Category Archives: Network Security

Secure Web Gateway as a Service: Simplifying the Path to Network Security

  Software as a service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS) are just a few of the now commonplace solutions that have been born through the cloud. Rather than forcing companies to expend resources on deploying and maintaining certain IT functions, “as-a-service” products can be leveraged […]

Read More

HITB Magazine – SVFORTH: A Forth for Security Analysis and Visualization

In this issue of HITB Magazine, you will find information on network security, database security, application security, computer forensics, computer security and mobile security. Also included in this issue are the following articles: Practical Attacks Against Encrypted VoIP Communications Hunting for OS X Rootkits in Memory Dynamic Tamper – Evidence […]

Read More

Web Application Defender’s Cookbook: Battling Hackers and Protecting Users–Free Sample Chapter

Defending your web applications against hackers and attackers. The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this […]

Read More

To Outsource or Not to Outsource: That is the Network Security Question

This paper discusses how to cost-effectively turn the tables on dedicated, well-armed cyber criminals, and ultimately win the battle for securing the network. Organizations today have two security options – insource their network security or outsource it to a Managed Security Service Provider (MSSP). There are pros and cons to […]

Read More

The Business Value of Managed Security Services

For many organizations, outsourcing network security services appears to be a logical choice. You avoid hardware, licensing, and maintenance costs; you benefit from around-the-clock security monitoring and management from dedicated security experts; and you free up your in-house IT staff to pursue activities core to your business mission. Yet many […]

Read More

Obtaining Fortune 500 Security without Busting Your Budget

Network security and regulatory compliance are expensive to do in-house for any size company, but if you are a small- or medium- sized business the burdens go beyond cost to staff bandwidth and security expertise. This white paper explores the problems with traditional network setups and ways to address these […]

Read More

Voice Application Development: 10 Biggest Mistakes to Avoid

Discover the 10 biggest mistakes voice app developers make when using phone numbers–and how you can avoid them. Developers everywhere are leveraging the power of phone numbers to integrate voice and text into applications, creating a more meaningful, engaging experience for users. If you’re thinking of a new way to […]

Read More

A Window into Mobile Device Security

The mass-adoption of both consumer and managed mobile devices in the enterprise has increased employee productivity but has also exposed the enterprise to new security risks. The latest mobile plat­forms were designed to build security features directly into the operating sys­tem to limit attacks from the outset. This white paper, […]

Read More

High Performance Intrusion Prevention Systems for Network Security Vendors

Find out how the latest generation of standard PC servers combined with Intelligent Real-time Network Analysis adapters can be used to build high-performance Intrusion Prevention Systems (IPS) for 1Gbps and 10 Gbps networks. Standard PC servers now provide the processing power and efficient memory architecture to ensure high-performing application and […]

Read More

HackerProof: Your Guide to PC Security

By downloading this free guide, you agree to receive regular updates on the latest cool apps, product reviews, and giveaways from MakeUseOf. The terms “PC security” or “computer security” are vague in the extreme. They tell you very little, like most general terms. This is because PC security is an […]

Read More

Cisco Reputation Filtering: Providing New Levels of Network Security

Today’s sophisticated, blended threats can exploit three or four different communications vehicles before they launch full-scale attacks on unprepared enterprise networks. This paper, written for IT managers and executives, examines the new security risks for today’s borderless enterprise networks, and describes how cloud-based Cisco Security Intelligence Operations and powerful, comprehensive […]

Read More

Network Security Features for Cisco Integrated Services Routers

Learn how Cisco’s routers deliver embedded security and VPN functions that allow organizations to identify, prevent, and adapt to network security threats in remote branches, right at the WAN perimeter. As threats come in every day a business needs to identify, prevent, and adapt to network security threats in remote […]

Read More

Best Practices for Securing Your Enterprise Wireless Network

Learn five best practices to secure enterprise networks from unauthorized use and hackers. With the rapid adoption of Wi-Fi networks by enterprise IT departments everywhere, network security now involves an entirely new dimension of vulnerability to malicious hackers and casual intruders. There are five fundamental areas which must be considered […]

Read More

BEST PRACTICES for Enterprise Network Security

Discusses Aligning security policies to correspond with the priorities of business assets… This paper discusses aligning security policies to correspond with the priorities of business assets, establishing security profiles for users and all the types of devices accessing your network, and creating online self-service centers for users. Today’s enterprises need […]

Read More

Achieving NAC Now and in the Future: The Role of SSL VPNs

Today, huge challenges exist to implementing as-yet immature NAC solutions: complex integration requirements, inadequate inspection capabilities, and weak policy management. NAC is a multifaceted framework to control who and what gets access to network resources, and helps keep malware from entering the enterprise. Today, there are huge challenges to implementing […]

Read More

Don’t Let Unsecured Faxing Be Your Data Security Weak Point

Learn from industry expert Mark Malone about how secure faxing, data protection and compliance go hand in hand and how not every fax server solution is built the same. Organizations are investing more time and resources these days focused on network security and protecting sensitive data, both in transit and […]

Read More

Continuous Monitoring (CM): A New Approach to Proactively Protecting Your Global Perimeter

Learn how CM provides you with an always-on view of potential security holes. In this guide, network security managers will learn how to automatically leverage vulnerability scans with CM for stronger security. Also covered:Requirements—why CM is vitalScanning—value of continuous vulnerability scansBest Practices—for using CMBenefits—examples of how CM improves securityDownload this […]

Read More