 |
The
Shortcut Guide to Network Compliance – Chapter 4 - Network Compliance Best
Practices and Methodologies Date - May 26, 2005
Author - Realtimepublishers.com, Inc.
Section - Policy &
Standards
By managing compliance requirements as you would any
other type of business policy, and by implementing tools that can automate
compliance and configuration management, maintaining a compliant network
can be straightforward. Another way to simplify compliance management is
to implement best practices and sound methodologies for managing your
network, which is what this chapter is all about.
| |
 |
The
Shortcut Guide to Network Compliance – Chapter 1 – Understanding IT
Compliance Date -
May 04, 2005 Author -
Realtimepublishers.com, Inc. Section - Policy & Standards
This guide explores the underlying meaning of IT
compliance, apart from all the hype and publicity. It will explain how the
IT industry has been handling compliance for decades, and how new
technologies and techniques can help you better handle compliance moving
forward. To prove that compliance has always been with us, we’ll focus on
an often-overlooked area of IT—the network infrastructure.
| |
 |
Spyware
Clogging Network Arteries Date - Apr 20, 2005
Author - Jeff McDermott Section - Network Security
The goal of this article is to discuss the concerns and
threats that spyware creates for Network Administrators, and to provide
information that is helpful in making the general public aware of the
spyware threat. Also included in the article is a link to independent
studies and comparisons of Anti-spyware software by Eric L. Howes.
| |
 |
Server
and Domain Isolation Using IPSec and Group Policy (Chapter 2:
Understanding Server and Domain Isolation)
Date - Apr 15, 2005
Author -
Microsoft Section - Network Security
In the time since local area networks (LANs) became
prevalent, information technology (IT) professionals have struggled to
provide resilient, highly available services while maintaining adequate
security. Many different technologies have been introduced to work with
TCP/IP to address the issue of implementing security at the network and
transport layers. These technologies include IPv6, 802.1X, network
switches, virtual LAN (VLAN) segmentation, Internet Protocol security
(IPsec), and many more.
| |
 |
Definitive
Guide to Security Management – Chapter 4 – Security Risk
Management Date -
Apr 13, 2005 Author -
Realtimepublishers.com, Inc. Section - Network Security
Information security professionals are rarely at a loss
for data. Point products—such as firewalls, intrusion prevention systems,
antivirus programs, operating systems (OSs) and other elements of the
security infrastructure—generate steady streams of data about events and
conditions. Security professionals are not in need of data—they need
information. Filtering volumes of raw data, correlating events, and
reporting actionable information is the role of a security information
management (SIM) system.
| |
 |
Server
and Domain Isolation Using IPSec and Group Policy (Chapter 1: Introduction
to Server and Domain Isolation) Date - Apr 12, 2005
Author - Microsoft Section - Network Security
The practice of physically isolating computers and
networks to protect data or communications from being compromised has been
used for many years. The problem with physical isolation is that the
information technology (IT) infrastructures of many enterprise
organizations cannot easily be protected behind hard physical boundaries.
The prevalence of mobile clients and the nature of distributed network
environments make such physical limitations too inflexible to implement
and operate.
| |
 |
Server
and Domain Isolation Using IPsec and Group Policy
(Overview) Date -
Apr 05, 2005 Author -
Microsoft Section - Network Security
This article demonstrates how IPsec transport mode can
be leveraged as one of the best means currently available to protect
corporate networks. This protection can minimize losses due to information
theft, compromise of credentials, and administrative costs. This solution
also clearly contrasts IPsec transport mode from the more widely known
IPsec tunnel mode, one of the prevalent VPN technologies today.
| |