Search Results | Network security
PREV 1...5...6   7   8   9   10   11   12   13   14   15...   20   30   40   50   60...320 NEXT
Sort by:  Most Relevant  |  Date
Network Security

Name: Network Security
Knowledge Points:   0 pts.  (How do I earn points?)
Nevis Networks NAC Solution - Its all about "identity"!

Blog  Today I had a personal conference call with representatives from Nevis Networks. The purpose of the call was to find out what the Nevis Networks NAC solution offered, as compared to other NAC solutions. In my opinion, the NAC Maketspace is truly in a "mess" right now with vendors making all sorts o...

Last updated: May 27, 2008   10:17 PM GMT  |  Blog: David’s Cisco Networking Blog
microsoft windows 2000 server network administration-2

Answer  my questions are stated thus: 1.i want to know if it is possible to have a windows 2000 server based network comprising of more than one master domain controller co-existing in the same network.if yes,how? and if yes,will a malfunction of any of the servers affect other servers? 2.a network comprise...

Last updated: Nov 2, 2004   12:19 AM GMT   |    DHCP, DNS, Lotus Domino
Microsoft Windows 2000 server network administration

Answer  My questions are stated thus: I want to know if it is possible to have a Windows 2000 server based network comprising of more than one master domain controller co-existing in the same network. If yes, how? And if yes,will a malfunction of any of the servers affect other servers? A network compris...

Last updated: Nov 2, 2004   11:33 AM GMT   |    DHCP, DNS, Lotus Domino
How do I create a Windows 8 profile for shared key authentication?

Answer  I've noticed that my Windows 8 won't let me connect to a wireless network that uses WEP with shared-key authentication. I ran Windows 8's network diagnostics wizard and it shows that one exists. The wireless network that you are trying to connect to requires shared-key authentication, a low security...

Last updated: Jan 6, 2015   5:00 PM GMT   |    Authentication, WEP, Windows 8
NAC Continues To Struggle

Blog  A couple of years ago the concept of network access control (NAC) was introduced and many touted it as the next shift in network security technology. A product that sits between the client and the network and ensures that devices are clean and safe and meet with the prescribed network security polic...

Last updated: Aug 15, 2007   7:20 PM GMT  |  Blog: Unified Communications: Click to talk
To CompTIA, or Not?

Blog  Many of the questions I get from readers and IT professionals might best be summarized as "If I earn the following cert(s), will it help my career?" More than half the time, in fact, one or more of the specific IT certifications mentioned in the query comes from the Computing Technology Industry Ass...

Last updated: Sep 22, 2008   4:14 PM GMT  |  Blog: IT Career JumpStart   |      IMAP4
links for 2008-04-12

Blog   EMC unveils new solution aimed at advancing IT and security operations Working to converge security and operations - The solution is based on EMC's Voyence Control product for Network Change and Configuration Management (NCCM) and the RSA enVision product for Security Information and Event Ma...

Last updated: Apr 12, 2008   4:38 PM GMT  |  Blog: Adventures in Data Center Automation   |      DataCenter
Five ways a managed print service can support cyber resilience

Blog  As IoT devices, smart MFPs are susceptible to the growing threat of attempts to implant malware, recruit to botnets (to help perpetrate DDoS attacks), as well as potentially providing an open gateway to the corporate network.A managed print service (MPS) is an effective approach to building a mult...

Last updated: Oct 4, 2019   1:45 PM GMT  |  Blog: Quocirca Insights
Juniper Networks to acquire Trapeze Networks for $152m

Blog   Juniper Networks strengthening their Wireless Product range as Juniper Networks and Belden Inc. have entered into a definitive agreement under which Juniper will acquire Trapeze Networks for approximately $152 million. Juniper is expected to complete the acquisition by the fourth quarter of 2010...

Last updated: Dec 5, 2010   8:43 AM GMT  |  Blog: Network technologies and trends
Managing large-scale IoT security solutions with VPNs

Blog  Enterprises are experiencing a rapid evolution in technology that is challenging traditional security systems and infrastructures. The arrival of business-oriented IoT devices creates even more demand for secure connectivity. Every employee now has his own smartphone and tablet communicating simult...

