Understanding Networking is Future-crucial

Engebretson, Dave
May 2006
Security: Solutions for Enterprise Security Leaders;May2006, Vol. 43 Issue 5, p65
Trade Publication
The article focuses on the significance of understanding IT-networking enabled technologies for security systems integrators. They are continuously being faced with new ways of installing security systems and end-users are experiencing new ways those systems can be used. The IT industry is far ahead of the security industry in terms of technology. Hence, students need to be taught about IP addresses and how to handle firewalls and switches. Two areas that seem to present the greatest potential are video and intercommunication systems. INSET: Not a Member?.


Related Articles

  • The Road Less Traveled: How to Become an IT Security Professional. Rogers, Bobby // Certification Magazine;Oct2006, Vol. 8 Issue 10, p30 

    This article offers advice on how to become a successful information technology (IT) professional. Once IT professionals decide to become a network security engineer, they have made a choice that will drive everything they learn and do from that moment forward. Some of the new hobbies a network...

  • SMBs enjoy 'Worry-Free Security'.  // Telecom Asia;Feb2006, Vol. 17 Issue 2, p31 

    The article features the latest version of Trend Micro's antivirus and antivirus/anti-spam solutions with additional personal firewall protection. The new "Worry-Free Security" aims to facilitate small and medium-sized businesses having little or no IT support to secure their networks. While...

  • Novell appliance takes security to the edge. Mohamed, Arif // Computer Weekly;2/22/2005, p18 

    The article reports that Novell Inc. has developed a Linux-based "perimeter security" hardware appliance that protects companies against security threats such as hackers, viruses, worms, spam and network intrusions. Novell launched the Novell Security Manager at the RSA conference. It is aimed...

  • FIND YOUR PERFECT PARTNER. Millman, René // SC Magazine: For IT Security Professionals (UK Edition);Nov2005, p40 

    This article looks at how to get the best from computer security outsourcing. Industry sectors that outsource other functions tend to be more open to farming out their security. Loren Rudd, information communications technology research analyst at Frost & Sullivan, notes that manufacturing...

  • Practical firewall policy inspection using anomaly detection and its visualization. Kim, Ui-Hyong; Kang, Jung-Min; Lee, Jae-Sung; Kim, Hyong-Shik; Jung, Soon-Young // Multimedia Tools & Applications;Jul2014, Vol. 71 Issue 2, p627 

    Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to...

  • Barracuda Networks Predicts.  // Software World;Jan2009, Vol. 40 Issue 1, p23 

    The article reports on the prediction of Barracuda Networks Inc., the worldwide leader in email and Web security appliances, that spam volumes will rise a little higher than 95 percent in the year ahead as growing use of botnets continues to grow. According to an analysis of data from one...

  • Taking synergy to a higher level. Gengler, Barbara // SC Magazine: For IT Security Professionals (UK Edition);Apr2004, p36 

    This article focuses on the correlation between physical and information technology security systems. The lack of technical integration between physical and information technology security systems has allegedly resulted in gaps for virtually all companies, often leaving them vulnerable to...

  • Personal firewalls protect vulnerable PCs. Felman, Frederick // Network World;6/21/2004, Vol. 21 Issue 25, p75 

    This article examines how personal firewalls protect vulnerable personal computers (PC). A personal firewall protects PC by blocking inbound and outbound threats. The firewall can operate in stealth mode to make a computer invisible, preventing attackers from realizing that a PC exists at the...

  • UTMs are not for everybody.  // Network World;9/29/2008, Vol. 25 Issue 38, p1 

    The article focuses on the advantages and disadvantages of unified threat management (UTM). It contends that UTM appliances enable multiple security functions on a single hardware. Its advantages include multifunctionality in streamlining network architecture and convenience because of its...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics