Email Alerts
-
Next-gen firewall vs. UTM device: Which is better for Web 2.0 risks?
How does a next-gen firewall differ from a UTM device, and how does each stack up against Web 2.0 risks? Answer
-
Network security metrics: Basic network security controls assessment
Get advice on how to devise appropriate network security metrics for your enterprise from expert Mike Chapple. Answer
-
Guidance on dual-homed server security
Learn more about how a dual-homed server operates, and what security restrictions it entails in this expert response from Anand Sastry. Ask the Expert
-
Do gigabyte converter and SPF records present a security threat?
Do gigabyte interface converters or sender policy framework transceivers retain any of the information that passes through them? Network security expert Anand Sastry explains. Ask the Expert
-
How to monitor network traffic: Appliance placement and choke points
Monitoring network traffic is crucial, but where's the best place to put network monitoring tools? Expert Anand Sastry gives advice. Ask the Expert
-
Cisco network appliance security: Does 'self-defending' network stack up?
Cisco has for years touted its concept of a "self-defending" network, but what does it actually entail? In this expert response, Anand Sastry explains what "self-defending" means (at least, according to vendors), and whether it's really possible. Ask the Expert
-
Will biometric authentication devices integrate with in-house software?
Biometric devices may provide an added level of security, but how much effort is required to integrate them with existing software and systems, particularly those systems custom made for an organization? Learn more in this expert response from Randal... Ask the Expert
-
Biometric security technology: The safest types of biometric devices
Expert Randall Gamby explains which biometrics devices are most secure, and which could work best in your enterprise. Ask the Expert
-
Will an application usage policy best control network bandwidth?
When it comes to speeding up the network, what works best: policy or technology? Both are important and should be used together, says expert Michael Cobb. Ask the Expert
-
Is there a way to block iPhone widgets that bypass Web filters?
If students are using your Wi-Fi to reach unapproved websites, you have the ability to take greater control of your network. Michael Cobb reviews the important aspects of a Web usage policy. Ask the Expert
Security Management Strategies for the CIO