Skip to content
excITingIP.com

Tech Blog & Business Insights

 Menu
  • Home
  • Advertise
  • My Books
  • Video Creation
  • Site Map
  • Home
  • Advertise
  • My Books
  • Video Creation
  • Site Map

Category: Network Security

You can use OTP – One Time Password for stronger authentication

  • Rajesh K
  • March 2, 2011March 2, 2011

If your finance department personnel do quite a number of bank transfers/ financial transactions over the Internet (web portal) everyday, there is a chance that their user-names/passwords can be stolen...

An illustration of DMZ : De-Militarized Zone in Computer Networking through Infographics

  • Rajesh K
  • December 31, 2010

Well, this is not exactly Infographics! It is just an attempt to explain the basic concepts of DMZ – Demilitarized Zone (Computer Networking) through an image. These days, the web-servers...

Subdivide your Physical Firewall into multiple Virtual Firewall instances

  • Rajesh K
  • December 23, 2010December 23, 2010

In bigger organizations and service providers, multiple Firewalls are routinely utilized for each department or class of subscribers as some of them require individual Firewall policies. And more importantly, they...

An Introduction to SIEM – Security Information & Event Management

  • Rajesh K
  • November 30, 2010November 30, 2010

Logs are generated by a lot of devices in an organization. In one branch alone, there are so many devices (Like Router, Firewall, IDS, etc) that can generate a lot...

An Overview of Enterprise VPN – Virtual Private Network

  • Rajesh K
  • October 18, 2010October 19, 2010

A VPN (Virtual Private Network) is a concept which helps enterprise companies with distributed offices to connect to each other securely over the Internet – In this article, we would...

Snort – Open Source Intrusion Detection System

  • Rajesh K
  • October 15, 2009October 15, 2009

This article gives an overview about Snort which is an software based freely download-able open source Network Intrusion Detection system along with its components, installation ways and methods, modes of...

An overview of IPS – Intrusion Prevention System and types of Network Threats

  • Rajesh K
  • October 8, 2009October 15, 2009

This article gives a general introduction to IPS – Intrusion Prevention System for Network Security and also gives a list of network threats that can be identified and mitigated by...

Hardware Vs Sofware UTM and Open Source UTM

  • Rajesh K
  • September 10, 2009February 7, 2011

This article is about the two types of Unified Threat Management solutions (UTM) – hardware and software. We will discuss the plus and minus points of both of them. We...

An Introduction to Unified Threat Management in Network Security

  • Rajesh K
  • September 8, 2009February 7, 2011

In this article, we have a look at a broad range of network security threats that concerns an enterprise user, what is Unified Threat Management (UTM) and why it is...

An overview of socially engineered deceptive internet threats

  • Rajesh K
  • August 22, 2009February 7, 2011

Threats arising due to internet usage are quite wide. We will look at a few of them, especially the ones where cyber criminals use deception as the main tool to...

Host Integrity Check for Endpoint and Network Security

  • Rajesh K
  • July 29, 2009January 25, 2011

This article gives an introduction to Host Integrity Check mechanism that enables enterprises to enforceĀ  the connectivity of their endpoints (Laptops/Desktops) only if they comply to the security policies of...

Types of DoS attacks and how they are mitigated

  • Rajesh K
  • July 21, 2009January 25, 2011

This article looks at the main types of Denial Of Service attacks like Previously known DoS attacks (Juno etc.), Unknown DoS flooding attacks, SYN floods, connection limit attacks etc. in...

Why is URL Filtering required and how it is accomplished

  • Rajesh K
  • July 13, 2009January 25, 2011

This article provides an introduction to what is URL Filtering, why it is needed and how it is done at enterprise level. We also have a look at the various...

Options available for securing Enterprise Email

  • Rajesh K
  • July 6, 2009January 25, 2011

This article provides an overview of the various options available for securing enterprise email communications like anti-spam, anti-virus, zero-hour anti-virus, content policies, outbound email attachment scanning for DLP, email encryption,...

Rajesh K's Intellifluence Influencer Badge

(c) 2009 to Now by excITingIP.com Masonry Blog, WordPress theme by Perfectwpthemes