 Feb 2011
-
IPv6 address
An IPv6 address is a 128-bit alphanumeric string that identifies an endpoint device in the Internet Protocol Version 6 (IPv6) addressing scheme. The new IP address format was created to enable the trillions of new IP addresses required to connect not only an ever-greater number of computing devices but also the rapidly expanding numbers of items with embedded computers in them.Definition
-
Neohapsis: IPv4 plus IPv6 enables man-in-the-middle attacks
Neohapsis' Scott Behrens explains how having both IPv4 and IPv6 Internet protocols enabled can lead to man-in-the-middle attacks.News | 09 Aug 2013
-
How key MDM features affect mobile security policy management
As MDM features become more robust, enterprises must not only look for mature products, but also evolve mobile security policies accordingly.Tip
-
Enterprise network security visibility: Beyond traditional defenses
Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security technologies place an increased demand on the network. This TechGuide explores how to improve network security visibility with network flow analysis tools, cloud security monitoring solutions and anomaly-based monitoring technology.E-Handbook
-
Using network flow analysis to improve network security visibility
To overcome network security issues from advanced attackers and BYOD, security professionals are turning to network flow analysis to gain improved network security visibility.Tip
-
IPv6 implementation security advice from Check Point's Robert Hinden
IPv6 co-inventor Robert Hinden outlines IPv6 implementation security risks and a critical IPv6 security tip for working with network security vendors.Video
-
Does automatic IP addressing carry any security implications?
Is automatic IP addressing a suitable option, or should network and security teams still manually assign IP addresses? Expert Brad Casey discusses.Answer
-
Gauging UPnP security risks: Is UPnP secure enough for enterprise use?
Is UPnP secure enough for enterprise use? Network security expert Brad Casey assesses UPnP security risks and offers advice for mitigating the threat.Tip
-
Address IPv6 security before your time runs out
Most networks have partial deployment of IPv6 often without IT realizing it. It’s time to take stock of the security implications before attackers do.Feature
-
Address IPv6 security before your time runs out
- VIEW MORE ON : Network Protocols and Security
-
VPN use in China: Protecting sensitive business data
With VPN use in China prohibited, businesses have reason to be concerned about the privacy of their data.Answer
-
wildcard certificate
A wildcard certificate is a digital certificate that is applied to a domain and all its subdomains.Definition
-
Fact or fiction: Endpoint threat protection controls that work
In this podcast, Mike Rothman discusses threat protection myths and how to ensure enterprise endpoint security controls are effective.Podcast
-
The endpoint data security revolution: Going beyond antivirus
Video: Mike Rothman assesses next-generation endpoint data security strategy and how to integrate endpoint technologies to spot persistent attackers.Video
-
Using network flow analysis to improve network security visibility
To overcome network security issues from advanced attackers and BYOD, security professionals are turning to network flow analysis to gain improved network security visibility.Tip
-
Targeted attack protection: Step-by-step preparation and mitigation
Targeted attacks can be stopped with a defense-in-depth strategy. Michael Cobb explains how to implement a targeted attack prevention plan.Tip
-
IPv6 security risks: How a teenager can hack IPv6 security
Video: Wolfgang Kandek discusses key IPv6 security risks, as well as how his teenage son was able to inadvertently hack IPv6 on his home network.Video
-
The new era of big data security analytics
The information security industry needs to shift its focus to data-driven security.Feature
-
The new era of big data security analytics
The information security industry needs to shift its focus to data-driven security.
-
Best intrusion detection/prevention products 2011
-
PDF download: Information Security magazine October 2012
In this issue, find out who won this year's Readers' Choice Awards. Also learn about threat management best practices and how hacktivists are impacting the threat landscape.Magazine
-
security event (security incident)
A security event is a change in the everyday operations of a network or IT service, indicating that an security policy may have been violated or a security safeguard may have failed.Definition
- VIEW MORE ON : Network Intrusion Detection and Analysis
-
Deploying network security devices: Tips to avoid failed deployments
John Burke offers advice on effectively deploying network security devices to protect sensitive data and manage the mobility boom in the enterprise.Tip
-
Fact or fiction: Endpoint threat protection controls that work
In this podcast, Mike Rothman discusses threat protection myths and how to ensure enterprise endpoint security controls are effective.Podcast
-
The endpoint data security revolution: Going beyond antivirus
Video: Mike Rothman assesses next-generation endpoint data security strategy and how to integrate endpoint technologies to spot persistent attackers.Video
-
How key MDM features affect mobile security policy management
As MDM features become more robust, enterprises must not only look for mature products, but also evolve mobile security policies accordingly.Tip
-
BYOD (bring your own device)
BYOD (bring your own device) is the increasing trend of employees bringing their own devices to work. Smartphones are the most common example but employees also take tablets, laptops and USB drives into the workplace. BYOD is part of the larger trend of IT consumerization, in which consumer software and hardware are being brought into the enterprise.Definition
-
How can solution providers augment BlackBerry PlayBook security?
Expert Lisa Phifer explains how to help customers with PlayBook Security, and reveals future PlayBook enterprise features.Tip
-
Fact or fiction: Endpoint threat protection controls that work
In this podcast, Mike Rothman discusses threat protection myths and how to ensure enterprise endpoint security controls are effective.Podcast
-
The endpoint data security revolution: Going beyond antivirus
Video: Mike Rothman assesses next-generation endpoint data security strategy and how to integrate endpoint technologies to spot persistent attackers.Video
-
How key MDM features affect mobile security policy management
As MDM features become more robust, enterprises must not only look for mature products, but also evolve mobile security policies accordingly.Tip
-
Using network flow analysis to improve network security visibility
To overcome network security issues from advanced attackers and BYOD, security professionals are turning to network flow analysis to gain improved network security visibility.Tip
-
How to choose the best antimalware products: Questions to ask vendors
Mike Rothman offers 10 critical questions to ask antimalware vendors when seeking out the best antimalware products for enterprise use.Tip
-
Quiz: Endpoint security pitfalls to avoid
This quiz tests your ability to avoid common endpoint control pitfalls that many others have learned to hard way. Type: QUIZQuiz
-
Securing Android devices with a mobile device security policy
Secure employee-liable Android devices with workable security policies that discover, enroll, protect and monitor all Android endpoints.Tip
-
Smartphone encryption, authentication ease mobile management
New security tools allow companies to extend encryption and authentication to mobile devices.Magazine
-
Microsoft security proposal is noble, but no way
-
Best antimalware products 2011
- VIEW MORE ON : NAC and Endpoint Security Management
Security Management Strategies for the CIO