What is WLAN Encryption?

What is WLAN encryption

Encryption in WLAN ensures that the transmitted data is protected against unauthorized access and reading. There are various standards for encryption and authentication, such as WEP, WPA, WPA2 or, in the future, WPA3. The standards such as WEP or WPA are now considered outdated and insecure. They should no longer be used. What is WLAN … Read more

7 Open Source Firewalls Based On Linux

Open Source Firewall linux

Every network needs a well-configured firewall. Open source firewalls have the advantage that they are free and there are verifiably no backdoors. The code is known and is usually maintained regularly. It usually costs a bit more work to install and configure them, but it is sometimes worth taking a look at this technology. Open … Read more

What is a Security Operations Center (SOC)?

What is a Security Operations Center SOC

The so-called Security Operations Center, abbreviated SOC, sees itself as the center for all security-relevant services in the IT environment of organizations or companies. It protects the IT infrastructure and data from internal and external threats. What is a Security Operations Center (SOC)? The Security Operations Center is a security control center that takes care … Read more

What Is Windows Server Update Services (WSUS)?

what is windows server update services wsus

With Windows Server Update Services (WSUS), Windows updates can be provided and distributed locally via your own network and your own Windows servers. The updates are decoupled from regular Windows updates. This offers extensive management and control options for various clients. What is WSUS? The abbreviation WSUS stands for Windows Server Update Services. It is … Read more

What Is Endpoint Security?

What is Endpoint Security

Endpoint Security protects the various endpoints in a network from various threats. Technical and organizational measures prevent unauthorized access to devices or the execution of malicious software. Endpoint protection ensures that the end devices achieve the desired level of security. What is Endpoint Security? The term endpoint security covers technical and organizational measures that protect … Read more

What is IKEv2?

What is IKEv2

IKEv2 is the second version of the Internet Key Exchange protocol IKE. It is used in IPsec-based VPNs for automatic key management and eliminates weaknesses of the predecessor standard. The setup of VPNs is greatly simplified and more flexible. What is IKEv2? The acronym IKEv2 stands for Internet Key Exchange Protocol version 2. The protocol … Read more

What Is A Firewall On A Computer and In Networking?

What Is A Firewall

A firewall is a system that is capable of analyzing data traffic. It protects IT systems from attacks or unauthorized access. The firewall can be a dedicated hardware or software component. Literally translated, firewall means “firewall”. The term refers to an IT system that can analyze, forward, or block data traffic. This enables the firewall … Read more

How Does RADIUS Work?

How does RADIUS work

RADIUS stands for Remote Authentication Dial-In User Service and describes a service that authenticates and authorizes users in a dial-in network. RADIUS can also be used for the accounting of services. In companies, RADIUS is often used for user logon in WLAN networks. How does RADIUS work? RADIUS is a standard that is used in … Read more

What is TLS Protocol (Transport Layer Security)?

What is TLS Protocal (Transport Layer Security)?

Transport Layer Security (TLS) is a layer 5 protocol of the ISO/OSI layer model that ensures encrypted transmission of data on the Internet. TLS is the successor to SSL and is used, for example, by browsers for secure HTTPS connections. What is TLS Protocol? The abbreviation TLS stands for Transport Layer Security and refers to … Read more

What is IPsec Protocol?

What is IPsec Protocol

IPsec (Internet Protocol Security) is a collection of protocol extensions for the Internet Protocol (IP). The extensions enable encryption and authentication of information transmitted using IP and provide secure communication in IP networks such as the Internet. The acronym IPsec stands for Internet Protocol Security. It is a collection of several standards (RFCs) for secure … Read more

What is a DMZ? Understanding Concept of Demilitarized Zone

what is dmz in networking

The Demilitarized Zone (DMZ) is an independent network that acts as a buffer zone between an external network and the internal network. The buffer network contains, for example, web servers or mail servers whose communication is monitored by firewalls. As businesses and organizations become more dependent on technology and online presence, securing networks has become … Read more