member sign-in
Forgot password? Create new account Close

Network and Telecommunication Security


Network and Telecommunication Security represents the security of data communications over private and public  networks.

Network Access Control

One important variable in effectively protecting the data in the network is represented by the users. A method to minimize the risk associated to the users is the Network Access Control – NAC. The NAC is an access control framework capable of controlling the way ...

Enterprise Network Firewall

The Network Enterprise Firewalls are defined as standalone purpose-built firewall appliances with IPSec VPN capabilities, capable of delivering extensive firewall and management capabilities for securing the perimeter access. Enterprise firewalls incorporate also IPS technologies, ...

Network IPS

The Intrusion Prevention System (IPS) is a network device which automates the process of intrusion detection (network monitoring and analysis for security incidents), with the purposes of automatically discovering malicious or unwanted behaviour and being able to react respectively. User ...

UTM (Multifunction Firewall)

  Definition UTM multifunctional Firewall is a complete office network-in-a-box Internet security appliance for small and medium-size businesses (SMBs). This appliance combines security features into one appliance: network firewall, network intrusion prevention,VPN, ...


  • Would You Re-Hire Your IPS Today?

    It's time to demand more from your IPS. The motives and tactics of attackers continuously evolve. Yet the IPS lives on, largely unchanged since it became a mainstay in the security stack in the early 2000s. Join us for this webinar to learn how attackers bypass IPSs and discover how next generation intrusion prevention is re-defining the second layer of defense. You'll learn:   Common tactics attackers use to bypass traditional IPSs 5 ways next-gen intrusion prevention differs from your existing IPS How next-gen intrusion ...

    read all
  • Securing Hybrid Networks for Dummies

    Resilient, fast and secure connections are possible with hybrid networks, even when you manage large and distributed environments. IT security teams need to know what their different options are as their networks grow more complex and how to ensure that the network remains secure and available as the organization expands. Hybrid networks will play a key role in a network’s ability to adjust to these new demands and the complexity that they represent. Learn how to secure hybrid networks with next generation firewalls. Read ...

    read all
  • Gartner Report: Defining Intrusion Detection and Prevention Systems

    Courtesy of Fidelis Cybersecurity, download this complimentary report from Gartner. In it, Gartner illustrates the current state of IPS/IDS, and use cases that are suitable and unsuitable for this technology to address. Key Takeaways: Intrusion prevention remains a sound, network-centric approach for the detection and prevention of vulnerability exploitation and to help with response actions A best-of-breed intrusion detection system/intrusion prevention system can address a wider range of network threats than legacy IPSs with multiple techniques ...

    read all
  • Protect Health Care Systems Against Ransomware

    Ransomware is malware that generally employs asymmetric encryption to hold a victim’s information hostage. Asymmetric (public-private) encryption is cryptography that uses a pair of keys to encrypt and decrypt a file. The public-private pair of keys is uniquely generated by the attacker for the victim, with the private key to decrypt the files stored on the attacker’s server. The attacker makes the private key available to the victim only after the ransom is paid, though that is not always the case—as seen in recent ransomware campaigns. Without ...

    read all
  • DDoS Response Playbook

    DDoS attacks have become a fact of life for businesses of all sizes. Organizations that conduct advance DDoS response planning and implement the right mitigation strategy are far more likely to limit potential damage. This comprehensive handbook outlines best practices for planning and executing a DDoS response plan. Register now ...

    read all