July 10, 2006

Spirent melds voice, video, and data into networking test gear

Enhanced TestCenter and Abacus tools prove invaluable for gauging 10-Gig performance

June 2, 2006

Get a head start on NAC

A standard architecture for policy-based access control means you can plan ahead

June 2, 2006

NAC appliances reveal who's rapping at your network door

NAC boxes from Caymas, Lockdown, Nevis, and Vernier separate valid users from troublesome intruders

May 29, 2006

Hack Tales: Keeping track of tools the wireless way

This Wi-Fi hack meant tools need never go missing again

May 29, 2006

Hack Tales: Keeping thin clients synced from coast to coast

Ingenuity and creative Perl did away with laborious system configuration

May 29, 2006

Hack Tales: Air-gap networking for the price of a pair of sneakers

Cheap USB storage and a little ingenuity made all the difference

May 29, 2006

Hack Tales: Network auditing on a shoestring

Complete map of network shares and access rights kept business auditors happy

May 15, 2006

Gigamon offers one view of many monitoring systems

Today's network uses a range of monitoring systems; Gigamon's switch manages traffic into and out of them

May 15, 2006

Splunk combs log files for hidden problems

Plumbing the depths of log files and other metadata, Splunk helps IT find the telltale patterns that reveal what's really going on

May 15, 2006

Determina pre-hacks applications against intruders

By drilling into applications, predicting what an attack would look like, and monitoring behavior, Determina's Memory Firewall provides a new line of defense

©1994-2014 Infoworld, Inc.