Et Cetera

Sun
30
Sep

Is my Network Secure?

Contributed by Vinay Sawant

and Information Security administrator, Network and Information Security Manager, and Chief Information Security Officer (CISO) will have. This research paper discusses about various Computers and Networking related security threats and vulnerabilities in enterprise network. We also discuss about traditional security threats, latest security threats and makes a list of all the security related threats and discuss suggested mitigation methods. A detailed analysis of network security appliances, software, and management products will be presented so that reader can choose best solution for their network. Some common security implementation mistakes are also analyzed in this paper. Finally, we are discussing about network security audits and importance of up to date security patches.

 
This document is in PDF format. To view it click here.

Sun
30
Sep

Virtual Extensible Local Area Network (VXLAN) Implementation

Contributed by Vinay Sawant

VXLAN was introduced about two to three years ago and since its inception, it is becoming more popular and technology of the choice for most of the organizations. In this research paper we are discussing about: - Why we need VXLAN? What problems VXLAN solves? It is best suitable for which type of organizations? and how to implement VXLAN? This research paper also presents various VXLAN implementation and redundancy model and their analysis so that it useful for you to choose best model that best suits your business. We have also studied about: - Who are the various vendors available in the market today that support VXLAN and who are the manufacture of VXLAN Gateways and develop VXLAN software and what features they offer. We also discuss about security implementation in VXLAN network. Finally, we are concluding this research paper by listing best practices to implement VXLAN in your network.

Sat
08
Sep

Role of Network Security in Information Security Management

Contributed by Brian Martin

Sun
02
Sep

Cisco ISE

Contributed by Bryan Brzezinski
Cisco ISE or Identity Services Engine, “is a next generation identity and access control policy platform” (1) It allows for a single point for implementing access control policy in an entire company or organization by combining security protocols such as 802.1x, AAA, MAB, ETC. Into a single Identity based platform. Cisco ISE allows you to have visibility into your network to view user and device details, simplifies access control, and helps reduce vulnerability against threats while still enabling productivity.
 
This document is in PDF format. To view it click here.

Sun
02
Sep

Remote Management and Monitoring

Contributed by Tom Mercer

Pages

Subscribe to RSS - Et Cetera