Quantcast
Channel: Network Computing: Author
Browsing all 10 articles
Browse latest View live

Cisco Security Group Access: An Introduction

The concept of identity-based network access -- essentially, providing credentials to gain access to a network or a resource -- is not a new phenomenon. Over the years, it's evolved from logging onto...

View Article



Secure Networks: How To Develop An Information Security Policy

Security is often referred to as an overlay to a network topology. While security methods provide protection for access and infrastructure, these methods should be the result of a carefully defined...

View Article

Building an Information Security Policy Part 1: Network Devices

In my previous blog I outlined some important business and high-level design considerations for building an effective security policy. Understanding your network topology is key to a good security...

View Article

Building An Information Security Policy Part 2: Hardware and Software

In my previous blog, I outlined how understanding the roles of network devices is important for building an effective security policy. In this post, I will cover considerations when selecting hardware...

View Article

Building An Information Security Policy Part 3: Logical And Physical Design

In my previous blog, I discussed key points for the selection of appropriate hardware and software in order to build and maintain an effective security policy. In this post, I will cover security...

View Article


Building an Information Security Policy Part 4: Addresses and Identifiers

The first three posts in this series have focused on many physical aspects of building a secure network: choosing hardware and software, and understanding your physical topology in order to apply your...

View Article

Building An Information Security Policy, Part 5: Managing Identities

In my previous blog post in this multi-part series on constructing  an information security policy, I reviewed identifiers such as IP addresses and VLAN IDs and their role as security policy match...

View Article

NETCONF: Introduction To An Emerging Networking Standard

Standards bodies like the IETF have been responsible for introducing innovative new protocols and methods for vendor-agnostic deployment. Some of the most well-known protocol definitions that have gone...

View Article


Network Analytics: Beyond Log Files

Collecting information about network events has long been essential to providing a record of activities related to requirements such as accounting, billing, compliance, SLAs, and forensics. Systems and...

View Article


DIY Big Data Security Analytics: OpenSOC

Big data analytics provides scalable, high-performance analysis of large data sets. It allows for the examination of large volumes data to discover patterns, behaviors and correlations that can be used...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images