IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Multimedia (View All Report Types)
1 - 25 of 150 Matches Previous Page  |  Next Page
Podcast: Why NetFlow is Vital to Security
sponsored by Gigamon
PODCAST: This podcast explores why NetFlow is vital to network security and explores how it can be used for security policy enforcement, analytics, breach discovery, and more.
Posted: 20 Nov 2015 | Premiered: Nov 3, 2015


Upgrade and Onboard Enterprise Mobile Devices to Windows 10
sponsored by Microsoft
WEBCAST: In this webinar, Independent Analyst, Jack Madden explains how to upgrade and onboard new and existing enterprise mobile devices to Windows 10. Watch this video now to learn why this migration is simpler than Windows XP to 7.
Posted: 20 Nov 2015 | Premiered: Nov 20, 2015


Security into an IoT Device: Why & How?
sponsored by Inside Secure
WEBCAST: This webinar on December 8th will provide the valuable information needed to help you to understand just what the main IoT security concerns are and what to do about it. Sign up to this free webinar before November 30th and receive a free IoT Security for Dummies Book to download in December.
Posted: 19 Nov 2015 | Premieres: Dec 8, 2015

Inside Secure

Multi-Layered Defense for an Evolving Threat Landscape
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Access this webcast to learn how you can protect against both known and unknown malware and to make today's difficult cybersecurity landscape just a little bit easier.
Posted: 16 Nov 2015 | Premiered: Oct 13, 2015

Check Point Software Technologies Ltd.

How Sandboxing puts a Stop to Today's Advanced Attacks
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video introduces a modern approach to sandboxing that catches even the most evasive attack. Take a look to learn how you can upgrade your sandboxing capabilities to match today's advanced and zero-day attacks.
Posted: 16 Nov 2015 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.

Staying One Step Ahead with Zero-Day Protection
sponsored by Check Point Software Technologies Ltd.
WEBCAST: This webcast examines how you can stop today's advanced hackers. Watch and learn how sandboxing, CPU-level detection and more can keep your organization secure from even the most sophisticated threats.
Posted: 16 Nov 2015 | Premiered: Sep 22, 2015

Check Point Software Technologies Ltd.

Unisys Tom Patterson: 3 Key Steps in Securing Critical Infrastructure
sponsored by Unisys
VIDEO: Tom Patterson, VP, GM of Unisys Global Security Solutions speaks to Business Rockstars about the need to protect Critical Infrastructure systems and offers 3 key tips to begin that discussion.
Posted: 10 Nov 2015 | Premiered: 25 Sep 2015


Webcast Series: ACI Implementation Workflow Tutorials
sponsored by Cisco Systems, Inc and Citrix
WEBCAST: In this series of webcasts, Citrix Principal Technical Marketing Engineer demonstrates how to deploy an application service. View this webcast now to learn about pre-provisioning process for SDX in an ACI environment and more.
Posted: 10 Nov 2015 | Premiered: Nov 10, 2015

Cisco Systems, Inc and Citrix

From Whiteboard to Production: ACI and Automating Load Balancing
sponsored by Cisco Systems, Inc and Citrix
WEBCAST: In this webcast, you will learn how to automate load balancing and promote real-world enterprise solutions using software-defined networking, together with Cisco ACI and Citrix NetScaler. View now to see this automation process and other highlights like the progression of service integration and more.
Posted: 06 Nov 2015 | Premiered: Nov 6, 2015

Cisco Systems, Inc and Citrix

How to Power Your Enterprise Network and Transform Your Data Center
sponsored by Cisco Systems, Inc and Citrix
WEBCAST: This webcast explains how to automate network provisioning and control based on application requirements and policies, both for datacenter and enterprise environments. View now to learn how to transform your enterprise network with accelerated application deployment.
Posted: 06 Nov 2015 | Premiered: Aug 31, 2014

Cisco Systems, Inc and Citrix

Protect Your Data: Meet the Heroes of a Dynamic Threat Protection System
sponsored by IBM
VIDEO: Organizations take an average of 225 days to detect an advanced persistent threat. Since you can't afford to wait that long, tune into this video and discover a methodology for preventing, detecting and responding to advanced attacks.
Posted: 04 Nov 2015 | Premiered: 09 Feb 2015


Transform Webcasting Services with Unified Communications Architecture
sponsored by VBrick
WEBCAST: This brief video illustrates how video hosting services can save you money, produce better quality, and enable you to host your own website videos. Learn how to manage all video content from a consumer-grade portal.
Posted: 02 Nov 2015 | Premiered: Nov 2, 2015


