Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "intrusion prevention"

Total Search Results : 23

Toward More Reliable Wireless With AirMagnet Enterprise 10

February 27, 2012 04:40 PM
If the phone isn't ringing, then your wireless users must not be feeling any pain, right? That can be a dangerous assumption in large, complicated wireless networks. Some issues may not be crystallized enough to raise your clients' ire, but the fact remains that performance is degraded. AirMagnet's latest Enterprise version wants to make hard-to-find problems more obvious even as the WLAN gets ever more complex.

Hacking Everything

September 01, 2011 08:58 AM
Here’s a puzzle for you: What do a new Dodge Ram pickup truck, a digital road sign, a young English lady’s cell phone and a modern lighting control system have in common? They’re not all necessarily made in the same Third World country, if that’s what you’re thinking. But they are all exploitable by virtue of their network connectivity, and the implications can be quite worrisome.

From The Labs: Palo Alto's Firewall Appliance

March 22, 2008 04:01 AM
Using signatures to identify unwanted apps, Palo Alto Networks puts control over network traffic back in the hands of IT.

Rollout: F-Secure Client Security 7

June 06, 2007 04:00 AM
New features and lower pricing make Client Security 7 a good fit for many businesses. But is that enough to entice enterprises to replace their existing security software?

Check Point Delivers IPS System

May 01, 2007 06:45 PM
Vendor ships new IPS-1, delivering real-time attack mitigation and forensic analysis to protect against worms, automated malware and other hybrid threats.

Sourcefire Takes Aim at Threat Management

April 19, 2007 09:06 PM
Vendor trains its focus on intrusion prevention, network behavior analysis, NAC and vulnerability assessment.

Check Point's VPN-1 Line Now Puts Up United Front

May 08, 2006 12:00 PM
Check Point Software Technologies is rolling out additions to its VPN-1 line that incorporate unified threat management to help solution providers in securing branch office and enterprise networks.

Lucid Security's ipAngel 400

March 10, 2006 05:00 AM
The latest version of this adaptive intrusion-prevention system gets some things right -- like an inline firewall and easy interface -- but it still has a way to go to

Distributed Wireless Security Monitoring Systems

February 08, 2006 05:00 AM
Distributed wireless security monitoring systems help categorize and prioritize threats. We examine two offerings from AirDefense and AirTight Networks.

Security Concerns Mount For Wireless Networks

January 18, 2006 06:20 PM
Security is top-of-mind for businesses managing wireless networks, especially as they start adding new applications, such as voice over IP. Meru Networks' new offering scrambles malicious code at the radio-frequency

 1 | 2 | 3  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers