Network Box

Displaying 1-32 of 32 results

  • White Papers // May 2011

    Securing Your Network When Employees Telecommute

    As the authors prepare to write this, they are thinking of the many times they get up in the morning and start working at their home computer. It is possibly the most convenient invention since the washing machine, enabling one to connect to their workplace from basically anywhere and to...

    Provided By Network Box

  • White Papers // May 2011

    Adding SPF to Your Anti-Spam Solution

    The Sender Policy Framework (SPF) is an open standard that introduces a grammar for domains to describe the email they send. These descriptions are published in the Domain Name System (DNS), and Simple Mail Transfer Protocol (SMTP) receivers may use these descriptions to authenticate email and to better apply local...

    Provided By Network Box

  • White Papers // Jan 2011

    Forgotten Security Part II: Routing, the Hole in the Wall

    Many companies have routing where the path that data takes to arrive at a workstation differs from the path that the data takes back to the originator. If one of these paths goes through a connection tracking firewall while the other path does not, the packets will be blocked. This...

    Provided By Network Box

  • Case Studies // Jan 2010

    Network Box Scores With Tottenham Hotspur

    Tottenham Hotspur FC is one of the UK's top premiership football clubs and is also a modern sports business, dealing with large amounts of electronic correspondence and internet traffic from fans, business partners and sponsors. The need for a secure network that can defend against malware and spam was a...

    Provided By Network Box

  • Case Studies // Jan 2010

    The Acorn Group Chooses Network Box

    The Acorn Group is one of the largest independent estate agency networks in the South East of England and is ranked in the top 20 estate agents across the UK. The company's consistent growth combined with its publicly available email addresses meant that securing its IT network from the latest...

    Provided By Network Box

  • Case Studies // Jan 2010

    Network Box Eases the Strain for Combat Stress

    Combat Stress is a mental health and welfare service charity that provides treatment and support to over 7,000 ex-Services men and women of all ranks, suffering from psychological disability as a result of their service. It needed an all-in-one, Unified Threat Management (UTM) device that was managed by experts. Since...

    Provided By Network Box

  • Case Studies // Jan 2010

    Sunderland AFC Uses Network Box

    Sunderland AFC is a UK premiership football club. The club has over 120 full-time employees at three different sites in the UK. Network security is a top level priority for the club, and a need to defend against the vast amounts of spam and malware it was seeing was an...

    Provided By Network Box

  • Case Studies // Jan 2010

    Network Box Case Study: Selectaglaze

    The main issue was that while most provided a reasonable user interface, there was a steep learning curve to get to grips with all of the different security and policy based aspects. It quickly realised that a managed service might be a more cost-effective and secure approach requiring less day-to-day...

    Provided By Network Box

  • White Papers // Nov 2009

    Network Box White Paper: Forgotten Security Part 4 - Keeping Up-to-Date

    Many vendors now have a rigorous attitude towards patching and updating their systems. These days, Microsoft is frequently used to demonstrate best practice and other manufacturers are following suit to provide regular updates to their systems. However, there are many places where this admirable policy is not being followed, or...

    Provided By Network Box

  • White Papers // Nov 2009

    Network Box White Paper: Securing Remote Workers

    In the case of home workers, the employee must use a VPN. The three most commonly used today are PPTP, IPSEC and SSL. IPSEC and SSL are the most secure, because they can use the highest security encryption - AES 256. SSL VPNs are becoming popular as they are more...

    Provided By Network Box

  • Case Studies // Oct 2009

    Wyboston Lakes Secures Customers With Network Box

    Wyboston Lakes Conference and Training Centre situated in 350 acres on Picturesque countryside on the Cambridgeshire / Bedfordshire border, is the largest independently-owned, singlesite residential conference and training centre in Northern Europe. Internet and email access are critical to Wyboston Lakes' business. Conference and training delegates, serviced office clients, hotel...

    Provided By Network Box

  • Case Studies // Oct 2009

    Network Box Helps Biwater Group Keep Its Network Flowing

    The Biwater Group designs and constructs water and wastewater systems across the world (the name 'Biwater' - or 'Two waters' - was adopted because of its involvement in the provision of clean water and the treatment of wastewater). Employees need to access the Internet in the course of their work,...

    Provided By Network Box

  • White Papers // Sep 2009

    Network Box White Paper: Securing Schools From Social Media Threats

    Schools today face increasing internet security risks from the number of new platforms and technologies used by pupils and teachers in and out of the classroom. The proliferation of social networks such as Facebook, Bebo and MySpace, instant messenger (IM) platforms, and file-sharing and peer-to-peer applications and software mean that...

    Provided By Network Box

  • White Papers // Sep 2009

    Part II: Routing, the Hole in the Wall

    Routing can be tricky. If one knows where data is going, one is half way to resolving a large number of application problems. But understanding where data is being routed to and from is crucial in the security arena. Incorrect routing can result in security measures being bypassed or reduced...

    Provided By Network Box

  • White Papers // Sep 2009

    Online Privacy and Browser Security

    In the past year there have been a number of debates on the need for online privacy. Some commentators (Sir David Omand and Scott McNealy) have argued that privacy online must be sacrificed for progress and security whilst others insist on privacy being paramount in a free society (Sir Tim...

    Provided By Network Box

  • White Papers // Sep 2009

    Network Box Advisory: Forgotten Security

    Some businesses rely on IT departments to spot the weak points in the system and rectify them as soon as possible. Whilst the need for a rapid resolution is understandable, this method exposes the company to vulnerability - human error. A procedure should be in place, so that if and...

    Provided By Network Box

  • White Papers // Sep 2009

    Authentication - Who Are You?

    Identity fraud is rising. It is increasingly simple, with more ways of doing it than ever before. As more and more applications become available to over the Internet, there is a growing need to prove identity, in order to prevent criminals from taking advantage of all. To achieve this protection...

    Provided By Network Box

  • White Papers // Sep 2009

    How That PDA Could Bring the Whole System Crashing Down

    As users blur work and personal Internet use, particularly on their own devices, one could find organization exposed to malware simply because of their ignorance. The battle for corporate network security is being fought at new endpoints. Businesses need to think laterally when it comes to protecting their networks from...

    Provided By Network Box

  • White Papers // Sep 2009

    Network Box Advisory: Forgotten Security - Part 1: Monitoring

    Companies are protecting themselves from high-profile threats such as malware attacks, but are often leaving themselves vulnerable from the 'forgotten security defences'. The first of these results from simply not monitoring the applications, hardware and security systems across the business, which can lead to network failure. Most businesses are using...

    Provided By Network Box

  • White Papers // Jul 2009

    Network Box White Paper: Hacks, Hoaxes and Horrors

    Most of the hoaxes people encounter these days come to them via the Internet. The number of opportunistic and targeted Internet-based crimes and misdemeanors carried out every day results in stolen data and damaged systems, and costs companies many hundreds of thousands of pounds. Other threats are more personal, attacking...

    Provided By Network Box

  • White Papers // Jun 2009

    Network Box White Paper: Securing Social Media - Series Part 5: Guide to Secure Use of IM (instant Messaging)

    One is often asked by clients how to block a particular application, most notably one that includes Instant Messaging (IM), such as Facebook, Skype, MSN etc. But the problem with blocking an application is that it will often find a way through a firewall - either using 'Tunnelling' software, or...

    Provided By Network Box

  • White Papers // Jun 2009

    Network Box Intrusion Detection & Prevention System

    Wikipedia defines Intrusion Detection as "The act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource", and then goes on to say that "When Intrusion Detection takes a preventive measure without direct human intervention, then it becomes an Intrusion Prevention System". Network Box includes...

    Provided By Network Box

  • White Papers // May 2009

    Network Box White Paper: Securing Social Media Series - Part 4: Guide to Secure Use of Facebook

    Huge numbers of companies are banning employees from using Facebook and other social networking sites, concerned about the amount of time wasted on these sites and the drop in productivity as a result. But is this the right way forward? Given the benefits of networking to companies there is a...

    Provided By Network Box

  • White Papers // May 2009

    Network Box White Paper: Securing Social Media Series - Part 1: Blogging

    Blogs are now a mainstream form of communication for most companies, and are a trusted source of information: Technorati reports that 37 per cent of bloggers have been quoted in traditional media, based on something they've included in a blog post. And yet, as the numbers grow, so do the...

    Provided By Network Box

  • White Papers // Apr 2009

    Technologies for Spam Detection

    None of the techniques above can provide total protection in isolation; most have a way round them. The only real solution to the spam problem is to combine techniques, to create a probability score to assess whether an email is spam. Currently, detection rates of 95-98 per cent can be...

    Provided By Network Box

  • Case Studies // Apr 2009

    Securing Vital Infrastructure Network: Network Box and ES Pipelines

    ES Pipelines is an independent gas transporter, taking gas to businesses and homes across the UK. The majority of communication between customers and suppliers is done via email, much of it containing confidential information, and so knowing its network is secure is of prime importance. Network Box has provided ES...

    Provided By Network Box

  • White Papers // Apr 2009

    Network Box White Paper: Securing Social Media Series - Part 3: Guide to Secure Use of Twitter

    It seems one can't open a newspaper or look at a news site without seeing Twitter all over the headlines. From Barack Obama's use of Twitter during his election campaign, or reports that the primary school curriculum will include teaching children about Twitter, to growing concerns about identity theft on...

    Provided By Network Box

  • Case Studies // Jan 2009

    Network Box Case Study: Jeyes

    Jeyes manufactures, markets, sells and distributes household cleaning and hygiene products throughout the world in more than 60 countries. The biggest threat Jeyes faced was from malicious spam and email-borne viruses. Thirty percent of the 100,000 inbound emails each month was spam, the primary Internet threat to Jeyes; and around...

    Provided By Network Box

  • Case Studies // Jan 2009

    Network Box Case Study: PDD

    PDD is a product innovation consultancy, working with some the world's leading brands, such as Sony Ericsson, Orange and Levis, in the invention, conception and development of products that are used in daily life. It employees 65 staff at its UK headquarters in London. It needed a system that didn't...

    Provided By Network Box

  • Case Studies // Jan 2009

    Network Box Case Study: Pluswork Group

    The Pluswork Group is a temporary and permanent recruitment specialist with offices in the North West of England. It has recruitment specialists at various office locations, as well as on the road visiting candidates and clients; and this posed a wide variety of IT security issues. The company wanted to...

    Provided By Network Box

  • Case Studies // Jan 2009

    Network Box Case Study: Charnwood Borough Council

    Like many organisations, CBC was using a number of different security technologies to protect itself against the burgeoning myriad of online threats. For example, it outsourced its firewall, VPN, email filtering and web filtering security to separate companies. However, CBC discovered that not only is this method cost-ineffective, it also...

    Provided By Network Box

  • Case Studies // Oct 2008

    Network Box Case Study: Hillary Blinds

    Hillarys Blinds is the largest manufacturer of made-to-measure window blinds in the UK and has a turnover in excess of ?90 million. The challenge was using three separate security solutions but soon found that managing multiple technologies can become a burden. Also, it needed a solution that would enable the...

    Provided By Network Box

  • Case Studies // Jan 2010

    Network Box Scores With Tottenham Hotspur

    Tottenham Hotspur FC is one of the UK's top premiership football clubs and is also a modern sports business, dealing with large amounts of electronic correspondence and internet traffic from fans, business partners and sponsors. The need for a secure network that can defend against malware and spam was a...

    Provided By Network Box

  • Case Studies // Jan 2010

    The Acorn Group Chooses Network Box

    The Acorn Group is one of the largest independent estate agency networks in the South East of England and is ranked in the top 20 estate agents across the UK. The company's consistent growth combined with its publicly available email addresses meant that securing its IT network from the latest...

    Provided By Network Box

  • Case Studies // Jan 2010

    Network Box Eases the Strain for Combat Stress

    Combat Stress is a mental health and welfare service charity that provides treatment and support to over 7,000 ex-Services men and women of all ranks, suffering from psychological disability as a result of their service. It needed an all-in-one, Unified Threat Management (UTM) device that was managed by experts. Since...

    Provided By Network Box

  • Case Studies // Jan 2010

    Sunderland AFC Uses Network Box

    Sunderland AFC is a UK premiership football club. The club has over 120 full-time employees at three different sites in the UK. Network security is a top level priority for the club, and a need to defend against the vast amounts of spam and malware it was seeing was an...

    Provided By Network Box

  • Case Studies // Jan 2009

    Network Box Case Study: Jeyes

    Jeyes manufactures, markets, sells and distributes household cleaning and hygiene products throughout the world in more than 60 countries. The biggest threat Jeyes faced was from malicious spam and email-borne viruses. Thirty percent of the 100,000 inbound emails each month was spam, the primary Internet threat to Jeyes; and around...

    Provided By Network Box

  • Case Studies // Jan 2009

    Network Box Case Study: PDD

    PDD is a product innovation consultancy, working with some the world's leading brands, such as Sony Ericsson, Orange and Levis, in the invention, conception and development of products that are used in daily life. It employees 65 staff at its UK headquarters in London. It needed a system that didn't...

    Provided By Network Box

  • Case Studies // Jan 2009

    Network Box Case Study: Pluswork Group

    The Pluswork Group is a temporary and permanent recruitment specialist with offices in the North West of England. It has recruitment specialists at various office locations, as well as on the road visiting candidates and clients; and this posed a wide variety of IT security issues. The company wanted to...

