News
Network security management
-
June 19, 2007
19
Jun'07
Securing the enterprise VoIP perimeter
How to make VoIP work without sacrificing firewalls or network perimeter security.
-
June 06, 2007
06
Jun'07
Network access controlled via biometrics
Fingerprint readers, a form of biometrics, have been used to protect data and endpoints, but now IT is using the security technology to control network access
-
May 22, 2007
22
May'07
Microsoft unveils unified communications devices
Microsoft unveils unified communications devices.
-
March 06, 2007
06
Mar'07
Unified communications translates to intelligent communications
Unified communications and its business benefits were the underlying themes of the keynote presentations yesterday at VoiceCon Spring 2007.
-
February 07, 2007
07
Feb'07
OSI: Securing the stack, Layer 2 -- Understanding the role of ARP
Part two of our series on securing the OSI stack looks at the perils of Address Resolution Protocol.
-
January 16, 2007
16
Jan'07
Network security threats and answers, by industry
Michael Gregg offers network pros in various industries security advice and step-by-step solutions to help lock down the network.
-
January 11, 2007
11
Jan'07
Network security -- Taking the layered approach
Network security is tricky business. In his new book Hack the Stack, author and security expert Michael Gregg outlines how to secure the network using the OSI model.
-
January 07, 2007
07
Jan'07
NAC implementation slows as networking budgets grow
Network Access Control (NAC) implementations will decrease, despite growth in networking budgets.
-
December 10, 2006
10
Dec'06
Windows Vista security settings
Microsoft's Windows Vista is here. Here, Current Analysis senior analyst Andrew Braunberg discusses what network admins need to know about tightening up Vista security.
-
December 04, 2006
04
Dec'06
Spam -- stop it at the network edge
Spam has become much more than just a nuisance; it can slow or crash the network. F5 recently added a module to its Big IP platform to stop spam at the network edge.
-
October 12, 2006
12
Oct'06
What to do when your server goes down
When a server goes down at a particular time every night without the prompt of a virus, our expert, Puneet Mehta, can tell you what the problem is and what you can do to avoid it.
-
September 24, 2006
24
Sep'06
Apple fixes Mac Wi-Fi flaws
Updated: Attackers could exploit flaws in Apple's wireless technology to cause a denial of service or run malicious code, resulting in the full takeover of vulnerable Mac machines.
-
September 12, 2006
12
Sep'06
Secure network perimeter to result from Symantec-Juniper deal
Juniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow endpoint compliance and access control platforms to secure the enterprise perimeter.
-
September 05, 2006
05
Sep'06
Cisco, Microsoft unveil NAC/NAP interoperability
Nearly two years into their partnership, Cisco and Microsoft yesterday announced a joint architecture combining their network access security solutions.
-
September 05, 2006
05
Sep'06
Cisco, Microsoft unveil NAC/NAP interoperability
Nearly two years into their partnership, Cisco and Microsoft yesterday announced a joint architecture combining their network access security solutions.
-
August 23, 2006
23
Aug'06
Remote access, WAN optimization, and network analysis news
Briefs: Remote access from Positive Networks helps with disaster recovery plans; Ipanema Technologies provides WAN optimization; Lancope rolls out network behavior analysis and response system tools.