Last updated: Jun 6, 2017   5:59 PM GMT  |  Blog: IoT Agenda   |      cybersecurity, Internet of Things, iot
Tech Trivia Challenge - network behavior analysis

Blog  Our WhatIs.com Tech Term is network behavior analysis. The goal of network behavior analysis is to flag unknown, new or unusual traffic patterns that might indicate the presence of a security threat. Because it operates passively, NBA avoids latency or becoming a performance bottleneck. Are you a ...

Last updated: Dec 8, 2008   2:46 PM GMT  |  Blog: Tech Quiz of the Day
Support Your Local WARP

Blog  External networking is one of the most important components of an effective security function. That's because security managers need to draw on outside knowledge and skills to identify new threats, interpret new compliance requirements and import best industry practices. Access to a trusted security...

Last updated: Mar 30, 2007   9:24 AM GMT  |  Blog: David Laceys IT Security Blog   |      crisis, incidents, vulnerability management
Congress demands answers on DHS network security

Blog  Don't look now, but it appears that Congress is beginning to pay some serious attention to the security (or lack thereof) of the federal government's networks. A House subcommittee last month held a hearing on some serious intrusions into the networks at the Department of State and Department of Com...

Last updated: May 2, 2007   2:02 PM GMT  |  Blog: Security Bytes
Report documents health data security HIPAA compliance issues

Blog  Data security consultant and research firm the SANS Institute estimates that millions of healthcare IT systems are compromised and fail to meet HIPAA's network security requirements in its Health Care Cyberthreat Report. The report was developed based on data related to healthcare organizations in t...

Last updated: Sep 17, 2014   2:46 PM GMT  |  Blog: Health IT Pulse   |      health data security, HIPAA Compliance, HIPAA data breach
How printers can be a launchpad for malware attacks

Blog  HP continues to shine a spotlight on print security with the recent announcement of embedded print security features that aim to mitigate the threat of malware. So how vulnerable are printers to external attacks, and how can businesses limit their risks? While the prevalence of connected printers a...

Last updated: Sep 26, 2017   2:57 PM GMT  |  Blog: Quocirca Insights   |      iot, print, Security
Learn to secure and optimize all branch office types

Blog  A glimmer of a recession rebound and a favorable international marketspark businesses into to expanding and creating new office locations across the globe. Remote offices are forecasted to increase 5% in 2011 and spike upwards thereafter. This trend of remote offices will leave wide area network (...

Last updated: Mar 28, 2011   3:15 PM GMT  |  Blog: Window on WANs
TechTarget's weekly roundup (9/9 - 9/16)

Blog   iPhone image via Shutterstock Most of you have already heard about Apple's latest innovations in the mobile world. But the TechTarget writers look at it from a different angle in this week's roundup. Find out what the new smartphones could do to the enterprise. 1. Dell goes private to attempt bala...

Last updated: Sep 16, 2013   3:51 PM GMT  |  Blog: Enterprise IT Watch Blog
What is a software defined perimeter?

Blog  Information access and identity management controls have never been more in the data developer news-stream as they are today. Software Defined Networks (SDN) have a massive part to play in terms of the way cloud architectures are now being constructed to operate, many of which will be multi-tenant ...

Last updated: Jul 11, 2018   7:41 AM GMT  |  Blog: CW Developer Network
industrial control system (ICS)

Blog  Industrial control system (ICS) is a general term used to describe the integration of hardware and software with network connectivity in order to support critical infrastructure. Continued Quote of the Day "Today, it is commonplace to find engineering workstations and servers on the ICS networks...

Last updated: Aug 22, 2017   8:04 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com   |      Operational technology, SCADA, Targeted Attacks
New Series: Web 2.0 Security

Blog  [caption id="attachment_491" align="alignleft" width="349" caption="Web 2.0 Sites New Playground for Miscreants"][/caption] With the stellar rise of social networking sites like Facebook, Twitter, MySpace, the Ning networks and the like, the bad guys have found yet another playground on the Web. Mo...

Last updated: Dec 20, 2009   6:52 PM GMT  |  Blog: Security Corner
PREV 1...5...6   7   8   9   10   11   12   13   14   15...   20   30   40   50   60...320 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: