News

Networking for SMBs

Networks at small and medium-sized businesses (SMBs), like most IT components, can always be improved, updated and made even more secure. But as new technologies promise to simplify your job, they also add another layer of complexity to your network. A virtual private network isn't secure with just a firewall. Wireless networks work well -- but what about remote users? What about networking tools that are made for large companies but scaled down for SMBs? Are they OK?

This guide offers articles, tips and advice on just about everything networking for SMBs. From simple definitions to security options and VPN must-haves, this guide is a worthwhile beginning to the seemingly never-ending network management challenge. Send us your comments, questions and queries, and we'll do our best to satisfy your networking needs.

For free advice and resources on more IT and business topics, visit our main SMB IT Management Guide section.

Table of contents

   Featured story
   Basics
   Network administration and management
   Network security
   VoIP basics
   Wireless networking
   More resources

  Featured story  Return to Table of Contents

NAC helps SMBs control network, costs

For large and small businesses alike, achieving optimal network security is a never-ending quest. But small and medium-sized businesses (SMBs), in particular, face many unique network security challenges due to their smaller budgets and staffs. Among them:

  1. Access control: SMBs face special challenges in tracking who has access to the network and if the level of access they have is appropriately set.

  2. Malicious code: Most attacks against small businesses are automated, and potentially debilitating to SMBs. These attacks can appear as viruses, worms, Trojans and bots.

  3. Mobile device security: Mobile devices such as USB drives, iPods and camera phones allow data and information to be moved in and out of the network without normal access controls, creating a definite security hazard.

One potential solution to these issues is network access control (NAC). NAC offers administrators a way to verify devices meet certain health standards before they're allowed to connect to the network. Laptops, desktop computers or any device that doesn't comply with predefined requirements can be prevented from joining the network or can even be relegated to a controlled network where access is restricted until the device is brought up to the required security standards.

There are several different incarnations of NAC available. These include infrastructure-based NAC, endpoint-based NAC and hardware-based NAC.

>> Learn more in the full story

  Basics  Return to Table of Contents
  • Definition: Network
    (SearchNetworking.com, powered by WhatIs.com)
  • Definition: Networking
    (SearchNetworking.com, powered by WhatIs.com)
  • Definition: Local area network
    (SearchNetworking.com, powered by WhatIs.com)
  • Definition: Wide area network
    (SearchNetworking.com, powered by WhatIs.com)
  • Definition: Wireless LAN
    (SearchMobileComputing.com, powered by WhatIs.com)

  Network administration and management  Return to Table of Contents

  Network security  Return to Table of Contents

  VoIP basics  Return to Table of Contents

  Wireless networking  Return to Table of Contents

  More resources  Return to Table of Contents

 

COMMENTS powered by Disqus  //  Commenting policy