IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network Security Multimedia (View All Report Types)
1 - 25 of 109 Matches Previous Page  |  Next Page
MAC Spoofing Webinar: Learn to Protect Yourself from Data Breaches
sponsored by Great Bay
WEBCAST: In this webinar, you will learn the top 3 challenges to securing your network from MAC spoofing, a popular way for hackers to attack your data, and how to overcome them.
Posted: 27 Mar 2015 | Premiered: Mar 2, 2015

Great Bay

Anamoly Detection: Finding Black Swans in Big Data
sponsored by Prelert
WEBCAST: This white paper introduces an anomaly detection system that cuts through big data to find even the subtlest threats.
Posted: 26 Mar 2015 | Premiered: Jan 24, 2015

Prelert

Choosing a Safe and Secure Service Delivery Platform
sponsored by Citrix
WEBCAST: Graham Melville, Senior Director, Product Marketing, NetScaler introduces the new capabilities of NetScaler MobileStream technologies.
Posted: 25 Mar 2015 | Premiered: May 6, 2014

Citrix

Machine Learning Anomaly Detection for IT Ops
sponsored by Prelert
VIDEO: Watch this brief video to discover how you can monitor all your data and discover why a problem occurs before it can harm your network.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

Security Analytics:Anomaly Detection for IT Security
sponsored by Prelert
VIDEO: Watch this video to learn how anomaly detection systems use advanced analytics to uncover even the subtlest cybercriminals.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

Overcoming Evolving Cyberthreats and Next-Gen Firewalls
sponsored by Juniper Networks, Inc.
WEBCAST: In this webcast, learn how to deal with new threats as they evolve and design dynamic security into cloud environments.
Posted: 24 Mar 2015 | Premiered: Dec 4, 2014

Juniper Networks, Inc.

SIEM Battleground Unfolds Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom looks at next-generation security information and event management (SIEM), analytic tools and cloud-based systems designed to help CISOs make sense of security data.
Posted: 05 Mar 2015 | Premiered: 16 Mar 2015

SearchSecurity.com

Preventing Insider Threats in Real-Time
sponsored by IBM
WEBCAST: Access this webcast to learn about a security identity management platform to help you thwart insider threats by tracking the users.
Posted: 27 Feb 2015 | Premiered: Jun 16, 2014

IBM

Web security meets DDoS Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: John Pescatore explores new DDoS attack vectors and discusses incident response planning (tools and processes) you need to plan for in 2015.
Posted: 18 Feb 2015 | Premiered: 20 Feb 2015

SearchSecurity.com

Cloudmark Security Platform for DNS
sponsored by Cloudmark
PRODUCT DEMO: If you suspect that your DNS has been compromised, use this DNS analysis page from Cloudmark to send them a traffic sample for complimentary analysis—the first step to take along the path to proven security success.
Posted: 16 Feb 2015 | Premiered: 16 Feb 2015

Cloudmark

Profiling an Enigma: What We Know About North Korea's Cyber Warfare Capabilities
sponsored by Hewlett-Packard Company
PODCAST: This podcast takes a look at what is known about North Korea's cyber warfare programs, and how the country maintains such secrecy in these matters.
Posted: 16 Feb 2015 | Premiered: Oct 29, 2014

Hewlett-Packard Company

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

How Hackers Exploit Admin Rights to Access Your Systems
sponsored by Viewfinity
WEBCAST: In this webcast you can watch a live hack to see how hackers gain admin rights in order to compromise your system.
Posted: 09 Feb 2015 | Premiered: Feb 9, 2015

Viewfinity

Next-Generation Firewalls: Breaking Through the Hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 01 Feb 2015 | Premiered: 10 Dec 2013

SearchSecurity.com

The Importance of Integrating Printing/Imaging Into Your IT Security Strategy
sponsored by Hewlett-Packard Limited
WEBCAST: This exclusive webcast dives into some of the toughest challenges with print and imaging security.  Read on to learn more.
Posted: 27 Jan 2015 | Premiered: Jan 27, 2015

Hewlett-Packard Limited

A New Approach to DNS Security
sponsored by Cloudmark
VIDEO: This short video introduces a security platform that provides comprehensive protection of DNS networks, infrastructure, and traffic without the rigidity and cost of most network security solutions.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Cloudmark

Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

Addressing IT Data Challenges in Today's Mobile World
sponsored by CommVault
WEBCAST: In this webcast, Rachel Dines, senior analyst at Forrester Research, discusses the effect that data growth is having on an ever-changing IT landscape, and how the future will be defined by flexible solutions featuring converged backup and archive.
Posted: 30 Dec 2014 | Premiered: Feb 28, 2013

CommVault

How to Detect a Ransomeware Infection with AlienVault USM
sponsored by AlienVault
WEBCAST: This exclusive webcast will show you how to detect and prevent ransomware from holding your network hostage.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

AlienVault

Security School: Defending Against DDoS Attacks
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson reviews recent cases of DOS attacks, what happened and why, and the lessons you can learn in devising the best DoS defense.
Posted: 15 Aug 2014 | Premiered: 15 Aug 2014

SearchSecurity.com

Next-Generation Firewalls Classroom
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: Discover the NGFW tools currently available and the demands enterprises are placing on vendors to supply the tools they need to protect their assets in an increasingly vulnerable world.
Posted: 20 Jun 2014 | Premiered: 20 Jun 2014

SearchNetworking.com

Discover how to Optimize your SIEM
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security classroom explores how to enhance and extend SIEM technology to effectively support incident response.
Posted: 14 May 2014 | Premiered: 14 May 2014

SearchSecurity.com

Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
sponsored by Symantec Corporation
WEBCAST: Tune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
Posted: 12 May 2014 | Premiered: Mar 4, 2014

Symantec Corporation

About APCON – Intelligent Network Monitoring Solutions
sponsored by APCON, Inc.
VIDEO: This video introduces APCON, who develop industry-leading scalable network switching solutions that provide complete network visibility, improved network security, and optimized monitoring tool efficiency.
Posted: 09 May 2014 | Premiered: 09 Apr 2014

APCON, Inc.

Web Security – Virtual Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.
1 - 25 of 109 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement