Tuesday, November 27, 2012

10 tips for implementing IPS securely

  What can be done about WAN packet loss and its impact on WAN application performance? | SJSU sidestepped sole source documentation in Cisco deal
 
  Network World Network Optimization

Forward this to a Friend >>>


10 tips for implementing IPS securely
An intrusion prevention system (IPS) includes all the features of an intrusion detection system but also has the ability to act upon malicious traffic. Since the IPS usually sits in line with network traffic it can shut down attacks, typically by blocking access from the attacker or blocking access to the target. In some cases, the IPS can talk to the firewall to block an attack. Read More


WHITE PAPER: Riverbed

Steelhead Cloud Accelerator Solution Brief
Learn how enterprises must tackle these challenges for SaaS applications to remain a viable option. Read now.

RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

What can be done about WAN packet loss and its impact on WAN application performance?
Last time, we delved into the reasons that packet loss has such an enormous impact on application performance over the WAN in the first place. Read More

SJSU sidestepped sole source documentation in Cisco deal
The San Jose State University did not file sole source/sole brand requisition and justification documentation with the California State University's Chancellor's office before awarding a $28 million contract to Cisco reseller Nexus IS without a competitive bid. This appears to be in violation of the CSU Information Technology Project & Procurement Planning Guidelines. Read More

Vectoring could allow Deutsche Telekom to boost copper broadband speeds to 100M bps
German network operator Deutsche Telekom is planning to upgrade its copper broadband network using a technology called vectoring, which will result in speeds of up to 100M bps. Read More


WHITE PAPER: Shoretel

Sophisticated Simplicity
The key is to build simplicity and ease of use into these solutions from Day 1. This white paper will demonstrate a clear path to UC simplicity, and to overall success of UC deployments. Learn more.

What do Star Trek and software-defined networking have in common?
For decades, networks have been built on closed, proprietary infrastructure. It's what's allowed vendors to create unique features and differentiate themselves. Those features are what have enabled the networks to be as reliable, secure and resilient as they have been in the past. However, over the past couple of years it seems that "open" has become the new black when it comes to network infrastructure. Read More

Three common strategies to support BYOD
The easiest way to secure the network and protect company data is to simply not allow mobile devices to access company resources at all. Of course, that's a highly impractical policy, and one that ignores the many benefits mobile devices bring to the table. You can block non-managed devices from connecting to the network, and you can lock down USB ports on company PCs, but it's virtually impossible to ban employee-owned devices altogether. Read More

What Cisco and Dell's Cloupia and Gale acquisitions mean to the future of IT
As cloud technologies continue to disrupt the enterprise computing landscape the norms of the old are being swept a way to make room for new norms that will define the way organizations deploy and manage technology in the cloud era … at least until the next epochal shift. Read More


WHITE PAPER: Cisco

Understanding the Options to Find the Right Fit
Wondering which cloud collaboration solution is best for your business? Learn the four key factors you must consider when choosing a supplier--and find the right solution that will enable faster time to market. Read Now

Mozilla bakes Facebook features into Firefox 17
Mozilla Tuesday released Firefox 17, which debuts technology that lets developers integrate social networks -- for now, Facebook -- with the browser. Read More

FCC might make carriers say how well they performed in disasters
The U.S. Federal Communications Commission may seek to make carriers reveal how well their networks withstood major natural disasters so that consumers can compare rival providers. Read More

Microsoft Research hires big computer science thinker Jeannette Wing
Jeannette Wing, a prominent computer science, security and privacy researcher, has been named a VP at Microsoft Research and head of Microsoft Research International. Read More

Cisco's wireless chief: Meraki simplifies customers' lives
Meraki Networks, the tiny, privately held WLAN vendor that Cisco earlier this week announced it will buy for $1.2 billion, is as different from Cisco as night is from day. Read More

 
 
 

SLIDESHOWS

Be a hero for the holidays
Peruse through Network World's 2012 version of the cool yule tools.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 12 sweet Cyber Monday tech deals
  2. Bye-bye, mouse. Hello, mind control
  3. Tutorial on using Windows 8
  4. School district opts for VDI in computer labs
  5. First look: Firefox 17
  6. .xxx to launch porn search engine
  7. 2013 IT salaries: 15 titles getting the biggest pay raises
  8. Windows XP countdown clock ticks under 500 days
  9. 10 things you can get from Windows 8 that Windows 7 just doesn't have
  10. Symantec spots odd malware designed to corrupt databases
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment