IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Multimedia (View All Report Types)
1 - 25 of 128 Matches Previous Page  |  Next Page
Five Ways Having 2 DNS Services Can Protect Your Hybrid Investment
sponsored by Dyn
WEBCAST: You shouldn't rely on a single DNS service to protect your internet hybrid infrastructure. In this informative webinar you will learn about different ways you can get the benefits of a hardened internet infrastructure layer and how 2 DNS services can protect your hybrid investment.
Posted: 30 Sep 2016 | Premiered: Aug 30, 2016

Dyn

Why mitigating risk remains difficult: Overview of GigaSECURE Security Delivery Platform
sponsored by Gigamon
VIDEO: Discover how to shift your security strategy from perimeter defenses towards a detect and protect framework gaining greater visibility in the process.
Posted: 23 Sep 2016 | Premiered: 04 Aug 2015

Gigamon

Digital Identity Insights: Dangerous Access, IoT Security, and Compliance
sponsored by Certified Security Solutions (CSS)
WEBCAST: Join digital identity expert Chris Hickman for a review of the current state of the Internet of Things (IoT) from a security perspective and the critical role that digital identity authentication has in helping companies secure consumer-facing technology.
Posted: 22 Sep 2016 | Premiered: Sep 16, 2015

Certified Security Solutions (CSS)

Prevent Your Business Continuity Plan from Being an Epic Failure
sponsored by Charter Communications
WEBCAST: Register to attend this webinar on October 4th, 2016 at 1 PM EST, and hear from expert speakers on how to successfully secure network performance and maintain operations during unplanned disruptions. Register now for the October 4th webinar to ensure that your business continuity plan not only looks good on paper, but functions during any disaster.
Posted: 15 Sep 2016 | Premieres: Oct 4, 2016

Charter Communications

The Most Important Things You Need to Know About Enterprise Mobility Management
sponsored by IBM MaaS360
WEBCAST: Today, employees are using their devices to access corporate data and using company devices to access personal data. This usage presents new security risks that call for an integrated, comprehensive policy for managing mobile devices. View this webinar that discusses the mobile workplace and how to construct an effective and secure mobile policy.
Posted: 09 Aug 2016 | Premiered: Jun 30, 2016

IBM MaaS360

Facing up to Mobile Security Challenges
sponsored by IBM MaaS360
WEBCAST: Expectations for mobile access to corporate data have never been greater. But, how do you enable your company with mobility and ensure security? View this webcast that details mobile security challenges and how to best prepare for them with a complete mobile strategy.
Posted: 09 Aug 2016 | Premiered: May 31, 2016

IBM MaaS360

Join the Citrix Ready Secure Remote Access Program
sponsored by Citrix Ready
WEBCAST: What is Citrix Ready Secure Remote Access Program? How does it help you showcase your products and solutions while highlighting the integration with Citrix products? This video explains this program, why you should join, and how you and your customers will benefit its implementation.
Posted: 03 Aug 2016 | Premiered: Aug 9, 2016

Citrix Ready

The Cloud of Clouds: How to Take Advantage of a Cloud Services Integrator
sponsored by BT
VIDEO: 58% of large businesses cited cloud as driving profound change for their organizations, but are lingering doubts stopping you from joining the masses? Tune into this video to learn about a cloud services integrator that can connect you easily and securely to the applications and data you need—all on a global scale.
Posted: 02 Aug 2016 | Premiered: 10 May 2016

BT

Behavioral threat analytics
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This school examines the kinds of products that fit into the real-time behavioral threat analytics approach to security and what we know so far about deploying them successfully.
Posted: 20 Jul 2016 | Premiered: 15 Jul 2016

SearchSecurity.com

Masergy Unified Enterprise Security Demo
sponsored by MASERGY
WEBCAST: Access this webcast to discover how machine learning combined with continuous human monitoring can harden your defenses and improve your advanced threat detection capabilities.
Posted: 09 Jun 2016 | Premiered: May 1, 2016

MASERGY

McKenna Long & Aldridge Chose Masergy's Managed Cloud Networking
sponsored by MASERGY
WEBCAST: With these Managed Cloud Networking solutions, the firm could open new offices quicker than ever before. Learn how you can leverage analysis tools to monitor network traffic and application usage patterns to gain predictive insights for strategic IT initiatives.
Posted: 09 Jun 2016 | Premiered: May 1, 2016

MASERGY

Next Generation Cybersecurity: The Age of Artificial Intelligence
sponsored by MASERGY
WEBCAST: Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.
Posted: 06 Jun 2016 | Premiered: May 1, 2016

MASERGY

Increase productivity in a mobile world
sponsored by HPE and Intel®
WEBCAST: Supporting mobility is the key ingredient to increase employee productivity. Discover the challenges you face in implementing an effective mobile strategy and the 4 key steps to increase productivity.
Posted: 03 Jun 2016 | Premiered: Jun 3, 2016

HPE and Intel®

Managed Security
sponsored by MASERGY
WEBCAST: The threat landscape is growing and network security is already a full-time job. Watch this 2 minute webcast to learn about a managed security service and how it bolsters your defenses, preparing you to handle whatever attacks come your way.
Posted: 02 Jun 2016 | Premiered: Jun 1, 2016

MASERGY

What Mobile Policy Suits Your Organization?
sponsored by IBM MaaS360
WEBCAST: BYOD may not be right for every organization. It takes a lot to ensure a secure and successful BYOD campaign. Watch this webinar to see how other companies are approaching BYOD and how to make sure that you can take advantage of this growing business trend.
Posted: 31 May 2016 | Premiered: Mar 31, 2016

IBM MaaS360

Beyond the Perimeter: Protecting your Network
sponsored by IBM MaaS360
WEBCAST: Learn how to protect your network beyond the perimeter defenses and securely integrate mobile access to company data. Watch this webinar to learn what considerations you need to account for when planning your network security strategy, especially when it comes to employee mobile devices.
Posted: 31 May 2016 | Premiered: May 25, 2016

IBM MaaS360

How Hulu Solves Their Security Analytics Problem
sponsored by Exabeam
VIDEO: Hulu security decided to utilize user behavior analytics (UBA) to help with this process. They're now able to focus their small team on specific areas of concern rather than watch a whole gamut of areas.
Posted: 20 May 2016 | Premiered: 23 Sep 2015

Exabeam

Gain Visibility and Context into Attacks with Behavior Intelligence
sponsored by Exabeam
VIDEO: It's imperative today to deal with the myriad of threats that organizations deal with daily. Learn how to accelerate your time to attack understanding, reduce response time and create a more efficient security operation.
Posted: 20 May 2016 | Premiered: 17 Feb 2015

Exabeam

Data Exfiltration in Depth
sponsored by Intel Security
WEBCAST: Data exfiltration and data loss prevention experts go in-depth into common data exfiltration techniques and how to detect a possible attack. They'll provide quantitative research about data loss attempts and detail data loss prevention processes and tools.
Posted: 17 May 2016 | Premiered: Apr 1, 2016

Intel Security

What does mobility really mean?
sponsored by Citrix
VIDEO: In this video learn how one system can play a precise and integral role for enabling flexible workspaces and work styles without exposing your organization to risk. View now to learn more.
Posted: 13 May 2016 | Premiered: 06 Oct 2014

Citrix

Case Study: Meet the Mobility, Collaboration and Security Needs of Your Users
sponsored by Citrix
VIDEO: When a massive amount of information is being shared on a daily basis, it is critical that your file sync and share system is up to par. Watch this video now to learn how one investment company enabled secure file sharing and mobility to meet the collaboration needs of users.
Posted: 13 May 2016 | Premiered: 23 Feb 2015

Citrix

Customer Story: Implementing Mobility in the Workplace
sponsored by Citrix
VIDEO: Learn how one of the largest healthcare systems in the United States implemented an efficient, secure mobile strategy and increased collaboration. Discover how you can provide your employees the flexibility of working outside of their offices and increase productivity.
Posted: 13 May 2016 | Premiered: 08 Oct 2013

Citrix

Customer Spotlight | blinkbox
sponsored by Barracuda Networks
VIDEO: In this video, you will learn about a VOD service called blinkbox and their struggles finding solid cloud security for their platform. Watch now to see how they remediated their security issues and how they now operate without breach concerns.
Posted: 11 May 2016 | Premiered: 28 Oct 2014

Barracuda Networks

Considerations for Secure Enterprise File Sharing
sponsored by Citrix
VIDEO: File sharing becomes an issue when there is no one predetermined way to share within an enterprise, especially when taking cloud and mobile computing into consideration. Watch this brief video to learn about how to spot and close security gaps.
Posted: 06 May 2016 | Premiered: 20 Aug 2013

Citrix

Data Centers at the Edge
sponsored by Schneider Electric
WEBCAST: In this webcast, you will discover the benefits and boons of localized data centers on the network edge—paving the way for new capabilities deployed into the network. Tune in now to power the digitization of your business, and learn the different data center localization offers now available.
Posted: 02 May 2016 | Premiered: May 2, 2016

Schneider Electric
1 - 25 of 128 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement