Email Alerts
-
Unlock new pathways to network security architecture
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of applications at an all-time high; security teams are looking at new and different ways to isolate, moni... E-Zine
-
Enterprise network security visibility: Beyond traditional defenses
Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security technologies place an increased demand on the network. This TechGuide explores how to improve network security... E-Handbook
-
Unlock new pathways to network security architecture
Cover story: Want to shed appliances? Consolidation and new platforms hold promise for security teams. Feature
-
Quiz: Reinventing defense in depth
This quiz is part of SearchSecurity.com’s Intrusion Defense Security School lesson, Reinventing defense in depth. Reinforce your knowledge of the key concepts of this lesson by taking the five-question quiz below. Quiz
-
Quiz: Application and network log management program planning
Find out how much you've retained from the Application and log management program planning Security School lesson. Quiz
-
Quiz: Securing the converged infrastructure
A five-question multiple-choice quiz to test your understanding of the content presented by expert John Burke in this lesson of SearchSecurity.com's Integration of Networking and Security School. Quiz
-
Quiz: Using the network to secure the application layer
A five-question multiple-choice quiz to test your understanding of the content presented by expert Michael Cobb in this lesson of SearchSecurity.com's Integration of Networking and Security School. Quiz
-
ISM landing page mock up
Windows IT management tip
-
Answer page: Integrating security into the network quiz
SearchSecurity Retention
-
Integrating security into the network quiz
Find out how much you've learned about integrating security into the network in Identity and Access Management Security School. Identity and Access Manag
-
The Architectural Model
This security architecture clickable diagram depicts the elements of organizational security architecture and how they interact with each other. The presentation here is slanted toward a corporate view in terms of the usage, but essentially all eleme... Enterprise Information Se
-
Snort Intrusion Detection and Prevention Guide
Answers to frequently asked questions related to the open source Snort intrusion detection and prevention system. SearchSecurity Technical
- See more Essential Knowledge on Network Device Management
-
Upgrading the network? Don't forget the network security tools
Network security tools -- like firewalls-- must be upgraded when moving to a high-speed enterprise network in order to prevent bottlenecks. News | 29 Aug 2013
-
SSH keys audited automatically by free tool
SSH Communications Security will offer a free tool for auditing SSH key use within large organizations at next week's Infosecurity Europe conference. News | 16 Apr 2013
-
US-CERT warns of new Samsung, Dell printer threat
Hard-coded passwords on some Samsung and Dell printers could enable an attacker to take control of an affected device. News | 27 Nov 2012
-
HP printer vulnerabilities leave millions of printers susceptible to attack
Researchers at Columbia University have discovered a vulnerability in HP’s LaserJet printers that could allow attackers to gain complete remote control. News | 30 Nov 2011
-
Eye On: Network security management
This special report examines fundamental issues key to successful enterprise network security management. News | 02 Nov 2011
-
Better methods needed to discover network configuration flaws
Many network security professionals take the wrong approach when testing their networks, according to one prominent security expert. Article | 15 Feb 2011
-
Researchers uncover Cisco firewall vulnerabilities, McAfee console flaws
While the vendors have released patches, SecureWorks researchers told Black Hat 2010 attendees that many enterprises place too much trust in their security systems and fail to check them for basic vulnerabilities. Article | 28 Jul 2010
-
Researchers find thousands of flawed embedded devices
Columbia University researchers found thousands of devices, from home routers to video conferencing units at risk. They say their research has implications for enterprises. Article | 28 Oct 2009
-
SIEM: Not for small business, nor the faint of heart
Technologists say security information and event management success depends not on the product, but on the risk and information management program implemented with it. Also, small businesses lack the resources to get much value from SIEM systems. Article | 22 Apr 2009
-
Ixia network security tool exposes problems
IxDefend from Ixia addresses network device and application flaws by fuzzing them to expose flaws and trigger problems. Article | 02 Dec 2008
- See more News on Network Device Management
-
No firewall? How disabling the firewall can improve network security
Having no perimeter firewall may seem ludicrous, but Joel Snyder explains why disabling the firewall can actually improve enterprise network security. Tip
-
Reassess embedded systems security in light of printer vulnerabilities
Recent high-profile printer vulnerabilities illustrate why enterprises need to be aware of embedded systems security. Expert Nick Lewis discusses. Tip
-
VoIP eavesdropping: Hardening network security to contain VoIP risks
Mike Chapple analyzes the VoIP risks posed by implementing a VoIP network and exposes the reality of telephone eavesdropping. Tip
-
Log Parser examples: Using the free log analysis tool
Log analysis is an essential security function for almost all enterprises, and, with Log Parser, much of it can be done for free. Learn how to use Microsoft's free Log Parser in this expert tip. Tip
-
SOC 2.0: Three key steps toward the next-generation security operations center
According to Forrester Research, traditional security operations are no longer practical. Forrester's John Kindervag discusses the new model, SOC 2.0, why it's important, and how to make it happen. Tip
-
Creating a network endpoint security policy for hostile endpoints
The plethora of IP-enabled devices available today makes it harder to discern a friendly endpoint from a hostile one. Learn how to create an endpoint security policy for non-corporate-owned devices. Tip
-
Log management best practices: Five tips for success
The right log management tool can quickly seem like the wrong one without advance planning on how to make the most of it. Diana Kelley offers six log management best practices to help do just that. Tip
-
Endpoint fingerprinting: How to improve NAC security for 'dumb devices'
Many enterprises underestimate the potential security problems posed by "dumb devices" like network printers or IP phones. Forrester Research analyst Usman Sindhu explains how endpoint fingerprinting can be used as a NAC add-on to identify and monito... Tip
-
Database activity monitoring (DAM) software deployment issues to avoid
Database activity monitoring software deployments can have their shortcomings. For example, issues with network monitoring and policy overload can impact compliance audits and database performance. Tip
-
Analyzing MSSP providers' log files for IT security events
Analyzing firewall, Windows server and antivirus log files can seem like an endless and tedious task, especially for an understaffed security team, but it's extremely important for detecting IT security events. Read more in this network security expe... Tip
- See more Tips on Network Device Management
-
HP printer discovery issue highlights printer security best practices
In wake of an HP printer discovery issue where Google indexed thousands of printers, learn best practices to keep network printers off the Internet. Answer
-
Fiber optic networking: Assessing security risks
Matthew Pascucci discusses the potential security risks associated with fiber optic networking. Answer
-
The fundamentals of designing a secure network
When designing a secure network segmentation, monitoring, logging and encryption should be a priority. Matt Pascucci explains in this expert Q&A. Answer
-
How to review VoIP phone security amid Cisco IP phone vulnerabilities
In light of recent Cisco IP phone vulnerabilities, expert Brad Casey evaluates VoIP phone security and offers measures to secure VoIP phones. Answer
-
Huawei router security: Is there legitimate cause for concern?
Security expert Matthew Pascucci discusses Huawei router security and offers four tips for evaluating the security of enterprise network equipment. Answer
-
Should syslog format be mandatory in a log management product?
Matt Pascucci discusses what to look for when evaluating a log management product and whether syslog format should be a requirement. Answer
-
Exploring the security risks of network management outsourcing
Is network management outsourcing the future of network security or too great a risk? Matthew Pascucci discusses the risks and rewards. Answer
-
Print-management software security starts with a private IP address
Print-management software shouldn’t provide a great risk to a company provided it uses a private IP address, says expert Mike Chapple. Answer
-
Network topology mapping: How to automate network documentation
Network topology mapping to boost security can be time-consuming. Learn how to automate network documentation with network management tools. Answer
-
Can Android virtual patching thwart Android malware attacks?
Application security expert Mike Cobb weighs the pros and cons of Android virtual patching to thwart Android malware attacks. Answer
- See more Expert Advice on Network Device Management
-
OCSP (Online Certificate Status Protocol)
OCSP (Online Certificate Status Protocol) is one of two common schemes for maintaining the security of a server and other network resources. Definition
-
trusted computing base (TCB)
The trusted computing base (TCB) is everything in a computing system that provides a secure environment. Definition
-
IPv6 implementation security advice from Check Point's Robert Hinden
IPv6 co-inventor Robert Hinden outlines IPv6 implementation security risks and a critical IPv6 security tip for working with network security vendors. Video
-
BYOD at the NSA? Maybe someday with mobile hardware root of trust
Video: Troy Lange discusses the issues thwarting BYOD at the NSA, and talks about promising mobile security technologies like hardware root of trust. Video
-
VeriSign on DNSSEC support
Joe Waldron, a product manager in VeriSign's Naming (DNS) Group, said engineers are testing and upgrading systems to support security extensions for DNS (DNSSEC). Video
-
Upgrading the network? Don't forget the network security tools
Network security tools -- like firewalls-- must be upgraded when moving to a high-speed enterprise network in order to prevent bottlenecks. News
-
Unlock new pathways to network security architecture
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of applications at an all-time high; security teams are looking at new and different ways to isolate, moni... E-Zine
-
Unlock new pathways to network security architecture
Cover story: Want to shed appliances? Consolidation and new platforms hold promise for security teams. Feature
-
HP printer discovery issue highlights printer security best practices
In wake of an HP printer discovery issue where Google indexed thousands of printers, learn best practices to keep network printers off the Internet. Answer
-
No firewall? How disabling the firewall can improve network security
Having no perimeter firewall may seem ludicrous, but Joel Snyder explains why disabling the firewall can actually improve enterprise network security. Tip
-
Enterprise network security visibility: Beyond traditional defenses
Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security technologies place an increased demand on the network. This TechGuide explores how to improve network security... E-Handbook
-
Fiber optic networking: Assessing security risks
Matthew Pascucci discusses the potential security risks associated with fiber optic networking. Answer
-
The fundamentals of designing a secure network
When designing a secure network segmentation, monitoring, logging and encryption should be a priority. Matt Pascucci explains in this expert Q&A. Answer
-
SSH keys audited automatically by free tool
SSH Communications Security will offer a free tool for auditing SSH key use within large organizations at next week's Infosecurity Europe conference. News
-
IPv6 implementation security advice from Check Point's Robert Hinden
IPv6 co-inventor Robert Hinden outlines IPv6 implementation security risks and a critical IPv6 security tip for working with network security vendors. Video
- See more All on Network Device Management
About Network Device Management
Get tips on network device management, security for network appliances, products and systems and how to ensure security devices work properly.
Security Management Strategies for the CIO