Tips
Tips
Integrating security into networks
-
Security management plan reveals essential business security upgrades
As companies create their security management plan for the coming year, they should look to upgrades in Linux and Windows operating systems, Adobe applications and Internet browsers to improve their overall security position. Continue Reading
-
WPA security: Enabling the best Wi-Fi security for SMBs
To choose the best Wi-Fi security for the small or midsized business, consider using WPA Enterprise or wireless access points with WPA-E authentication, or use a Windows hosted RADIUS service. Network security expert Mike Chapple explains how to ... Continue Reading
-
Outsourcing data center services: SMB security best practices
Learn best practices for outsourcing data center services and about the security and compliance considerations that influence whether an SMB should outsource data center services. Continue Reading
-
Key technologies in a network perimeter intrusion defense strategy
In this article, Joel Snyder introduces technologies that act as strong network perimeter defenses. Continue Reading
-
Write it down: Network security documentation basics
Joel Snyder reveals the specific network security documentation that will help move disaster recovery plans along. Continue Reading
-
Divide and conquer: Manage network traffic with network segmentation
Joel Snyder explains how to "divide and conquer" using network segmentation. Continue Reading
-
Using NetStat commands and Microsoft Port Reporter tool to find network connections
Expert Tom Chmielarski answers a reader's question about how to determine what programs are making connections to the Internet or other network systems. Continue Reading
-
Buying an IPS: Determine your form factor requirements
Your choice of either a standalone IPS appliance, or one integrated in a firewall, gives your different levels of functionality to consider as well. This is the fifth in a seven-part series. Continue Reading
-
Buying an IPS: Determine your performance requirements
Intrusion prevention system performance is dependant on many variables and how it is configured. Test with your network traffic before investing in an IPS. This is the fourth in a seven-part series. Continue Reading
-
Buying an IPS: Decide which applications and protocols your IPS will protect
Application and protocol coverage varies in signature-, rate- and behavior-based intrusion prevention systems. Understanding the differences is crucial to your IPS investments. This is the third in a seven-part series. Continue Reading
-
Buying an IPS: Determine the approach you require
Signature-, rate- and behavior-based intrusion prevention systems each offer different network security capabilities. Understand each before investing in IPS. This is the second in a seven-part series. Continue Reading
-
How to keep a remote access VPN working smoothly
Test your VPN deployment by reviewing these three important tips from network pro Joel Snyder. Continue Reading
-
How to create your mobile device security policy
Joel Snyder explains how to support mobile devices in the enterprise without compromising security. Continue Reading
-
PCI DSS requirement: Building and maintaining a secure network
The first PCI focus area requires a set of documented configuration standards, perimeter and endpoint protection. Continue Reading
-
Buying an IPS: Determine why you need intrusion prevention
Learn how to develop the right IPS strategy for your network by first asking why your organization needs intrusion prevention. This is the first in a seven-part series. Continue Reading