=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TechTarget | Network and Systems Management
June 16, 2004
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FROM OUR SPONSOR:
Free White Paper: Increase Systems Management ROI
http://ttarget.adbureau.net/adclick/CID=000056ff0000000000000000
 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
IN THIS ISSUE | Table of Contents

1. NETWORK AND SYSTEMS MANAGEMENT TIPS
   - Featured Tip: Biometric devices
   - Authorization by authentication
   - Purchasing Internet networking services: Best practices

2. ESSENTIAL LINKS
   - Featured Topic: Top 10 expert webcasts
   - News: Visual Networks links traffic to applications
   - Guide to network performance management 
   - Chapter of the Week: VPN chapter download
___________________________________________________________________ 
*********************>> Sponsored by Argent <<*********************

Free White Paper: Increase Systems Management ROI
Can IT support new initiatives, increase productivity and maintain
service levels with IT budgets expected to stay at minimum levels?
The days of all-encompassing "framework" solutions are past.
According to EMA, to effectively reduce cost and maximize ROI in this
environment, organizations must implement low-cost systems management
solutions that are fully scalable and provide rapid time-to-value.
Learn more in this Free EMA White Paper from Argent
http://ttarget.adbureau.net/adclick/CID=000056ff0000000000000000
 
___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP

BIOMETRIC DEVICES
Barrie Sosinsky
 
A biometric device is one that examines some aspect of a person's
physical characteristics and provides authenticated access to
resources based on a match. We see these devices in the movie theater
in movies like James Bond or Mission Impossible and have for a while
now, but this device class is becoming more widely available and at
reasonable prices. In the next few years devices like fingerprint
scanners will be low cost enough to be standard on laptops and
hopefully will serve as a reasonable deterrent to laptop theft. So
now might be the time for you to investigate this growing class of
devices for use in your more sensitive systems.

Read more about biometric devices
http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci970297,00.html?track=NL-314&ad=485097
 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
AUTHORIZATION BY AUTHENTICATION | Tom Lancaster

The vast majority of firewalls in place today do not discriminate by
user. Primarily, they filter packets based on protocols and IP
addresses; for example, permitting HTTP on port 80 to 192.168.1.100
and denying all other traffic. This is generally acceptable on the
public Internet, but more often than not, in intranet or extranet
environments, what we really want to do is allow some specific people
to get access to an area of the network and have other people denied
regardless of what their IP address is and even if they're using the
same protocol.
http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci969761,00.html?track=NL-314&ad=485097
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 
PURCHASING INTERNET NETWORKING SERVICES: BEST PRACTICES | Jay Adelson

Setting up Internet networking for your business can be like shopping
in the Tamal district in Katmandu. Your success depends on ignoring
the hype, understanding the dynamics of the market and knowing what
you want. This focus can help you avoid the mistakes of committing to
long-term contracts to network service providers (NSPs) at high
prices. Once you learn how to set your priorities and understand how
the market has shifted, sifting through the details should be easier
than you think.
http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci968578,00.html?track=NL-314&ad=485097
 

___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
:::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: 
___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TOP 10 EXPERT WEBCASTS | Featured Topic

Have you missed our best webcasts of the year? Luckily they are
archived in our webcast library for your enjoyment at any time. Hear
industry experts give you practical advice on everything from
granular network analysis to ROI to getting certified.
http://searchnetworking.techtarget.com/featuredTopic/0,290042,sid7_gci969518,00.html?track=NL-314&ad=485097
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Visual Networks links traffic to applications | News Exclusive

A network management vendor's new monitoring suite helps managers
determine which applications are causing problems and whether users
are ignoring usage policies.
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci970063,00.html?track=NL-314&ad=485097
 

More information:
Learn why network management is critical to systems integration
http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci958850,00.html?track=NL-314&ad=485097

Read about one company's experience in prioritizing its network apps
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci880481,00.html?track=NL-314&ad=485097

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
GUIDE TO NETWORK PERFORMANCE MANAGEMENT | Dr. Loki Jorgenson 

This guide introduces you to the best practices and pitfalls to
avoid, and provides troubleshooting help and advice for monitoring
and maintaining your network. You'll find articles, tutorials, tips,
tools, white papers, expert advice and more to pump up your network
monitoring and diagnostic know-how quickly.
http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci966695,00.html?track=NL-314&ad=485097

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
BUILDING VPNS: WITH IPSEC AND MPLS - CHAPTER 1 | Chapter Download

This chapter addresses three types of VPNs: remote access,
site-to-site, and firewall-based (a site-to-site variation). The
variation between remote access and site-to-site VPNs will become
more ambiguous as new devices such as hardware VPN clients become
more prevalent. These appear as a single device accessing the
network, albeit there may be a network with several devices behind
it. In all cases, the VPN comprises two endpoints that may be
represented by routers, firewalls, client workstations, or servers.
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci967526,00.html?track=NL-314&ad=485097

___________________________________________________________________
****************  CONTACT SEARCHNETWORKING.COM   *****************

E-mail us at mailto:[EMAIL PROTECTED]

Click here for specific contact information and to meet our editorial
team:
http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314&ad=485097

To sponsor this or any other TechTarget newsletter e-mail Gabrielle
DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED]

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This e-newsletter is published by TechTarget, the most targeted IT
media and events company. TechTarget offers magazines, Web sites,
e-newsletters, Webcasts and conferences for enterprise IT
professionals.
Copyright 2004 TechTarget. All rights reserved.
_____________________________________________________________________

To unsubscribe from "Network and Systems Management Tip":

Go to unsubscribe: http://SearchTechTarget.com/u?cid=485097&lid=522392&track=NL-314
  
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.
 
Contact us:
TechTarget
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to