| Article | Rating | Date |
|---|---|---|
|
The proliferation of consumer technology on campuses has created new challenges for IT departments. Will the pendulum swing back toward centralized IT, or is consumerization knocking down the old ways forever? NG Firewall |
11/05/2012 | |
|
Wireless LANs (WLANs) offer the flexibility to work from more locations, boosting productivity for employees, on-site partners, contractors, and guests. At retail and professional settings, such as cafés or clinic waiting rooms, WLANs enhance customer experience and satisfaction, increasing sales and loyalty. WLANs can also off set costs of deploying a wired infrastructure. WLANs can also be used to off set the cost of deploying a wired infrastructure. wireless security |
11/05/2012 | |
|
With company-issued, IT-controlled laptops, IT has traditionally had the option to lock down the operating system to prevent the installation of potentially insecure or non-approved applications. This consumerization of IT (as well as the budgetary incentive of offsetting inventory costs) has led companies to establish Âbring your own device (BYOD) policies that enable employees to select their own personal mobile devices for use at work ssl vpn , access control |
11/05/2012 | |
|
Dell SonicWALL's advanced security platform uniquely consolidates core Next-Gen Firewall application intelligence, control and visualization, gateway protection and SSL inspection for enterprises along with WAN acceleration for distributed offices, elements that work seamlessly together to maximize security and control. The following e-book outlines 10 ways Dell SonicWALL solutions can help optimize performance, enhance security, and increase employee productivity, without introducing latency. sonicwall tz 105 , firewall , network optimization |
11/05/2012 | |
|
The latest generation of exploits used to attack computer systems relies on extremely sophisticated evasion techniques to escape detection. The most serious of these attacks can provide the attacker with the ability to remotely initiate system-level commands. Today's intrusion prevention systems (IPS) provide advanced security intelligence and the ability to identify and block malware before it can enter your network so that you can defeat these sophisticated evasion techniques. ips |
11/02/2012 | |
|
As the number and severity of cyber-crimes continues to grow, it's important to understand the steps cyber-criminals take to attack your network, the types of malware they use, and the tools you need to stop them. The basic steps of a cyber attack include reconnaissance (finding vulnerabilities); intrusion (actual penetration of the network); malware insertion (secretly leaving code behind); and clean-up (covering tracks). malware , hacking |
11/02/2012 |