=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TechTarget | Network and Systems Management June 16, 2004 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FROM OUR SPONSOR: Free White Paper: Increase Systems Management ROI http://ttarget.adbureau.net/adclick/CID=000056ff0000000000000000 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= IN THIS ISSUE | Table of Contents
1. NETWORK AND SYSTEMS MANAGEMENT TIPS - Featured Tip: Biometric devices - Authorization by authentication - Purchasing Internet networking services: Best practices 2. ESSENTIAL LINKS - Featured Topic: Top 10 expert webcasts - News: Visual Networks links traffic to applications - Guide to network performance management - Chapter of the Week: VPN chapter download ___________________________________________________________________ *********************>> Sponsored by Argent <<********************* Free White Paper: Increase Systems Management ROI Can IT support new initiatives, increase productivity and maintain service levels with IT budgets expected to stay at minimum levels? The days of all-encompassing "framework" solutions are past. According to EMA, to effectively reduce cost and maximize ROI in this environment, organizations must implement low-cost systems management solutions that are fully scalable and provide rapid time-to-value. Learn more in this Free EMA White Paper from Argent http://ttarget.adbureau.net/adclick/CID=000056ff0000000000000000 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP BIOMETRIC DEVICES Barrie Sosinsky A biometric device is one that examines some aspect of a person's physical characteristics and provides authenticated access to resources based on a match. We see these devices in the movie theater in movies like James Bond or Mission Impossible and have for a while now, but this device class is becoming more widely available and at reasonable prices. In the next few years devices like fingerprint scanners will be low cost enough to be standard on laptops and hopefully will serve as a reasonable deterrent to laptop theft. So now might be the time for you to investigate this growing class of devices for use in your more sensitive systems. Read more about biometric devices http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci970297,00.html?track=NL-314&ad=485097 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= AUTHORIZATION BY AUTHENTICATION | Tom Lancaster The vast majority of firewalls in place today do not discriminate by user. Primarily, they filter packets based on protocols and IP addresses; for example, permitting HTTP on port 80 to 192.168.1.100 and denying all other traffic. This is generally acceptable on the public Internet, but more often than not, in intranet or extranet environments, what we really want to do is allow some specific people to get access to an area of the network and have other people denied regardless of what their IP address is and even if they're using the same protocol. http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci969761,00.html?track=NL-314&ad=485097 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= PURCHASING INTERNET NETWORKING SERVICES: BEST PRACTICES | Jay Adelson Setting up Internet networking for your business can be like shopping in the Tamal district in Katmandu. Your success depends on ignoring the hype, understanding the dynamics of the market and knowing what you want. This focus can help you avoid the mistakes of committing to long-term contracts to network service providers (NSPs) at high prices. Once you learn how to set your priorities and understand how the market has shifted, sifting through the details should be easier than you think. http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci968578,00.html?track=NL-314&ad=485097 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= :::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TOP 10 EXPERT WEBCASTS | Featured Topic Have you missed our best webcasts of the year? Luckily they are archived in our webcast library for your enjoyment at any time. Hear industry experts give you practical advice on everything from granular network analysis to ROI to getting certified. http://searchnetworking.techtarget.com/featuredTopic/0,290042,sid7_gci969518,00.html?track=NL-314&ad=485097 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Visual Networks links traffic to applications | News Exclusive A network management vendor's new monitoring suite helps managers determine which applications are causing problems and whether users are ignoring usage policies. http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci970063,00.html?track=NL-314&ad=485097 More information: Learn why network management is critical to systems integration http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci958850,00.html?track=NL-314&ad=485097 Read about one company's experience in prioritizing its network apps http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci880481,00.html?track=NL-314&ad=485097 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= GUIDE TO NETWORK PERFORMANCE MANAGEMENT | Dr. Loki Jorgenson This guide introduces you to the best practices and pitfalls to avoid, and provides troubleshooting help and advice for monitoring and maintaining your network. You'll find articles, tutorials, tips, tools, white papers, expert advice and more to pump up your network monitoring and diagnostic know-how quickly. http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci966695,00.html?track=NL-314&ad=485097 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= BUILDING VPNS: WITH IPSEC AND MPLS - CHAPTER 1 | Chapter Download This chapter addresses three types of VPNs: remote access, site-to-site, and firewall-based (a site-to-site variation). The variation between remote access and site-to-site VPNs will become more ambiguous as new devices such as hardware VPN clients become more prevalent. These appear as a single device accessing the network, albeit there may be a network with several devices behind it. In all cases, the VPN comprises two endpoints that may be represented by routers, firewalls, client workstations, or servers. http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci967526,00.html?track=NL-314&ad=485097 ___________________________________________________________________ **************** CONTACT SEARCHNETWORKING.COM ***************** E-mail us at mailto:[EMAIL PROTECTED] Click here for specific contact information and to meet our editorial team: http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314&ad=485097 To sponsor this or any other TechTarget newsletter e-mail Gabrielle DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED] ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This e-newsletter is published by TechTarget, the most targeted IT media and events company. TechTarget offers magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT professionals. Copyright 2004 TechTarget. All rights reserved. _____________________________________________________________________ To unsubscribe from "Network and Systems Management Tip": Go to unsubscribe: http://SearchTechTarget.com/u?cid=485097&lid=522392&track=NL-314 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed. Contact us: TechTarget Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494