TITLE

Enemy At The Gates: The Evolution Of Network Security

AUTHOR(S)
Wilson, Jeff
PUB. DATE
December 2004
SOURCE
Business Communications Review;Dec2004, Vol. 34 Issue 12, p14
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
This article discusses various issues related to the evolution of computer and information network security. By the mid 1990s, complex toolkits had been supplanted by firewall software packages and intrusion detection systems (IDSs). As performance and usability requirements increased, software capabilities moved to hardware, and by 2000, the number of companies buying and deploying perimeter security skyrocketed. However, in the field of network security, three big twists continue to drive the need for new technologies and products. Businesses rely on networks to generate revenue, increase productivity and reduce cost. Employees rely on network to access to networks to get their jobs done. Customers, partners and suppliers rely on networks to keep business moving and keep an edge over the competition. As this dependency increases, so does the need to extend network access to more users, customers, partners and suppliers. In the recent study, User Plans for Security Products and Services, North America 2004, where 240 organizations were surveyed about their plans for purchasing and deploying network security, it has been found that security professionals typically deploy a mix of standalone and network integrated products.
ACCESSION #
15341970

 

Related Articles

  • Still secure?  // Communications News;Mar2005, Vol. 42 Issue 3, p9 

    This section presents the findings of a study conducted by StillSecure regarding network security in the U.S. as of March 2005. Enterprises are expected to increase adoption of newer security technologies now that most have implemented antivirus, firewall and virtual private network solutions....

  • THE RIGHT WAYS TO PROTECT YOUR NET. Grimes, Brad // PCWorld;Sep2001, Vol. 19 Issue 9, p138 

    Offers tips on how to maintain a secure computer network. Use of firewalls to protect a computer network from hackers; Description of public-key infrastructure technology to encrypt and secure all data on a network; Insecurity of computer operating systems; Information on biometric technology.

  • F-Secure takes aim at rootkits. Messmer, Ellen // Network World;12/4/2006, Vol. 23 Issue 47, p20 

    The article reports on the announcement of F-Secure Corp.'s upgraded version of its Client Security antivirus and desktop firewall software for rootkit detection and host-based intrusion prevention in the U.S. DeepGuard is expected to ship in mid-January with Windows XP, Client Security 7.0 to...

  • DEEPNINES OFFERS NETWORK PROTECTION IN SINGLE APPLIANCE.  // Computer Security Update;Dec2005, p4 

    This article reports that DeepNines Technologies, Dallas, Texas-based network security systems provider, had its Infection Free Networking (IFN) architecture and strategy validated in December 2005 by the release of Cisco's ICS software. DeepNines was the first unified threat management device...

  • UTM firewalls: READY FOR THE ENTERPRISE. Snyder, Joel // Network World;9/3/2007, Vol. 24 Issue 34, p35 

    The article offers a look on network firewalls called Unified Threat Management (UTM). According to the author, enterprise UTM with integrated intrusion detection/prevention system (IDS/IPS) can give network managers an additional security throughout the network without the massive increase of...

  • Secure your mobile road warriors. Simpson, Phillip; Russo, Jon // Communications News;Aug2004, Vol. 41 Issue 8, p32 

    This article deals with mobile computing, focusing on the use of virtual private network (VPN) by companies to secure their mobile workers. Solutions such as hardware tokens, tighter software firewalls and real-time end-point security enforcement are being used to ensure that remote PCs meet or...

  • Create virtual firewalls.  // Communications News;Nov2005, Vol. 42 Issue 11, p42 

    Evaluates the VPN-1 Virtual System Extension NGX from Check Point. Features; Functions; Performance.

  • MCAFEE DESKTOP FIREWALL 8.5 DEFENDS ENTERPRISE.  // Computer Security Update;Jun2005, p2 

    The article reports that McAfee Inc. has introduced McAfee Desktop Firewall 8.5, an enhanced version of its distributed software firewall for small to large enterprises. McAfee Desktop Firewall 8.5 includes multi-layered protection through inbound and outbound traffic monitoring, policy...

  • REMNANT INTRODUCES ACTIVE SCANNING FIREWALL LOG PROFILER.  // Computer Security Update;Jul2005, p3 

    The article reports that Remnant Labs Inc. has introduced its next-generation Firewall Log Profiler product. This product release includes significant new features for automatically scanning firewall logfiles for security violations and irregularities. Firewall Log Profiler becomes the first...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics