sponsored by Cisco Systems, Inc.
Premiered:  Nov 20, 2009
Format:  Multimedia
Type:  Webcast
Language:  English
In today’s era of borderless networks, minimizing your exposure to outside threats is more essential than ever. In this video, find out how to reduce the potential attack surfaces available to data thieves without buying any new hardware or software. Learn the latest methods employed by hackers to gain access to your network and show you how to eliminate these threats.

Learn the simple, fundamental steps to take right now to strengthen your network security using the foundational technologies you already have. View this video now to learn about:

  • How intruders “firewalk” your firewalls and how to stop them
  • How unused protocols and ports can emit valuable information about your network
  • Why headend routers have suddenly become the “entry point of choice” for hackers and how to lock them down


Robb Boyd
Cisco Solution Expert

Robb Boyd is a 10 year veteran of Cisco starting in the field as a territory sales manager, he is now the Managing Editor and host for the Cisco Interaction Network which currently includes the flagship technical web based TV show: TechWiseTV. These shows have earned multiple awards both within Cisco as well as within the online media industry at large.

Jimmy Ray Purser
Cisco Solution Expert
Jimmy Ray Purser has been an active participant of the information technology (IT) community for more than 19 years, with particular emphasis on local area network (LAN) and wide area network (WAN) infrastructure hacking. He is an active member in the IEEE and the Ethernet Alliance and has an avid following on his blogs, "Networking Geek to Geek" and Network Sheriff.

Cybersecurity | Firewall Appliances | Network Security Appliances | Network Security Hardware | Network Security Software | Security | Security Best Practices | Security Threats

View All Resources sponsored by Cisco Systems, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement