Securing The Virtual Enterprise Network

Passmore, David
July 2006
Business Communications Review;Jul2006, Vol. 36 Issue 7, p18
Trade Publication
The article provides information regarding virtual enterprise networks. Beyond the firewalls and router access control lists, networks should be responsible for malware control on endpoints. With the latest generation of network security, enterprises must consider how these functions may affect the changing information technology and network environment. Some of the major trends that will influence security systems include virtual enterprises, de-perimeterization, wireless and mobility and heterogeneous devices.


Related Articles

  • Security Compartments. Ranum, Marcus // Information Security;Dec2004, Vol. 7 Issue 12, p20 

    Focuses on the implementation of compartmentalization, a process of redesigning a group of cooperating subnetworks with firewalls and routers. Reason for the reluctance of information technology managers and network designers to compartmentalize; Advantages and disadvantages of...

  • Real-World Cyberthreats. Habersetzer, Vernon // Financial Executive;Jul/Aug2013, Vol. 29 Issue 6, p65 

    The article discusses cybersecurity of corporate computer network systems and the protection of information such as intellectual property, research and development (R&D) data, and details concerning possible merger & acquisition (M&A) arrangements. The article examines cyber attacks via email...

  • Simple solution. Savage, Marcia // SC Magazine: For IT Security Professionals (UK Edition);Feb2005, p53 

    The article focuses on the move of the New Jersey's Office of Information Technology (OIT) to find a way to manage an overwhelming flow of data of security data. The OIT manages a Wide Area Network that links more than 40 agencies and 15 departments, including law enforcement and public...

  • Hypervisor security a growing concern. Dubie, Denise // Network World;11/26/2007, Vol. 24 Issue 46, p1 

    The article reports on the security treat facing virtual computer systems with the attack in hypervisor technology by computer hackers in the U.S. The author explores on the various challenges experienced by information technology (IT) managers concerning the risk offered by hypervisor attacks...

  • TCAMChecker: A Software Approach to the Error Detection and Correction of TCAM-Based Networking Systems. Shafiq, M.; Meiners, Chad; Qin, Zheng; Shen, Ke; Liu, Alex // Journal of Network & Systems Management;Sep2013, Vol. 21 Issue 3, p335 

    Ternary content addressable memories (TCAMs) are widely used in network devices carrying out the core operation of single-operation lookups. TCAMs are the core component of many networking devices such as routers, switches, firewalls and intrusion detection/prevention systems. Unfortunately,...

  • The Future Of The Firewall. Wilson, Jeff // Business Communications Review;May2005, Vol. 35 Issue 5, p28 

    The article reports on the future of Firewall computer security system. The term firewall has other uses besides referring to Internet security. In the late 1980s, routers used packet filtering to separate network segments so problems in one segment didn't affect other segments. Every...

  • The latest on Linux. Bort, Julie // Network World;11/13/2006, Vol. 23 Issue 44, p68 

    The article focuses on the latest product offerings from Linux Inc. in the U.S. where several vendors have been proud to announce including CD players, firewalls, intrusion-detectors, IP phones and routing software platforms and many others. Yet, with these various products being offered, four...

  • Making your business network secure. Handby, Simon // Computer Shopper;Nov2013, Issue 309, p158 

    In this article the author opines on making one's business network secure. Topics discussed include ensuring that a business with an internet connection is protected by a suitable firewall, while using a second-hand modem/router, checking that no ports such as those needed by certain services,...

  • Affordable Firewalls. McKean, Kevin // InfoWorld;8/11/2003, Vol. 25 Issue 31, p8 

    Introduces several articles on firewall appliance and other IT equipment.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics