A Distributed Denial of Service (DDoS) attack against your organization’s network and systems can bring your online business to a grinding halt, costing you hundreds of thousands – even millions – of dollars, ruining your brand, and driving away your customers.
Far too many organizations are ill-prepared to deal with the effects of DDoS attacks and other Internet security threats. They rely on traditional security devices including firewalls, intrusion prevention systems (IPS) and other ...
October 2011- Software stability is a major issue on any platform, but especially network appliances since it could affect the availability of a network. Anyone who uses software has most likely experienced problems that hang and/or force a reset of a computer or program. Such problems also occur in network appliances, and there may be times when there are no administrators around to get the appliance up and running again when things go wrong. The interruption ...
February 2009- Business trends like mobility and outsourcing present IT with the challenging task of opening the network to a dynamic workforce, while at the same time protecting critical assets from the vulnerabilities that openness and user mobility bring. Learn how Juniper Unified Access Control (UAC) helps enterprises tackle the range of network and application access problems. Learn how UAC can address five common networking challenges.
June 2009- IT managers face a difficult task in trying to offer robust services and applications while reducing IT costs and complexity. With unified communications, IT managers can offer streamlined communication solutions and advanced productivity applications throughout the network. Find out how.
May 2009- Learn how to select the right MSSP to help maximize your ability to manage and reduce risk within your budget.
August 2008- Most of today’s security products—such as firewalls, VPN, IDS/IPS—protect corporate networks and servers from threats coming from the Internet. Newer threats, such as bots, phishing, and malicious active content, target end users accessing Internet resources and infect corporate networks. Other than deploying caching and URL filtering products, corporations have done very little to inspect user-initiated traffic and protect their users. Web 2.0 applications, such as social and business networking, create both opportunities ...
April 2008- ConSentry provides this presentation on Intelligent Switching Architecture. Having intelligence directly in the switch simplifies the task of applying controls, ConSentry explains.
As more and more users work from the road, at home and at Wi-Fi hot spots within the community, tainted clients are routinely infiltrating hardened local networks. IT staff spend excessive amounts of time manually addressing each problem, installing patches, and granting access after everything’s cleaned up. Meanwhile, productivity takes a dive and
human error is introduced to the process.
With Microsoft Network Access Protection (NAP) and D-Link switching technology, the compliance ...
Comprehensive LAN Security: A Business Requirement [ Source: HP ]
January 2009- This paper goes beyond a simple restatement of the problem of network security, proposing a viable solution: ProCurve’s ProActive Defense strategy. The ProCurve ProActive Defense strategy delivers a cohesive network security approach, backed by products and services designed to give businesses the best possible chance to keep their networks up and running, and their crucial information and processes both safe and available.
December 2008- Think IT risk and risk management is only about security? Or that it’s just an annual exercise and technology controls are sufficient to address concerns in this area? Or perhaps you believe that the principles of risk management apply universally across all business environments? If so, think again—and find out why those views could leave your organization in a vulnerable position.
December 2008- The release rate of malicious code and other unwanted programs likely will continue to rise and exceed the quantity of legitimate software. Find out why that means it’s time to begin focusing security techniques on adaptive and effective solutions for writing signatures for a smaller number of legitimate programs.
December 2008- Organizations need to take a holistic and integrated approach to protecting their laptops, desktops, and servers. Learn more about how managing endpoint protection from a single, unified console simplifies security administration and enables operational efficiencies, including centralized software and policy updates—and provides the most effective way to combat today’s sophisticated and stealthy threats.
December 2008- Today’s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce. Organizations need innovative approaches to protect the Web, e-mail servers, and endpoints. This paper discusses the security implications of modern threats, analyzes where emerging technologies can add real value, and highlights five key strategies for ensuring solid protection from malware.
September 2008- As attitudes to work and information continue to evolve away from those of the past, organizations are become more aware of the acute need to control the information that flows into, through and out of their networks. This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support this policy, and ...
March 2008- A large financial institution was looking for a way to reduce expenditures related to its existing Web Access Management (WAM) solution. The company had implemented WAM to protect online access to the critical financial information of its 500,000 users. However, following deployment, the company found that maintaining and making changes to their WAM solution was both extremely costly and time consuming. The company looked to New York-based P2 Security for help. P2 Security's maXecurity reduces the ...
January 2008- This paper from Hewlett-Packard describes a secure network virtualization framework that helps realize the abstraction of Trusted Virtual Domains (TVDs), a security-enhanced variant of virtualized network zones. The framework allows groups of related virtual machines running on separate physical machines to be connected together as though they were on their own separate network fabric and, at the same time, helps enforce cross-group security requirements such as isolation, confidentiality, security, and information flow control. The framework ...
December 2010- When a virus brings the network down, for instance, the user picks up the tab in terms of lost time and damage to business efficiency. People may well be faced with financial, legal and brand equity implications, yet dealing with the problem eats up resources - and the IT budget in particular. Moreover, intellectual property is at risk if the user falls victim to the increasingly targeted, converging suite of commercially motivated threats now confronting ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services