Network Security Resources

Network Security news and support resources, featuring the hottest solutions, technologies and vendors in the Network Security world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Tag "Network Security"

VLAN Tagging and Citrix XenClient Enterprise 4.5

DABCC
VLAN tagging separates network traffic between virtual desktops running on a single XenClient-powered end-point device, enabling organizations to meet strict security and compliance requirements.  Why would organizations care about this?  It’s valuable in any use case where a different level of security or isolation is required in one virtual desktop vs. another – for example […]

Do enterprise security teams want “Big Data Security”?

DABCC
A big theme at the RSA Conference this year is a concept known as Big Data Security — the idea that massive amounts of data related to both network security and of business context should be stockpiled to be analyzed to pinpoint malware, rogue insiders and stealthy attacks aimed at stealing sensitive data. But the […]

Splunk and Palo Alto Networks Join Forces to Enhance Enterprise Security Intelligence

DABCC
Splunk Inc. (NASDAQ: SPLK), the leading software platform for real-time operational intelligence, and Palo Alto Networks, the network security company, today announced a joint solution that takes security intelligence across the enterprise to a new level. Working together, Splunk and Palo Alto Networks have created the Splunk App for Palo Alto Networks 3.0, which enables […]

Trends Changing the Network Security Landscape

DABCC
Technology in the network security space has been through many dramatic changes recently. New mobile operating systems, growing use of personal devices and SaaS (software-as-a-service) delivery make securing the network a growing challenge. Enhancements in the network infrastructure that connect devices within or across the network make all these developments possible. We’re seeing ever faster network […]

Download “System Center 2012 Monitoring Pack for RemoteAccess 2012”

DABCC
Microsoft System Center Monitoring Pack for Remote Access helps you monitor the health and availability of computers configured for Remote Access server role and running Windows Server 2012.  System Center Monitoring Pack for Remote Access combines monitoring for DirectAccess and RRAS into a single management pack. Monitoring capabilities for DirectAccess have been enhanced to cover […]

System Center 2012 Monitoring Pack for RemoteAccess 2012

Microsoft
Microsoft System Center Monitoring Pack for Remote Access helps you monitor the health and availability of computers configured for Remote Access server role and running Windows Server 2012.  System Center Monitoring Pack for Remote Access combines monitoring for DirectAccess and RRAS into a single management pack. Monitoring capabilities for DirectAccess have been enhanced to cover […]

E92plus Bites Back at Barracuda with Unitrends Pact

Unitrends
Following its snub by Barracuda, distributor e92plus is courting its reseller base with a replacement backup solution that it claims will offer them more flexibility and a bigger revenue opportunity. Network security and backup vendor Barracuda axed e92plus from its UK distribution line-up last month after opting to move forward with Wick Hill and Avnet. The termination […]

Wanna Be A Security Player? Deliver It In Software As A Service Layer…

DABCC
As I continue to think about the opportunities that Software Defined Networking (SDN) and Network Function Virtualization (NFV) bring into focus, the capability to deliver security as a service layer is indeed exciting. I wrote about how SDN and OpenFlow (as a functional example) and the security use cases provided by each will be a differentiating […]

Citrix Releases XenServer 6.1

DABCC
Over the past several months, literally hundreds of people have asked me the question “When will Tampa release?”  I am pleased to announce that earlier today, “Tampa” officially reached GA as XenServer 6.1.  Within engineering, this is officially considered a “cloud centric” release.  While on the surface that would seem to indicate a lack of features […]

10 tips for implementing BYOD securely

DABCC
With the Bring Your Own Device (BYOD) movement quickly becoming an accepted norm, IT needs to better understand how it impacts all aspects of the corporate network security strategy. BYOD is another technology trend that moves a company from a position of risk avoidance to risk management. Where many IT organizations get it wrong is they focus […]

VMware End User Computing: Design Considerations and Best Practices for the Mobile Secure Desktop

DABCC
Today VMware is launching the Mobile Secure Desktop bootcamp series, and in the first session we cover design considerations and best practices for the Mobile Secure Desktop solution. The Mobile Secure Desktop solution has been created to provide a validated blueprint for our partners and customers, and provide a reference toolkit of components to accelerate […]

TriCerat Releases Remote Scanning Software RC for Download

Tricerat
Responding to the increasing number of businesses that need to regularly scan documents but struggle with security and quality issues, software developer triCerat, Inc. – creator of the revolutionary ScrewDrivers® print management technology – is introducing the release candidate (RC) version of its breakthrough Scanect™ remote scanning software. Unlike other remote scanning solutions, Scanect™ software provides a seamless scanning operation that […]

Network security in the BYOD era

DABCC
The bring your own device (BYOD) phenomenon may be consumer-led, it may be tempting to also pass along network and data security onto employees, but doing so would lull you into a false sense of security. If anything, BYOD means that IT departments should be more vigilant than ever in making sure their security policies […]

RecordTS – Your Terminal Services and Remote Desktop Security Camera

DABCC
RecordTS records remote desktop session activity when users connect to a server, a workstation, a Terminal Server, or a Citrix Server. All activity is recorded including keystrokes, mouse movements, file downloads, etc. – nothing is left out or missed. Recordings can be automatically stored to a central storage area and databased to provide for quicker […]

Visit Our Sponsors

Close