By Joe Stanganelli | Oct 31, 2013
The Internet of Things comes with a security downside that can't be ignored.
By Sean Michael Kerner | Oct 21, 2013
New study from Fortinet shows a surprising disregard for BYOD policies.
By Jude Chao | Oct 15, 2013
NAC vendor announces platform for integration, information sharing, visibility, and security automation with CounterACT.
By Sean Michael Kerner | Oct 7, 2013
New Silicon ASICs power FortiGate-3700D Data Center Firewall
By Jude Chao | Sep 5, 2013
Security startup uses microvirtualization and hardware isolation to protect the perimeter from attacks.
By Jude Chao | Aug 28, 2013
Nowhere is security more of a moving target than in virtualized and software defined environments. Vendors at VMworld look to address that.
By Jude Chao | Aug 13, 2013
NAC market growth spawns new Endpoint Visibility, Access and Security (EVAS) category. How can EVAS solutions enhance security?
By Jude Chao | Aug 6, 2013
Network and application visibility and monitoring solutions vendor promises seamless security and swift defense through software defined networking.
By Jude Chao | Jul 24, 2013
Distributed enterprise networks must take different measures to mitigate threats than their more centralized counterparts.
By Frank Ohlhorst | Jun 11, 2013
AVG CloudCare aims to solve SME endpoint security and management headaches while ramping up protection.
By Jude Chao | Jun 6, 2013
It's not Patch Tuesday anymore. Maximize your network's security with these patch management system tips.
By Maya Itah | May 30, 2013
Workers want to use their preferred file hosting services and productivity applications. How do you keep them happy while keeping your data and network secure?
By Frank Ohlhorst | May 22, 2013
Simplicity and accessibility make SEP SBE 2013 a strong security choice for small and medium businesses.
By Frank Ohlhorst | Apr 15, 2013
Firewall Security Manager (FSM) from SolarWinds brings unification to firewall management by centralizing control into a single easy-to-use application.
By Frank Ohlhorst | Mar 27, 2013
NetCitadel unifies security with a cloud service that is both easy to use and vendor agnostic, eliminating many of the challenges faced by security administrators.
By Paul Rubens | Aug 16, 2012
We cover everything you need to know about Mobile Device Management (MDM) products, from must-have features to vendors large and small.
By Daniel P. Dern | Apr 26, 2012
Fortinet adds enterprise-class IPv6-ready appliance and a carry-grade security blade to its Firewall product lineup.
By Ted Stevenson | Feb 28, 2012
Strong security is a must for any network provider and deep packet inspection as well as behavioral analysis are leading the way to more secure networks.
By Lisa Phifer | Nov 8, 2011
CounterACT takes an automated Swiss army knife approach to controlling network access.
By Paul Rubens | Dec 29, 2011
Red Seal's Network Advisor and Vulnerability Advisor work in tandem to uncover and alert your admins to configuration vulnerabilities in the network.
By Lisa Phifer | Feb 13, 2012
Bradford's Network Sentry layers NAC solutions atop a modular foundation that delivers visibility into and context around the world of alerts and indicators.
By Lisa Phifer | Nov 18, 2011
Avenda’s eTIPS strives to fit NAC into any network, small or large.
By Lisa Phifer | Nov 2, 2011
In this network hardware buying guide, we pose questions that every organization should ask when selecting a NAC Appliance.
By Sean Michael Kerner | Oct 14, 2011
Your logs aren't just for auditing and compliance, they can also be used in an SIEM solution that will remediate for security risk and threats.
By Lisa Phifer | Sep 25, 2011
NIKSUN NetDetector Alpine marries IDS and network forensics.
By Lisa Phifer | Oct 8, 2011
Solera DeepSee uses speedy forensic data navigation to improve time-to-resolution
By Lisa Phifer | Sep 25, 2011
In this EnterpriseNetworkingPlanet Network Forensics Appliance buying guide, we look at how RSA's acquisition of NetWitness marries two best-of-breed products to create a comprehensive monitoring solution
By Lisa Phifer | Sep 16, 2011
Network Forensics Appliances can provide situational awareness and incident preparedness. In this buying guide, we examine the capabilities and features they offer so you can make the best buying decision.
By Lisa Phifer | Aug 11, 2011
E-Class appliances use reassembly free deep packet inspection to deliver speedy application intelligence and control.
By Lisa Phifer | Jul 29, 2011
Next-generation firewall pioneer continues to raise the bar, using App-ID to control port-hoppers and encrypted Web apps.
By Lisa Phifer | Jul 11, 2011
Given the rise of Web 2.0 and targeted malware, first-generation firewalls are not effective in dealing with current and emerging threats. Next-generation firewalls can detect application-specific attacks and enforce application-specific security policies.
By Lisa Phifer | Jun 13, 2011
E-Class SRA appliances offer flexible-yet-secure mobile access, governed by unified policies.
By Lisa Phifer | Jun 29, 2011
MAG Series Junos Pulse gateways unify network access control and SSL VPN to deliver safer mobile access.
By Lisa Phifer | Jun 21, 2011
Using AnyConnect Secure Mobility, Cisco leverages its VPN appliance to enable 'borderless' protection.
By Lisa Phifer | Jun 6, 2011
The days when a virtual private network meant just employee access from a laptop are gone. Today's VPN appliances must juggle on- and off-site smartphones, tablets, notebooks, you name it -- giving VPN shoppers a new set of challenges.
By Paul Rubens | Mar 14, 2011
Metasploit's a complex project, but it's an essential penetration testing tool. Learn to tame its power with Armitage, a GUI for Metasploit.
By Sue Poremba | Mar 10, 2011
Sometimes I think that Google and other search engines should have a sign at the top of the page: Surf at your own risk!
By Paul Rubens | Sep 16, 2010
When it comes to network security, Murphy's Law might read a little differently: If something can leave you vulnerable, it will leave you vulnerable.
By Paul Rubens | Jun 1, 2010
While your network security team spends its time worrying about network-based attacks, the number of data breaches chalked up to Web applications continues to grow. Are you fighting yesterday's battles, too?
By Paul Rubens | Mar 27, 2008
Keeping up on your patches is only half the battle. Here are six security sites and mailing lists you should be making part of your efforts to keep up on the fast-moving field of network security.
By Paul Rubens | Jul 12, 2007
You want to restrict traffic and enhance network security, your users want to get at that traffic. Here are a few techniques that demonstrate how tossing up a firewall won't do you any favors.
By Cynthia Harvey | Apr 27, 2007
Are open source network security apps a good choice for your company? A look at the pros and cons. Plus: a handful of apps in the forefront.
By Jabez Gan | Dec 16, 2010
If you want to bring your existing identity services to your mobile users, these RADIUS servers can do it for very little money.
By Eric Geier | Sep 8, 2010
You should use Enterprise mode security on your Wi-Fi network, but it's a complex task to configure 802.1X security. Avenda's Quick1X offers a handy wizard and other tools to make the job simpler.