Network Security

Snort – Open Source Intrusion Detection System

Snort – Open Source Intrusion Detection System

This article gives an overview about Snort which is an software based freely downloadable open source Network Intrusion Detection system along with its components, installation ways and methods, modes of operation etc. »

An overview of IPS – Intrusion Prevention System and types of Network Threats

An overview of IPS – Intrusion Prevention System and types of Network Threats

This article gives a general introduction to IPS - Intrusion Prevention System for Network Security and also gives a list of network threats that can be identified and mitigated by such Intrusion Prevention Systems. »

Hardware Vs Sofware UTM and Open Source UTM

Hardware Vs Sofware UTM and Open Source UTM

This article is about the two types of Unified Threat Management solutions (UTM) - hardware and software. We will discuss the plus and minus points of both of them. We will also have a look at the open-source UTM for SMB, which you can download and install free of cost. »

An Introduction to Unified Threat Management in Network Security

An Introduction to Unified Threat Management in Network Security

In this article, we have a look at a broad range of network security threats that concerns an enterprise user, what is Unified Threat Management (UTM) and why it is required, the types of UTM - hardware based, software based and distributed model, and the advantages and limitations of UTM based network security solutions. »

An overview of socially engineered deceptive internet threats

An overview of socially engineered deceptive internet threats

Threats arising due to internet usage are quite wide. We will look at a few of them, especially the ones where cyber criminals use deception as the main tool to trick the net users and either plant malicious software in the computers which might later act as botnets, spyware etc. or make them come... »

Host Integrity Check for Endpoint and Network Security

Host Integrity Check for Endpoint and Network Security

This article gives an introduction to Host Integrity Check mechanism that enables enterprises to enforce the connectivity of their endpoints (Laptops/Desktops) only if they comply to the security policies of the network (Like latest patches, signature updates etc), the components of such a solution, host integrity check for managed, unmanaged and unmanageable endpoints,... »

Types of DoS attacks and how they are mitigated

Types of DoS attacks and how they are mitigated

This article looks at the main types of Denial Of Service attacks like Previously known DoS attacks (Juno etc.), Unknown DoS flooding attacks, SYN floods, connection limit attacks etc. in an enterprise network and the ways in which IPS systems mitigate those attacks. »

Why is URL Filtering required and how it is accomplished

This article provides an introduction to what is URL Filtering, why it is needed and how it is done at enterprise level. We also have a look at the various factors involved in categorizing the websites and updating them. The advantages and dis-advantages of URL filtering are also discussed. »

Options available for securing Enterprise Email

This article provides an overview of the various options available for securing enterprise email communications like anti-spam, anti-virus, zero-hour anti-virus, content policies, outbound email attachment scanning for DLP, email encryption, confidential data leakage protection and protection for web-based confidential data leakage (through http and ftp) from organizations. »

Securing and Monitoring portable USB based devices

This article attempts to see if bulk enterprise security policies can be applied to portable devices like USB pen drives, mp3 players, cellphone connecting through USB, CD/DVD media, Digital Cameras etc, if they can be managed from a central software application, and the features offered by such an application for Data Leakage Prevention. »

Get email updates when new articles are published

Enter your email address:

Delivered by FeedBurner

Network equipment

Follow me in Twitter!