Enterprise Network Security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Defense in Depth 2.0

    This video will offer an executive overview of not only the key business and technical issues that have necessitated a dramatic change in defense in depth design, but also how to develop a strategy that can be used to drive an organization’s layered defense tactics amid a threat landscape that has evolved rapidly in the last 1-2 years.

  • Lumension adds to its endpoint security products with EIC

    Lumension announced the Endpoint Intelligence Center to protect endpoint computers from threats, malware and third-party software vulnerabilities.

  • wildcard certificate

    A wildcard certificate is a digital certificate that is applied to a domain and all its subdomains.

  • PDF download: Information Security magazine October 2012

    In this issue, find out who won this year's Readers' Choice Awards. Also learn about threat management best practices and how hacktivists are impacting the threat landscape.

  • security event (security incident)

    A security event is a change in the everyday operations of a network or IT service, indicating that an security policy may have been violated or a security safeguard may have failed.

  • security information and event management (SIEM)

    Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of organization’s information technology (IT) security. 

  • Computer Security Incident Response Team (CSIRT)

    A Computer Security Incident Response Team (CSIRT) is a group of professionals that receives reports of security breaches, conducts analyses of  the reports and responds to the senders.

  • Cisco SecureX strategy gets boost with application-aware firewall

    Under new leadership, the networking giant's security group relaunched Cisco SecureX with several new products, including an application-aware firewall.

  • Best intrusion detection/prevention products 2011

    Readers choose the best intrusion detection/prevention products.

  • network intrusion protection system (NIPS)

    A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity.

  • Defense in Depth 2.0

    This video will offer an executive overview of not only the key business and technical issues that have necessitated a dramatic change in defense in depth design, but also how to develop a strategy that can be used to drive an organization’s layered defense tactics amid a threat landscape that has evolved rapidly in the last 1-2 years.

  • Hacktivism examples: What companies can learn from the HBGary attack

    A few simple security best practices may have spared security company HBGary Federal from the recent attack by the hacktivist group Anonymous. Nick Lewis explains what happened and how to prevent such an attack against your company.

  • BYOD (bring your own device)

    BYOD (bring your own device) is the increasing trend of employees bringing their own devices to work. Smartphones are the most common example but employees also take tablets, laptops and USB drives into the workplace. BYOD is part of the larger trend of IT consumerization, in which consumer software and hardware are being brought into the enterprise.

  • How can solution providers augment BlackBerry PlayBook security?

    Expert Lisa Phifer explains how to help customers with PlayBook Security, and reveals future PlayBook enterprise features.