Search Results | Network security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...320 NEXT
Sort by:  Most Relevant  |  Date
Network Security

Name: Network Security
Knowledge Points:   0 pts.  (How do I earn points?)
Juniper Networks launches Network and Security Manager (NSM)

Blog  Juniper Networks is expanding its network and security management capabilities across routing, switching and security infrastructure with the launch of the Network and Security Manager (NSM). The new Network and Security Manager (NSM) offers centralized management for Juniper Networks J-series servi...

Last updated: Aug 12, 2008   6:56 AM GMT  |  Blog: Network technologies and trends
Both network and application security are important

Blog  When people think of security testing, they often think about the network layer -- that area outside of the application. However, application security -- security within your application -- is important as well. John Overbaugh explains the difference in his two recent tips. In Boost network securit...

Last updated: Apr 14, 2011   4:22 PM GMT  |  Blog: Software Quality Insights
Ten top popular and paying Cisco Certifications-part2

Blog  In my previous post we came to know five of the top ten Cisco Certifications which are not only popular but also they yield high remuneration. In this post we will discover the other five Cisco Certifications. 6. CCNP Security ($97,539) CCNP Security certification program is aligned specifically t...

Last updated: Apr 30, 2011   5:27 AM GMT  |  Blog: Network technologies and trends
Inline Security and A Resilient Inline Security Framework

Blog  What is Inline Security? How many of us would be knowing this? Phil Trainor continues with us in this third post in the series. While in the first post he enlightens us with insights on Network Security Landscape, in the second post he talks about a deep correlation between Network Security and Netw...

Last updated: Aug 9, 2017   5:22 PM GMT  |  Blog: Quality Assurance and Project Management   |      Ixia, Resilient Systems, Security Framework
Our guide to the best Network Security books

Blog  If IT Knowledge Exchange's Network Security month has sparked an interest in learning more, then you've come to the right place for some network security reading. We scoured the Internet, the forums and the search sites for network security reading materials vital to your success and understanding. ...

Last updated: Dec 20, 2010   8:31 PM GMT  |  Blog: Enterprise IT Watch Blog
Palo Alto Networks Certification tracks

Blog  Palo Alto Networks offers few Certifications tracks which are quite interesting and challenging to pass. Their advance certificatePalo Alto Networks Certified Network Security Engineer (PCNSE) is very challenging certification exam to pass, especially for those who don't have exposure to Palo Al...

Last updated: Jul 31, 2015   12:28 AM GMT  |  Blog: Network technologies and trends   |      Cisco, VMware
Edge Security - Why Is It Not Enough For Any Network?

Blog  Phil Trainor is a master in network security, inline security, network visibility, and network monitoring. In this post, he guides us why Edge Security is not enough. We have been talking to him on these topics in previous three posts. In the first post, we talk to him on the changing paradigm of ne...

Last updated: Aug 9, 2017   5:45 PM GMT  |  Blog: Quality Assurance and Project Management   |      Ixia, Network security
software-defined perimeter (SDP)

Blog  Software-defined perimeter (SDP) is a security framework developed by the Cloud Security Alliance (CSA) that controls access to resources based on identity. Continue reading... Quote of the Day "The goal of software-defined perimeter is to remove internet-connected devices and applications from pub...

Last updated: Jan 16, 2019   4:41 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
Borderless Networks the future of Networks

Blog   These days people are talking about the borderless networks; some of the presentations in the recently concluded Cisco Networkers in Bahrain were exclusively about the borderless Networks. As we all know Cisco Borderless Networks deliver intelligent, adaptive services to streamline your operatio...

Last updated: Apr 13, 2010   5:35 AM GMT  |  Blog: Network technologies and trends
What is Palo Alto Networks Certified Network Security Engineer (PCNSE6) exam?

Blog  Recently I took Palo Alto Networks Certified Network Security Engineer (PCNSE6) exam and by the grace of Almighty I passed the exam. The Palo Alto Networks Certified Network Security Engineer (PCNSE6) happens to be one of toughest exam I took. Its not an easy exam to pass especially because one s...

Last updated: Sep 16, 2015   9:18 AM GMT  |  Blog: Network technologies and trends   |      Configure, Design
RSA expands distribution of product for the channel

Blog  RSA today announced that it would make the log-managementsoftware it bought along with the acquisition of Network Intelligence in September available to channel partners, through itsSecurWorld Partner Program. Theplatform, whichhas been renamed RSA enVision,automatically collects, ana...

Last updated: Feb 22, 2007   8:26 PM GMT  |  Blog: Channel Marker
Borderless Networks: Ensuring Technology Leadership (Sponsored)

Blog  This sponsored guest is from Cisco Systems and was written byMark Leary, a Cisco seniorstrategistand Chief Marketing Officer - Network Systems. In my last blog, I outlined the three cornerstones of success for Borderless Networks Workplace Transformation, Technology Leadership, and Oper...

Last updated: Apr 29, 2010   1:30 PM GMT  |  Blog: Enterprise IT Watch Blog
Reality Check: Enterprise IM security and social networking security

Blog  I sat down again with Elaine Hom, Associate Editor of SearchUnifiedCommunications, to do the Reality Check podcast. This month we focused on the impact of instant messaging and social networking on enterprise security. We talk aboutwhether or not social networking sites belong in the workplace, an...

Last updated: Jun 26, 2009   3:50 AM GMT  |  Blog: Unified Communications: Click to talk
Sample I.T Secuirty - Network Security

Blog  We are continuing our series on Sample I.T Security Policy, so far we have covered Physical, Human, User Secuity and Client. Today lets concentrate on Network security which is as follows 5NETWORK SECURITY IS CONSIDERED THE FOLLOWING: 1. The network must be designed and configured to deliv...

Last updated: Jun 28, 2008   5:24 AM GMT  |  Blog: Network technologies and trends
Forrester's Zero Trust security model

Blog  Forrester Research Inc. is proposing a new mantra for IT security. In his report "No More Chewy Centers: Introducing the Zero Trust Model of Information Network Security," Forrester analyst John Kindervag suggests that we should dispense with the old Reaganism "Trust but verify" and replace it with ...

Last updated: Sep 17, 2010   8:18 PM GMT  |  Blog: The Network Hub
Peer-to-Peer Networking - Part 1

Blog  There are a variety of networking architectures available for deployment. Potential candidates include Peer-to-Peer, Client/Server and Master/Slave. However, Peer-to-Peer (P2P) architectures present unique governance issues to the information security manager when comparable network configurations a...

Last updated: Feb 26, 2009   6:49 PM GMT  |  Blog: IT Governance, Risk, and Compliance
Is Endpoint Security Replacing Network Security?

Blog  There have been rumors for some time that the network perimeter is dead. More users are relying on laptop computers connected over wireless networks, or via VPN from a hotel or coffee shop. Users have mobile phones that connect to network resources, and various methods of portable data storage- USB ...

Last updated: Feb 24, 2008   4:45 AM GMT  |  Blog: Unified Communications: Click to talk
network behavior anomaly detection

Blog  Network behavior anomaly detection (NBAD) is the continuous monitoring of a proprietary network for unusual events or trends. Continued Quote of the Day "It's essential that you extend your security controls beyond the perimeter, adding network anomaly detection capabilities to your other existi...

Last updated: Nov 10, 2016   9:21 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com   |      Security
Overheard: Network security is like a door...

Blog   "Teaching network security for the SANS Institute, I am frequently asked, "Will our networks ever be secure and safe for all to use?" My simple answer is: No. We will never be able to achieve total network security. I tend to use real "doors" as an analogy to make my point. Doors have been built...

Last updated: Oct 19, 2007   11:20 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
Network Security Tool Kit in Your Pocket

Blog  I just finished remodeling my kitchen and while it was a lot of work it turned out pretty good and ended up not being as difficult as other tasks I have taken on in my life. The main reason I think the project went as well as it did is because I had the right tools. I have this one saw that I though...

Last updated: Nov 27, 2012   0:36 AM GMT  |  Blog: Can you hear me now? Tales from a Cisco voice instructor
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...320 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: