Network Security

Home/Tag: Network Security

8-Steps to Secure Your Computer

2020-09-23T04:09:03+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

8-Step to Secure Your Computer Whether you use your computer primarily for work tasks or personal use or both, it’s highly likely you want to keep it and its contents safe and secure. Keeping your computer secure helps you avoid malware and direct hacking attempts designed to steal your personal information. In this post, we’ll [...]

DMZ Networks

2020-09-22T07:04:01+00:00Categories: Network Security, Networking|Tags: , , , , , , , , , , , , |

The subject of this post is DMZ networks. But what exactly are the DMZ networks? DMZ ((DeMilitarized Zone) is essentially a military and political term meaning a civilian area. The most famous example of a demilitarized zone right now is the demilitarized zone on the border between South Korea and North Korea:   In [...]

Watchguard Firewall

2020-09-11T12:44:34+00:00Categories: Anti-malware & Firewalls, Network Security|Tags: , , , , , , , , , |

We have introduced several hardware firewalls on this website so far. In this post also, we intend to do the same. Watchguard is one of the well-known manufacturers of network security products. We have examined several well-known firewalls in the network world. Now it is time to check the firewalls of this manufacturer. Watchguard generally [...]

Software Firewalls

2020-09-10T13:35:37+00:00Categories: Anti-malware & Firewalls, Network Security|Tags: , , , , , , , , , , , , , , , , , , |

You know that firewalls exist in both as software and as hardware devices. Each has its advantages and disadvantages. In general, the use of software firewalls for home use, personal use and small businesses is recommended, as well as the use of hardware firewalls for medium and large businesses. To read: All things about firewall [...]

Cisco ASA Firewalls

2020-09-11T12:51:18+00:00Categories: Anti-malware & Firewalls, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

This post is about Cisco Firewalls. It aggregates available information from datasheets published by Cisco. The ASA in Cisco ASA stands for Adaptive Security Appliance. We suggest that you read the following two posts before continuing to read this post: All Things about Firewall Hardware Firewalls In fact, Cisco ASA is a security device that combines [...]

Network Monitoring Tools: Veaam ONE

2020-09-26T09:04:00+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , |

So far, we have introduced and reviewed several software packages for network monitoring in our posts. In this post, we are going to discuss another powerful software package: Veeam ONE. Veeam ONE, part of Veeam Availability Suite, provides comprehensive monitoring and analytics for your backup, virtual and physical environments. Veeam ONE enables real-time monitoring, business [...]

How to Comply with PCI DSS

2020-09-09T06:59:01+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , , , , , , , |

This post presents How to comply with PCI DSS. This article is a summary from of the pcisecuritystandards.org website. With the following link: PCI DSS Quick Reference Guide For more info please refer to pcisecuritystandards.org We recommend you that before continuing, read this post. Each payment card brand maintains its own separate compliance enforcement programs [...]

VPN

2020-09-02T05:35:40+00:00Categories: Computer & Network Concepts|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |

A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. In other words, A Virtual Private Network is a connection method used to add security and privacy [...]

HIPAA Series – Security Standards: Technical Safeguards

2020-09-09T07:07:08+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , , , , , , |

In this post we are going to talk about technical Safeguards. This post is the fourth post in the HIPAA series. This series of posts is called the HIPAA Series. The series will contain seven post: Security 101 for Covered Entities Security Standards: Administrative Safeguards Security Standards: Physical Safeguards Security Standards: technical Safeguards Security Standards- [...]

Go to Top