    Provided By Network Box

  • Case Studies // Jan 2010

    Network Box Case Study: Selectaglaze

    The main issue was that while most provided a reasonable user interface, there was a steep learning curve to get to grips with all of the different security and policy based aspects. It quickly realised that a managed service might be a more cost-effective and secure approach requiring less day-to-day...

    Provided By Network Box

  • Case Studies // Oct 2008

    Network Box Case Study: Hillary Blinds

    Hillarys Blinds is the largest manufacturer of made-to-measure window blinds in the UK and has a turnover in excess of ?90 million. The challenge was using three separate security solutions but soon found that managing multiple technologies can become a burden. Also, it needed a solution that would enable the...

    Provided By Network Box

  • Case Studies // Oct 2009

    Wyboston Lakes Secures Customers With Network Box

    Wyboston Lakes Conference and Training Centre situated in 350 acres on Picturesque countryside on the Cambridgeshire / Bedfordshire border, is the largest independently-owned, singlesite residential conference and training centre in Northern Europe. Internet and email access are critical to Wyboston Lakes' business. Conference and training delegates, serviced office clients, hotel...

    Provided By Network Box

  • Case Studies // Apr 2009

    Securing Vital Infrastructure Network: Network Box and ES Pipelines

    ES Pipelines is an independent gas transporter, taking gas to businesses and homes across the UK. The majority of communication between customers and suppliers is done via email, much of it containing confidential information, and so knowing its network is secure is of prime importance. Network Box has provided ES...

    Provided By Network Box

  • White Papers // Jan 2011

    Forgotten Security Part II: Routing, the Hole in the Wall

    Many companies have routing where the path that data takes to arrive at a workstation differs from the path that the data takes back to the originator. If one of these paths goes through a connection tracking firewall while the other path does not, the packets will be blocked. This...

    Provided By Network Box

  • White Papers // May 2011

    Securing Your Network When Employees Telecommute

    As the authors prepare to write this, they are thinking of the many times they get up in the morning and start working at their home computer. It is possibly the most convenient invention since the washing machine, enabling one to connect to their workplace from basically anywhere and to...

    Provided By Network Box

  • White Papers // May 2011

    Adding SPF to Your Anti-Spam Solution

    The Sender Policy Framework (SPF) is an open standard that introduces a grammar for domains to describe the email they send. These descriptions are published in the Domain Name System (DNS), and Simple Mail Transfer Protocol (SMTP) receivers may use these descriptions to authenticate email and to better apply local...

    Provided By Network Box

  • White Papers // Jun 2009

    Network Box Intrusion Detection & Prevention System

    Wikipedia defines Intrusion Detection as "The act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource", and then goes on to say that "When Intrusion Detection takes a preventive measure without direct human intervention, then it becomes an Intrusion Prevention System". Network Box includes...

    Provided By Network Box

  • White Papers // Nov 2009

    Network Box White Paper: Forgotten Security Part 4 - Keeping Up-to-Date

    Many vendors now have a rigorous attitude towards patching and updating their systems. These days, Microsoft is frequently used to demonstrate best practice and other manufacturers are following suit to provide regular updates to their systems. However, there are many places where this admirable policy is not being followed, or...

    Provided By Network Box

  • White Papers // Sep 2009

    Network Box Advisory: Forgotten Security

    Some businesses rely on IT departments to spot the weak points in the system and rectify them as soon as possible. Whilst the need for a rapid resolution is understandable, this method exposes the company to vulnerability - human error. A procedure should be in place, so that if and...

    Provided By Network Box

  • White Papers // Sep 2009

    Network Box White Paper: Securing Schools From Social Media Threats

    Schools today face increasing internet security risks from the number of new platforms and technologies used by pupils and teachers in and out of the classroom. The proliferation of social networks such as Facebook, Bebo and MySpace, instant messenger (IM) platforms, and file-sharing and peer-to-peer applications and software mean that...

    Provided By Network Box

  • White Papers // Sep 2009

    Authentication - Who Are You?

    Identity fraud is rising. It is increasingly simple, with more ways of doing it than ever before. As more and more applications become available to over the Internet, there is a growing need to prove identity, in order to prevent criminals from taking advantage of all. To achieve this protection...

    Provided By Network Box

  • White Papers // Sep 2009

    How That PDA Could Bring the Whole System Crashing Down

    As users blur work and personal Internet use, particularly on their own devices, one could find organization exposed to malware simply because of their ignorance. The battle for corporate network security is being fought at new endpoints. Businesses need to think laterally when it comes to protecting their networks from...

    Provided By Network Box

  • White Papers // Jul 2009

    Network Box White Paper: Hacks, Hoaxes and Horrors

    Most of the hoaxes people encounter these days come to them via the Internet. The number of opportunistic and targeted Internet-based crimes and misdemeanors carried out every day results in stolen data and damaged systems, and costs companies many hundreds of thousands of pounds. Other threats are more personal, attacking...

    Provided By Network Box

  • White Papers // Apr 2009

    Technologies for Spam Detection

    None of the techniques above can provide total protection in isolation; most have a way round them. The only real solution to the spam problem is to combine techniques, to create a probability score to assess whether an email is spam. Currently, detection rates of 95-98 per cent can be...

    Provided By Network Box

  • White Papers // Nov 2009

    Network Box White Paper: Securing Remote Workers

    In the case of home workers, the employee must use a VPN. The three most commonly used today are PPTP, IPSEC and SSL. IPSEC and SSL are the most secure, because they can use the highest security encryption - AES 256. SSL VPNs are becoming popular as they are more...

    Provided By Network Box

  • White Papers // Sep 2009

    Part II: Routing, the Hole in the Wall

    Routing can be tricky. If one knows where data is going, one is half way to resolving a large number of application problems. But understanding where data is being routed to and from is crucial in the security arena. Incorrect routing can result in security measures being bypassed or reduced...

    Provided By Network Box

  • White Papers // Sep 2009

    Network Box Advisory: Forgotten Security - Part 1: Monitoring

    Companies are protecting themselves from high-profile threats such as malware attacks, but are often leaving themselves vulnerable from the 'forgotten security defences'. The first of these results from simply not monitoring the applications, hardware and security systems across the business, which can lead to network failure. Most businesses are using...

    Provided By Network Box

  • White Papers // Jun 2009

    Network Box White Paper: Securing Social Media - Series Part 5: Guide to Secure Use of IM (instant Messaging)

    One is often asked by clients how to block a particular application, most notably one that includes Instant Messaging (IM), such as Facebook, Skype, MSN etc. But the problem with blocking an application is that it will often find a way through a firewall - either using 'Tunnelling' software, or...

    Provided By Network Box

  • White Papers // May 2009

    Network Box White Paper: Securing Social Media Series - Part 4: Guide to Secure Use of Facebook

    Huge numbers of companies are banning employees from using Facebook and other social networking sites, concerned about the amount of time wasted on these sites and the drop in productivity as a result. But is this the right way forward? Given the benefits of networking to companies there is a...

    Provided By Network Box

  • White Papers // Apr 2009

    Network Box White Paper: Securing Social Media Series - Part 3: Guide to Secure Use of Twitter

    It seems one can't open a newspaper or look at a news site without seeing Twitter all over the headlines. From Barack Obama's use of Twitter during his election campaign, or reports that the primary school curriculum will include teaching children about Twitter, to growing concerns about identity theft on...

    Provided By Network Box

  • White Papers // May 2009

    Network Box White Paper: Securing Social Media Series - Part 1: Blogging

    Blogs are now a mainstream form of communication for most companies, and are a trusted source of information: Technorati reports that 37 per cent of bloggers have been quoted in traditional media, based on something they've included in a blog post. And yet, as the numbers grow, so do the...

    Provided By Network Box

  • White Papers // Sep 2009

    Online Privacy and Browser Security

    In the past year there have been a number of debates on the need for online privacy. Some commentators (Sir David Omand and Scott McNealy) have argued that privacy online must be sacrificed for progress and security whilst others insist on privacy being paramount in a free society (Sir Tim...

    Provided By Network Box

  • Case Studies // Oct 2009

    Network Box Helps Biwater Group Keep Its Network Flowing

    The Biwater Group designs and constructs water and wastewater systems across the world (the name 'Biwater' - or 'Two waters' - was adopted because of its involvement in the provision of clean water and the treatment of wastewater). Employees need to access the Internet in the course of their work,...

    Provided By Network Box

  • Case Studies // Jan 2009

    Network Box Case Study: Charnwood Borough Council

    Like many organisations, CBC was using a number of different security technologies to protect itself against the burgeoning myriad of online threats. For example, it outsourced its firewall, VPN, email filtering and web filtering security to separate companies. However, CBC discovered that not only is this method cost-ineffective, it also...

    Provided By Network Box