Sort results by: Published date | Company name
Showing items 1-17

The Evolution of LAN Bypass Technology: Lanner's Generation One to Generation Three Bypass [ Source: Lanner Electronics ]

October 2011- Software stability is a major issue on any platform, but especially network appliances since it could affect the availability of a network. Anyone who uses software has most likely experienced problems that hang and/or force a reset of a computer or program. Such problems also occur in network appliances, and there may be times when there are no administrators around to get the appliance up and running again when things go wrong. The interruption ...

Top 5 NAC Challenges and How to Tackle Them [ Source: Juniper Networks ]

February 2009- Business trends like mobility and outsourcing present IT with the challenging task of opening the network to a dynamic workforce, while at the same time protecting critical assets from the vulnerabilities that openness and user mobility bring. Learn how Juniper Unified Access Control (UAC) helps enterprises tackle the range of network and application access problems. Learn how UAC can address five common networking challenges.

Networking and Unified Communications [ Source: CDW ]

June 2009- IT managers face a difficult task in trying to offer robust services and applications while reducing IT costs and complexity. With unified communications, IT managers can offer streamlined communication solutions and advanced productivity applications throughout the network. Find out how.

Simplifying Network Security with a Single Source Provider [ Source: Perimeter ]

May 2009- Learn how to select the right MSSP to help maximize your ability to manage and reduce risk within your budget.

Zscaler Explains Its In-The-Cloud Service [ Source: Zscaler ]

August 2008- Most of today’s security products—such as firewalls, VPN, IDS/IPS—protect corporate networks and servers from threats coming from the Internet. Newer threats, such as bots, phishing, and malicious active content, target end users accessing Internet resources and infect corporate networks. Other than deploying caching and URL filtering products, corporations have done very little to inspect user-initiated traffic and protect their users. Web 2.0 applications, such as social and business networking, create both opportunities ...

Intelligent Switching: Bringing User And Application Knowledge And Control To The LAN [ Source: ConSentry Networks ]

April 2008- ConSentry provides this presentation on Intelligent Switching Architecture. Having intelligence directly in the switch simplifies the task of applying controls, ConSentry explains.

Protect Networks from Non-Compliant Remote PCs [ Source: D-Link ]

August 2008- As more and more users work from the road, at home and at Wi-Fi hot spots within the community, tainted clients are routinely infiltrating hardened local networks. IT staff spend excessive amounts of time manually addressing each problem, installing patches, and granting access after everything’s cleaned up. Meanwhile, productivity takes a dive and human error is introduced to the process.

With Microsoft Network Access Protection (NAP) and D-Link switching technology, the compliance ...

Comprehensive LAN Security: A Business Requirement [ Source: HP ]

January 2009- This paper goes beyond a simple restatement of the problem of network security, proposing a viable solution: ProCurve’s ProActive Defense strategy. The ProCurve ProActive Defense strategy delivers a cohesive network security approach, backed by products and services designed to give businesses the best possible chance to keep their networks up and running, and their crucial information and processes both safe and available.

IT Risk Management Report 2: Myths And Realities [ Source: Symantec ]

December 2008- Think IT risk and risk management is only about security? Or that it’s just an annual exercise and technology controls are sufficient to address concerns in this area? Or perhaps you believe that the principles of risk management apply universally across all business environments? If so, think again—and find out why those views could leave your organization in a vulnerable position.

Symantec Internet Threat Security Report [ Source: Symantec ]

December 2008- The release rate of malicious code and other unwanted programs likely will continue to rise and exceed the quantity of legitimate software. Find out why that means it’s time to begin focusing security techniques on adaptive and effective solutions for writing signatures for a smaller number of legitimate programs.

Symantec Endpoint Protection: A Unified, Proactive Approach To Endpoint Security [ Source: Symantec ]

December 2008- Organizations need to take a holistic and integrated approach to protecting their laptops, desktops, and servers. Learn more about how managing endpoint protection from a single, unified console simplifies security administration and enables operational efficiencies, including centralized software and policy updates—and provides the most effective way to combat today’s sophisticated and stealthy threats.

Top Five Strategies for Combating Modern Threats: Is Anti-Virus Dead? [ Source: Sophos ]

December 2008- Today’s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce. Organizations need innovative approaches to protect the Web, e-mail servers, and endpoints. This paper discusses the security implications of modern threats, analyzes where emerging technologies can add real value, and highlights five key strategies for ensuring solid protection from malware.

Stopping Data Leakage: Exploiting Your Existing Security Investment [ Source: Sophos ]

September 2008- As attitudes to work and information continue to evolve away from those of the past, organizations are become more aware of the acute need to control the information that flows into, through and out of their networks. This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support this policy, and ...

The Next Generation of Web Access Management [ Source: P2 Security ]

March 2008- A large financial institution was looking for a way to reduce expenditures related to its existing Web Access Management (WAM) solution. The company had implemented WAM to protect online access to the critical financial information of its 500,000 users. However, following deployment, the company found that maintaining and making changes to their WAM solution was both extremely costly and time consuming. The company looked to New York-based P2 Security for help. P2 Security's maXecurity reduces the ...

Towards Automated Provisioning of Secure Virtualized Networks [ Source: Association for Computing Machinery ]

January 2008- This paper from Hewlett-Packard describes a secure network virtualization framework that helps realize the abstraction of Trusted Virtual Domains (TVDs), a security-enhanced variant of virtualized network zones. The framework allows groups of related virtual machines running on separate physical machines to be connected together as though they were on their own separate network fabric and, at the same time, helps enforce cross-group security requirements such as isolation, confidentiality, security, and information flow control. The framework ...

Evolving Email, Web and IM Threats and How to Manage Them [ Source: MessageLabs, Symantec Hosted Services ]

December 2010- When a virus brings the network down, for instance, the user picks up the tab in terms of lost time and damage to business efficiency. People may well be faced with financial, legal and brand equity implications, yet dealing with the problem eats up resources - and the IT budget in particular. Moreover, intellectual property is at risk if the user falls victim to the increasingly targeted, converging suite of commercially motivated threats now confronting ...