Ask the Experts
Ask the Experts
Enterprise network security
-
Will biometric authentication devices integrate with in-house software?
Biometric devices may provide an added level of security, but how much effort is required to integrate them with existing software and systems, particularly those systems custom made for an organization? Learn more in this expert response from ... Continue Reading
-
Secure OpenVPN config with PAM
Network security expert Anand Sastry explains the relationship between OpenVPN and TLS, and points out where to learn about using OpenVPN and PAM. Continue Reading
-
Secure DMZ Web server setup advice
Network security expert Anand Sastry describes how to ensure a secure DMZ Web server setup involving network attached storage (NAS). Continue Reading
-
Biometric security technology: The safest types of biometric devices
Expert Randall Gamby explains which biometrics devices are most secure, and which could work best in your enterprise. Continue Reading
-
How to defend against a sync flood attack
Nick Lewis explains how to protect your organization from sync flood attacks. Continue Reading
-
Proxy server security: Defending against DoS and other attacks
In this expert response, find out how to boost proxy server security in the enterprise. Continue Reading
-
Is an SMTP TLS certificate the same as an FTP SSL certificate?
Are all security transportation-level certificates (TLSes) the same, or are there different certificates for different protocols? In this expert response, Randall Gamby discusses SMTP and FTP certificates. Continue Reading
-
Can secure FTP services protect sensitive data from hackers?
Does secure FTP services protect against hackers and attacks? In this expert response, Michael Cobb explains why using a secure FTP service is vital for handling sensitive data transfers. Continue Reading
-
How do passwordless SSH keys represent an enterprise attack vector?
Passwordless SSH keys represent an attack vector because their safety is determined by the security of the host. Learn how to protect communication between two networked devices. Continue Reading
-
Will an application usage policy best control network bandwidth?
When it comes to speeding up the network, what works best: policy or technology? Both are important and should be used together, says expert Michael Cobb. Continue Reading
-
How to set up a split-tunnel VPN in Windows Vista
Setting up a split-tunnel VPN in Vista can help quicken network flow in the enterprise. In this expert response, Mike Chapple explains the steps to create a split-tunnel VPN. Continue Reading
-
What is the difference between static and dynamic network validation?
Network data analysis is essential to understanding the security configuration of your network. But what is the difference between static data validation and dynamic data validation? Find out in this expert response. Continue Reading
-
Securing the intranet with remote access VPN security
Connecting remote offices with the main branch can be done many ways, but for those companies looking at tightly securing their intranet, they may need to consider remote access with VPN security. Learn more in this expert response. Continue Reading
-
How to implement virtual firewalls in a complex network infrastructure
If your enterprise has a complex network infrastructure, it might be necessary to implement virtual firewalls or multiple security contexts. Network security expert Mike Chapple explains the pros and cons of doing so. Continue Reading
-
How to manage network bandwidth with distributed ISP bandwidth
As enterprises grow, demand for bandwidth can increase exponentially. In this expert answer, Mike Chapple explains different techniques for managing network bandwidth with ISP distribution. Continue Reading