Search Results | Network security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...320 NEXT
Sort by:  Most Relevant  |  Date
Network Security

Name: Network Security
Knowledge Points:   0 pts.  (How do I earn points?)
See All, Know All INSIDE Your Network: Security Situational Awareness

Blog  Today's guest post is fromPete Schlampp, vice president of marketing and product management at Solera Networks. The Identity Theft Resource Center (ITRC), the organization that tracks data breaches, reports 211 data breaches so far in 2010, and 26 of these involve financial services companies. Ac...

Last updated: Apr 15, 2010   11:20 AM GMT  |  Blog: Enterprise IT Watch Blog
Protecting the exploding attack surface: A blueprint for government agencies

Blog  No industry possesses more confidential, sensitive and proprietary information than government agencies. From citizen data and employee files to military plans and details about national laws and regulations, federal, state and local government agencies are a gold mine for nation-states and other cr...

Last updated: Apr 8, 2019   4:36 PM GMT  |  Blog: IoT Agenda   |      Attack surface, cyber-situational awareness, government security
Automating IoT security requires 20/20 vision

Blog  Across all areas of cybersecurity, the automation trend is being driven by a massive cybersecurity skills shortage, as well as the need for security teams to deliver faster and more consistent performance against internal service level agreements. In many cases, the ability to effectively automate s...

Last updated: Aug 9, 2019   9:47 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, IoT cybersecurity
Certes Networks -- formerly CipherOptics -- adapts to network security market changes

Blog  When a vendor stays around long enough for it's market to change, sometimes it's time to close up shop. In other cases, it's time to get a new facelift and identity. This is what Certes Networks, formerly CipherOptics, did to change with the evolving network security market. In the words of the com...

Last updated: Jan 28, 2011   3:09 AM GMT  |  Blog: Window on WANs
Juniper Networks announces new UAC

Blog  Network infrastructure vendors can help differentiate themselves in the security market with tight integration of their network and security products. Managing my firewalls, intrusion detection/prevention, network access control (NAC), etc., together with my routers and switches is an inducement to ...

Last updated: Aug 4, 2008   2:46 PM GMT  |  Blog: Security Bytes
Wireless security major networking concern for 2008

Blog  A few weeks ago, I asked our readers to tell me the number one networking issue you'd like to learn more about in the new year. It was no surprise that "security" appeared again and again in the comments, but I thought it was interesting how many people wanted to learn more about wireless network se...

Last updated: Dec 19, 2007   4:09 PM GMT  |  Blog: The Network Hub
Introduction to Cisco port security and the reasons to implement

Blog  A growing challenge facing network administrators is determining how to control who can access the organization's internal networkand who can't. For example, can anyone walk into campus LAN , plug in a laptop, and access the network? You might argue that the wall jack has no connection to a switc...

Last updated: Jun 17, 2008   6:48 AM GMT  |  Blog: Network technologies and trends   |      Forensics
What is meant by SLL? Can you explain? (read at last line of this Cisco paragraph)

Answer  Cisco ASA 5500 Series adaptive security appliances are purpose-built solutions that combine best-of-breed security and VPN services with the innovative Cisco Adaptive Identification and Mitigation (AIM) architecture. Designed as a core component of the Cisco Self-Defending Network, the Cisco ASA 550...

Last updated: Jun 13, 2009   5:14 PM GMT   |    Cisco, Cisco Licensing, Cisco VPN
Chief Security Officer (CSO)

Blog  A Chief Security Officer (CSO) is the employee responsible for the physical security of a company, including its communication and business systems. Continued Quote of the Day "If an organization ignores the physical layer of its network for the security assessment, it will face some challenges ...

Last updated: Apr 3, 2017   2:10 AM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com   |      CISO, CSO, Physical security
Security expert calls for overhaul of traditional networks

Blog  Forresters Zero Trust security model could help prevent insider attacks and eliminate trustless external networks. The increased use of virtualization in production environments and the rising number of cloud computing services are turning the traditional network security model upside down...

Last updated: Oct 4, 2010   2:20 PM GMT  |  Blog: Security Bytes
Social network security issues drive consulting and education projects

Blog  Solution providers are being called upon to guide their customers through the security maze of social networking. Whether building a Facebook page to evangelize their brand, or forming a LinkedIn group to connect with their customers, businesses must balance the benefits of social networking with ...

Last updated: Oct 12, 2011   3:20 PM GMT  |  Blog: Patrolling the Channel
5G security: A proportionate choice

Blog  By 2021, 5G could deliver a spectacular range of potential benefits and use cases to network operators and service providers. This will create functional and technical needs for higher speeds, lower latency and greater power efficiency, and herald more actors and device types and greater use of the ...

Last updated: Jan 9, 2017   6:37 PM GMT  |  Blog: IoT Agenda   |      5G, 5G technology, Authentication
Your security appliance is essentially an IoT device

Blog  When was the last time you thought of your security appliance, which is meant to secure your network and sensitive data, as just another IoT device? It all starts with one question: Why are security officers hesitant to let go of their security appliances and move on to software or cloud-based offe...

Last updated: Jul 17, 2017   7:05 PM GMT  |  Blog: IoT Agenda   |      Incident response, Internet of Things, Intrusion detection
Network Monitoring And Importance of Visibility In The Network

Blog  What is the importance of Visibility in the Network and how it plays a critical role in Network Monitoring? We are talking to Phil Trainor from Ixia. This is the second post in the series. In the previous post, he talks about the changing scenario in network security landscape. Here, in this post, h...

Last updated: Aug 9, 2017   4:51 PM GMT  |  Blog: Quality Assurance and Project Management   |      Network monitoring
Network Security Landscape During Last Decade - Phil Trainor

Blog  How has the landscape of Network Security changed during last decade? This is the question I asked Phil Trainor- Head- Security Business, APAC, IXIA. Phil Trainor has more than 14 years experience in senior network security engineering roles for global technology companies and currently leads Ixi...

Last updated: Aug 9, 2017   4:34 PM GMT  |  Blog: Quality Assurance and Project Management   |      Cyber security, Network security
Do you worry about your network's security with remote users or outsourcing?

Answer  If you have users who work remotely or outsource certain parts of your organization where network security might not be as highly regulated, is network security a particular point of concern for you? What are some of the measures you and your partners have in place to secure your network at all poin...

Last updated: Oct 14, 2009   4:45 PM GMT   |    Network security, Network Security Management, Open IT Forum
Video: Defense-in-depth with end-to-end network security

Blog  Network security expert Omar Santos presents material from his latest book, End-to-End Network Security: Defense-in-Depth -- Best practices for assessing and improving network defenses and responding to security incidents. [kml_flashembed movie="http://www.youtube.com/v/zTJSMjYd9c4" width="425" hei...

Last updated: Mar 19, 2008   8:26 PM GMT  |  Blog: Our Latest Discovery
How to ace Palo Alto Networks Certified Network Security Engineer (PCNSE6) exam?

Blog  Its a known fact that there are very limited resources one can avail for the preparations of the Palo Alto Networks Certified Network Security Engineer (PCNSE6) exam. One has to rely completely on Palo Alto resources, as in the market you are not going to find any Palo Alto press books (there i...

Last updated: Sep 17, 2015   5:06 AM GMT  |  Blog: Network technologies and trends   |      Palo Alto Networks
StillSecure’s new network security partner program

Blog   Value-added resellers looking to expand their portfolios in the area of network security have a new opportunity. In his blog, The Converging Network, Mitchell Ashley, StillSecure CTO and GM, has announced that the secure network infrastructure vendor is launching their StillSecure Cobia Partner Pro...

Last updated: May 24, 2007   5:01 PM GMT  |  Blog: Channel Marker
Keeping up with digital change requires a new approach to security

Blog  We are living in an era of hyperconnectivity between systems, applications, devices and data. Technologies such as IoT, mobile computing, cloud-based services and multi-cloud infrastructures are not simply being added to the network; they are being interconnected in ways that are redefining not only...

Last updated: Feb 27, 2018   9:01 PM GMT  |  Blog: IoT Agenda   |      Attack surface, Automation, Digital transformation
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...320 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: