Search Results | Network security
PREV 1...20   30   40...56   57   58   59   60   61   62   63   64   65...   70   80   90...320 NEXT
Sort by:  Most Relevant  |  Date
Network Security

Name: Network Security
Knowledge Points:   0 pts.  (How do I earn points?)
Network mapping and leak detection at DISA

Blog  The Defense Information Systems Agency (DISA) has entered into a multiyear enterprise contract to use Lumeta Inc.s IPsonar for network mapping and leak detection for the Department of Defense (DoD) global networks. TKC Global, a systems integrator, will deploy the system. I interviewed Mark Orn...

Last updated: Jan 22, 2010   5:29 PM GMT  |  Blog: IT Compliance Advisor
VKernel Capacity Bottleneck Analyzer for ESX virtualization available

Blog  Portsmouth, NH-based VKernel announced availability of its Capacity Bottleneck Analyzer Virtual Appliance, which allows system administrators to see capacity issues in VMware ESX Server-based environments so they can make necessary changes for optimum performance. Network bottlenecks are issues in ...

Last updated: Apr 15, 2008   5:37 PM GMT  |  Blog: The Virtualization Room
AppGate looking for channel help

Blog  For our British readers, the UKPRwire is reporting that AppGate recently signed on a trio of new VARs to help it resell its network access control and mobile access products. No need for jealousy, however, as the network security vendor is looking to take on more. All in all, AppGate is hoping to do...

Last updated: Apr 19, 2007   12:52 AM GMT  |  Blog: Channel Marker
The Center for Internet Security defines security metrics

Blog  As an information security manager I am always struggling with how to measure the security posture of my organization. As they say, you can't manage what you can't measure. There's lots of talk out there about ROI (Return on Investment) or ROSI (Return on Security Investment). These may be business ...

Last updated: May 22, 2009   3:24 PM GMT  |  Blog: IT Trenches
'Shrek' holds the key to your mobile security fairy tale

Blog  WithComcast's acquisition of DreamWorks Animation in April, "Shrek"fans could see the fairy tale-esque story revived with more movies in the comingyears, according to Forbes.In the original film, the titular character tells his sidekick Donkey that there is more to ogres than their scary ext...

Last updated: Aug 8, 2016   3:46 PM GMT  |  Blog: Modern Mobility   |      Biometrics, Enterprise mobility, Mobile data
CSC bags phone support for cyber warriors

Blog   Troubled US outsourcer Computer Sciences Corporation has been offered $145m to do telephone support for US cyber warriors and other grunts connected to an overseas extension of the Navy Enterprise Network.CSC refused to confirm the contract. But details slipped out in an official procurement notice...

Last updated: Nov 8, 2011   8:53 PM GMT  |  Blog: Public Sector IT   |      Government IT, IT and security, Outsourcing
Certified Cisco Design Associate - CCDA

Blog  This exam will touch the topics of enterprise network in a brief yet fundamentally important way. It covers all the basics from wireless, VOIP, and the enterprise model. I would recommend to study this not for the sake of certifications but the great knowledge acquired . It shows what are the b...

Last updated: Dec 29, 2010   8:30 AM GMT  |  Blog: The Journey of a Network Engineer
Wireless VoIP

Blog  If you have ever set up or worked with a wireless network, you are probably familiar with the fact that the signal quality isn't always the best. Depending on your wireless networking hardware and how you have it configured, the layout and materials used in the structure your network is in, and poss...

Last updated: Apr 26, 2008   1:48 AM GMT  |  Blog: Unified Communications: Click to talk
CCDP - ARCH Version 3.0 is here

Blog  Cisco is doing some major revamps when it comes to Cisco Design certifications , Cisco announced new version for their CCDA Certification from DESGN version 2.1 to 3.0. It's a welcome move from Cisco especially when technology is evolving so fast. In the newly designed 300-320 ARCH exam Cisco has...

Last updated: Oct 26, 2015   9:54 AM GMT  |  Blog: Network technologies and trends   |      Cisco, Cisco certifications, Data Center
Physical Software Defined Networking...

Blog   Following on from last week's OD of SDN at Netevents, we have some proper, physical (ironically) SDN presence in the launch of an SDN controller from HP.   This complete the story I covered this summer of HPs SDN solution - the Virtual Application Network - which we're still hoping to test a...

Last updated: Oct 4, 2012   3:17 PM GMT  |  Blog: Networks Generation   |      data-centre, HP, Netevents
Patch Tuesday Gets New Look, New Tools

Blog  Here's a nice graphic from the Microsoft Security Response Center's latest blog post, entitled "July 2014 Security Bulletin Release;" it summarizes the items pushed out via Windows Update yesterday, July 8, and presents a new look and feel for security bulletin stuff. Sharp colors and simple lab...

Last updated: Jul 9, 2014   4:20 PM GMT  |  Blog: Windows Enterprise Desktop   |      Windows 8.1
The Forest or The Trees - Part 2

Blog  In a previous article, I talked about the issues faced by IT Security and financial auditors, in trying to come together. Financial auditors only care about financial systems and overall IT Security as well as non-IT security practices. IT Security, on the other hand, is focused on secure IT practic...

Last updated: Dec 22, 2009   7:09 PM GMT  |  Blog: Sister CISA CISSP
Golden Rule #1: Don't Invite Attackers into Your PCs or Networks

Blog  Having worked in IT in various capacities since the early 1980s, Ive seen the need for security evolve from simple protection against viruses to the need for complex security policies designed to combat multiple attack vectors. These days, it takes constant vigilance to stay ahead of criminal ...

Last updated: Nov 24, 2009   3:30 AM GMT  |  Blog: Security Corner
What's your top IT priority for 2013?

Answer  In TechTarget's annual IT Priorities Survey of IT managers, data protection was #1 on respondents' list with over 56%. Server virtualization and network-based security take the next 2 spots. Do you agree with this list? If not, what's your top IT priority for 2013?

Last updated: Jan 16, 2013   8:30 PM GMT   |    Data protection, IT, Server virtualization
Security Wire Weekly: Cisco NAC vs Microsoft NAP

Blog  Current Analysis Senior Analyst Andrew Braunberg talks about the network access control interoperability plans for Cisco's NAC and Microsoft's NAP architectures and what the partnership will mean for enterprise security pros. Plus all the week's top news and why Hewlett-Packard's alleged pretexters ...

Last updated: Sep 20, 2006   6:57 PM GMT  |  Blog: Security Wire Weekly
Open IT Forum: What are your favorite network security tools?

Answer  We want to know who and what you trust with your network security needs, from products to software. Had a less-than-stellar experience? We want to hear about that, too! The best stories get 100 points that'll be mighty helpful in our Xbox 360 contest!

Last updated: Dec 1, 2010   8:42 PM GMT   |    Network security, Network Security Management, Open IT Forum
Windows 2000 security in a NT network

Answer  I have one Windows 2000 server in an NT network. The engineering dept has a directory with several subdirectories. The directories all have different secutiy levels. One directory is open to all for modification. They drop their files in there and then an admin reviews and moves the files to a r...

Last updated: Nov 5, 2004   2:40 PM GMT   |    Microsoft Windows, Servers

Answer  Network Layout We have 26 branch offices connected back to headoffice via VPN. We run a single Windows 2000 domain with DC's at each branch. Branch employees logon to systems using a common username/password due to the change in staff and shift work. Users want to securely store their documents ...

Last updated: Nov 9, 2004   8:28 AM GMT   |    Security
Can someone guide about the career path?

Answer  Hello. I am Rahul. I have three qualifications viz, CISA CISM & CISSP. I cleared the exams and got into consulting in one of the big four (the first job)and still there curently. The question is to be really good in the IT security field, is it neccesary to work in technology exposed areas and compa...

Last updated: Oct 14, 2008   3:59 PM GMT   |    IT careers
Your PCI questions answered

Blog recently conducted a virtual trade show on PCI DSS. It was a great success. During his live question-and-answer session Security Curve Founding Partner Ed Moyle had an overwhelming number of audience questions. Ed followed up on all the questions in this PCI DSS Q&A we posted ...

Last updated: Apr 3, 2008   3:15 PM GMT  |  Blog: Security Bytes
PREV 1...20   30   40...56   57   58   59   60   61   62   63   64   65...   70   80   90...320 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: