| Article | Rating | Date |
|---|---|---|
|
HTTPS content inspection is the process in which the entire content that is transmitted over SSL channel is scanned for malicious elements, and checked against configured policies before allowing or denying the content to pass through the gateway and enter into the network. Unlike Deep Packet Inspection (DPI) where each packet is inspected for malware, spyware, etc., in HTTPS content inspection the entire payload is scanned and verified to be trusted before making it available to the requesting party. The process of HTTPS content inspection ensures that no harmful and inappropriate information enters into the network, even if requested by any internal computer. https |
12/07/2012 | |
|
Application control is a process in which security administrators can limit or completely restrict users’ access to unwanted/untrusted applications. Some application control systems also allow security administrators to configure the control settings even granularly so that an application can be made available to some users, while restricting the access to same application for other users. Application Control |
12/07/2012 | |
|
WAN failover is the process in which redundant WAN connections are configured to increase WAN uptime. To establish WAN failover, two separate WAN connections from different ISPs are required which work as primary and secondary connections. It is important that both WAN connections are from different ISPs so that if any problem arises in the WAN link from one ISP, link from second ISP can be used to establish a WAN connection. Hardware Failover |
16/11/2012 | |
|
Hardware failover is a process in which at least two hardware firewall devices work together in active/passive configuration. The active firewall is called primary whereas the firewall that remains in passive mode is known as the secondary or more often a backup firewall. The primary and backup firewalls are connected to each other through a dedicated LAN connection. Hardware Failover |
16/11/2012 | |
|
Firewalls play an important role when it comes to security of data from external threats and prevention from intrusions. Almost every small, medium and large scale organization installs one or more firewalls to filter incoming and outgoing packets on the basis of defined rule-sets in order to protect sensitive data from theft and misuse Implementation , firewall , DMZ , network optimization , IP Address |
16/11/2012 | |
|
User authentication is a process in which users’ credentials are required by the firewall gateways before the users are to communicate with the external network (typically the Internet). In case users fail to provide proper credentials when requested by the firewall gateways, their access request to the Internet network is denied, and users are not allowed to communicate with the external network. access control , authentication |
16/11/2012 | |
|
The proliferation of consumer technology on campuses has created new challenges for IT departments. Will the pendulum swing back toward centralized IT, or is consumerization knocking down the old ways forever? NG Firewall |
11/05/2012 | |
|
Wireless LANs (WLANs) offer the flexibility to work from more locations, boosting productivity for employees, on-site partners, contractors, and guests. At retail and professional settings, such as cafés or clinic waiting rooms, WLANs enhance customer experience and satisfaction, increasing sales and loyalty. WLANs can also off set costs of deploying a wired infrastructure. WLANs can also be used to off set the cost of deploying a wired infrastructure. wireless security |
11/05/2012 | |
|
Dell SonicWALL's advanced security platform uniquely consolidates core Next-Gen Firewall application intelligence, control and visualization, gateway protection and SSL inspection for enterprises along with WAN acceleration for distributed offices, elements that work seamlessly together to maximize security and control. The following e-book outlines 10 ways Dell SonicWALL solutions can help optimize performance, enhance security, and increase employee productivity, without introducing latency. sonicwall tz 105 , firewall , network optimization |
11/05/2012 | |
|
The latest generation of exploits used to attack computer systems relies on extremely sophisticated evasion techniques to escape detection. The most serious of these attacks can provide the attacker with the ability to remotely initiate system-level commands. Today's intrusion prevention systems (IPS) provide advanced security intelligence and the ability to identify and block malware before it can enter your network so that you can defeat these sophisticated evasion techniques. ips |
11/02/2012 | |
|
As the number and severity of cyber-crimes continues to grow, it's important to understand the steps cyber-criminals take to attack your network, the types of malware they use, and the tools you need to stop them. The basic steps of a cyber attack include reconnaissance (finding vulnerabilities); intrusion (actual penetration of the network); malware insertion (secretly leaving code behind); and clean-up (covering tracks). malware , hacking |
11/02/2012 | |
|
Demilitarized Zone (DMZ), sometimes also referred to as Perimeter Network, is a small network of few computers, and lies between the external untrusted network (mostly the Internet) and the internal network (local area network) that contains sensitive data which cannot be exposed to unauthorized people at any cost. DMZ |
31/10/2012 | |
|
Firewall rules are the set of instructions defined by security administrator in an organization. Firewall rules are defined for inbound and outbound network traffics individually, and are used to allow or deny the packets on the basis of their services, user accounts, protocols, port numbers, source addresses, destination addresses, etc. Firewall Rules |
31/10/2012 | |
|
Logs are important aspect of any network architecture in a way that with the help of logs, administrators can diagnose and analyze the cause of any trouble that may occur. Like firewall installation and configuration, monitoring firewall logs also require in-depth knowledge of ports, protocols and other network related technicalities. Therefore, it is recommended that only highly skilled security professionals with ample experience must be hired to manage the firewalls and monitor their logs. firewall logs |
31/10/2012 | |
|
In most organizations nowadays, administrators limit users’ access to the Internet in order to reduce the chances of opening surfaces for the intruders, reduce the chances virus infections, preserve Internet bandwidth and prevent users from accessing inappropriate pages. 5 of the most commonly used ways to control Internet access in an organization are listed in this article access control , DHCP |
31/10/2012 | |
|
Network Address Translation (NAT) is a process handled by a device, typically a router, in which unregistered (private) IP addresses in a local area network are mapped with registered (pubic) IP addresses that an organization may have. Since NAT is widely used in almost all SOHO networks and small, medium and large scale industries, addressing scheme must be chosen wisely before implementing any type of NAT configuration. NAT , Implementation |
31/10/2012 | |
|
Learn about the common features that can be found in any UTM firewall. utm , firewall , feature |
25/10/2012 | |
|
Learn what a TCP sessions is and how it works. |
25/10/2012 |