• What rights should be assinged to Network Security Personnel

    I have searched the internet, technical documents, and asked various network support technicians, but have yet to get a clear cut answer to the question.   I have been involved with Network Security for many years and worked for several companies, either as a consultant, or full time employee and...

    DanteNXS10 pointsBadges:
  • Blocking rewriteable drives across entire network

    How can I block CDRW/DVDRW and USB drives from being used in our Windows XP machines across the entire network?

    Troubleshooter24755 pointsBadges:
  • Free IT Book: Network Security Technologies and Solutions

    From the back of the book: "A comprehensive reference to the most cutting-edge security products and methodologies available to networking professionals today. Understand and implement current, state-of-the-art network security technologies to ensure secure communications through the network...

    MelanieYarbrough6,345 pointsBadges:
  • Free IT Book: Two-for-one this week!

    We got into the holiday spirit for this week's free IT book giveaway. Answer one of the unanswered questions below and win two IT books from our coveted technology library. Another plus? You get to pick which two books you receive. So get to answering, because you have a week to throw your name...

    MelanieYarbrough6,345 pointsBadges:
  • Locking down network settings to local admins

    How can the network settings be locked down even to local administrators. We track users based on IP and we don't want to compromise our results or skew them with people monkeying around.

    TeachMeIT975 pointsBadges:
  • Network password recovery

    How can I recover my network password?

    Cbreaux5 pointsBadges:
  • Blocking spyware and inappropriate sites

    Can we monitor and filter our wireless network? Are there free tools for this? We want to block porn and spyware sites.

    Troubleshooter24755 pointsBadges:
  • Creating ACLs on the network

    How can we create ACLs on the network to block out users from attempting to connect to HR file shares?

    Troubleshooter24755 pointsBadges:
  • Help choosing a career path in IT Security

    Hi, I need expert advice on which aspect of security to major in. I have a background in engineering, from which i switched to Oracle database. Havent worked with the oracle Database learned and the certification gained as it was tough getting the job.I am doing  my Msc in Information Security...

    BENSARH5 pointsBadges:
  • Has anybody used Cyberoam for network security?

    Am looking at implemeting Cyberoam 15i a unified threat management equipment for a small enterprise instead of Microsoft Forefront please i want to know if cyberoam is a good security solution. Thanks

    liz30 pointsBadges:
  • Can VLANs communicate with each other and still block broadcast traffic?

    Can VLANs communicate with each other if necessary and still block broadcast traffic from the same machine because it's on a different subnet?

    Troubleshooter24755 pointsBadges:
  • Securing a virtualized network

    What's new out there in securing a virtual network? I've done some research and found ALTOR but they've been purchased by Juniper so their product may soon be intergrated with their routers and switches. I'm looking for a defense in depth solution to my question.

    JMan785 pointsBadges:
  • VPN connection suggestions: Linksys vs. Cisco

    Does anyone have experience with/opinions on Linksys VPN router connection versus Cisco MPLS configuration? Any details or advice would be greatly appreciated.

    TeachMeIT975 pointsBadges:
  • Anti bridging software

    I am looking for an anti bridging software. When the user is connected to internet via modem, s/he should not be able to access Corporate LAN and vice-versa. Pls suggest the one which is implemented in your network.

    TeachMeIT975 pointsBadges:
  • Locking down the USB & optical drives on Windows Server 2008 R2

    Can we lock down the USB and Optical drives on a Windows Server 2008 R2 box for all users except the administrators group or even just the administrator?

    NewnanIT1,110 pointsBadges:
  • Central Windows Server to aggregate Windows security and audit logs

    Can we have a central windows server aggregate all windows security/audit logs? If not does anyone have a script to grab them from domain machines?

    NewnanIT1,110 pointsBadges:
  • Automatic clean up antivirus scan

    How to automatic clean up virus on infected client computer client via network? so we can monitoring on PC..

    STAFFIT110 pointsBadges:
  • Adding another level of security to SQL 2005 database

    We have a SQL 2005 Database. It is protected by Windows Authentication. Can we add another level of security - requiring a SQL username and password along with a valid user name and password on the domain?

    NewnanIT1,110 pointsBadges:
  • External IT company auditing security and policies

    We have an external IT company auditing our security and policies. What kind of access should we give them? Should we be worried about auditing the auditors?

    Troubleshooter24755 pointsBadges:
  • Open IT Forum: How much of your sensitive information can you trust to outside organizations?

    What is your limit for how much of your information security program you outsource to contractors? Is it better to develop information security expertise solely in your employees or is it acceptable to outsource to an external expert? Hiring security service providers and contractors to manage...

    MelanieYarbrough6,345 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following