Enable Your Hyper-Connected Enterprise with Next-Generation UC
sponsored by Oracle Corporation
VIDEO: In this webcast you will learn how to transform your organization into a hyper-connected enterprise with next-generation UC. Discover how to create a successful communications architecture that connects employees from any device.
Posted: 02 Nov 2015 | Premiered: 02 Nov 2015

Oracle Corporation

GoAnywhere MFT Overview Video
sponsored by Linoma Software
VIDEO: This short video introduces a managed file transfer solution that is secure and convenient. You'll be able to simplify, automate, and encrypt your file transfers.
Posted: 29 Oct 2015 | Premiered: 29 Oct 2015

Linoma Software

Automate Your Enterprise Apps to Ensure Secure Mobile Data Access
sponsored by Citrix
WEBCAST: In this webcast, Security Strategists Stacy Bruzek Banerjee and Kurt Roemer share their advice on how and where to protect the enterprise data that matters. Tune in to receive guidance on automating your enterprise data and apps, so that your people can access sensitive data when—and where—they need it.
Posted: 28 Oct 2015 | Premiered: Oct 28, 2015


How to Remove the Barriers to Cloud Collaboration Adoption
sponsored by Mimecast
WEBCAST: In this webinar, join Forrester Research-backed experts as they take you through the advantages of adopting cloud collaboration technology, overcoming security challenges, and developing a flexible strategy.
Posted: 27 Oct 2015 | Premiered: Oct 27, 2015


Continuous Testing: How to Streamline Performance, Regression, and Security Testing
sponsored by Citrix and NRG Global
WEBCAST: This webinar reveals how you can use a continuous testing strategy to incorporate any alterations into your environment quickly and with confidence.
Posted: 26 Oct 2015 | Premiered: Nov 4, 2015

Citrix and NRG Global

STW Group Securely Manages Its National Network
sponsored by Palo Alto Networks
WEBCAST: In this case study, Tom Ceglarek, Chief Information Officer at STW Group, examines how STW securely managed their explosive growth of video and applications across its national network. Learn how to employ next-generation firewalls with parallel code to take your security to the next level.
Posted: 16 Oct 2015 | Premiered: Oct 16, 2015

Palo Alto Networks

Simplified Network Security  in 90 Seconds
sponsored by OpenDNS
WEBCAST: View this webcast to learn how to protect users on any device in any location from today's top network security threats such as malware and phishing attacks.
Posted: 14 Oct 2015 | Premiered: Jun 30, 2012


Best Practices for Classification Techniques and Data Protection
sponsored by Identity Finder, LLC
WEBCAST: In this webinar, Forrester senior analyst Heidi Shey reveals how to turn your data classification project into a success. Tune in and learn how to protect sensitive data types beyond the realm of what is considered regulated.
Posted: 12 Oct 2015 | Premiered: Jun 24, 2015

Identity Finder, LLC

Transforming Cyber Security at the University of New Brunswick
sponsored by Trend Micro
WEBCAST: In this informative webcast, David Shipley, Director of Strategic Initiatives, takes you through the challenges of university IT security strategies and how his team closed vulnerabilities at UNB.
Posted: 05 Oct 2015 | Premiered: Sep 23, 2015

Trend Micro

Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 01 Oct 2015 | Premiered: May 12, 2015

WhiteHat Security

Next Generation Threat Defense: Malware Breaks Past Perimeters
sponsored by Trend Micro
WEBCAST: In this thrilling webcast, watch the drama unfold as one organization relies too heavily on fossil network security measures and falls victim to a data breach despite taking all of the necessary remediation steps such as log audits and sandboxing. View now to learn the strategies to bolster network security and how to rethink your architecture.
Posted: 01 Oct 2015 | Premiered: Sep 2, 2015

Trend Micro

An Innovative Approach to Encrypted Network Security
sponsored by Unisys
VIDEO: This video introduces a new kind of encryption that keeps data on your network and mobile devices more secure while allowing for simple endpoint management and access.
Posted: 30 Sep 2015 | Premiered: 11 Sep 2015


Demo: Guarding against Today's Advanced Attacks
sponsored by Trend Micro
VIDEO: In this demo video, discover how you can revamp your security to guard against today's advanced attacks.
Posted: 29 Sep 2015 | Premiered: 29 Sep 2015

Trend Micro
1 - 25 of 150 Matches Previous Page    1 2 3 4    Next Page
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement