IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network SecurityMultimedia (View All Report Types)
1 - 25 of 122 Matches Previous Page  | Next Page
Three Steps to Securing Your Critical Data in the Cloud
sponsored by CipherCloud
WEBCAST: This webcast exposes the three steps needed to secure data in the cloud: cloud discovery, data discover, and data protection.
Posted: 24 Sep 2014 | Premiered: Sep 24, 2014

CipherCloud

Podcast: Opportunities with VMware and VMware vCHS
sponsored by Avnet Technology Solutions
PODCAST: The mobile-cloud era brings with it an increase in business and end-user expectations, and IT pays the price
Posted: 15 Sep 2014 | Premiered: Sep 5, 2014

Avnet Technology Solutions

A10 Networks' Advanced Core Operating System (ACOS)
sponsored by A10 Networks
VIDEO: Tune into the following video to discover how A10 Networks ACOS is increasingly the platform of choice for enterprises, service providers, Web giants and government organizations seeking to optimize the performance and security of their data center applications and networks.
Posted: 11 Sep 2014 | Premiered: 11 Sep 2014

A10 Networks

SDN Innovations in Campus
sponsored by Hewlett-Packard Company
WEBCAST: In this webcast, we will cover how SDN is impacting the campus environment and feature a location-aware SDN application providing WiFi Indoor positioning that enables context-aware location advertising for businesses and highlight how HP can unlock the business value of your network.
Posted: 10 Sep 2014 | Premiered: Sep 10, 2014

Hewlett-Packard Company

HP SDN in the Campus LAN
sponsored by Hewlett-Packard Company
WEBCAST: The network is transforming to adapt to trends such as cloud, big data, security & mobility. In this session, we will cover the technology components of the HP Network Protector and the HP Network Optimizer for Microsoft Lync.
Posted: 10 Sep 2014 | Premiered: Sep 10, 2014

Hewlett-Packard Company

Experts Addressing IT Challenges in Today's Mobile World
sponsored by CommVault Systems, Inc.
WEBCAST: The mobile workforce has different needs than your traditional workers.  You need to make sure you're protecting the data outside the company walls.
Posted: 09 Sep 2014 | Premiered: Feb 28, 2013

CommVault Systems, Inc.

Proven Practices for Securing Your Website Against DDoS Attacks
sponsored by Dyn
PODCAST: This expert podcast discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.
Posted: 05 Sep 2014 | Premiered: Aug 25, 2014

Dyn

Mobile Management and Security Essentials
sponsored by Fiberlink
WEBCAST: Smartphones and applications were at first targeted to the consumer - games, videos, and other entertainment flooded the app market.  However, these devices were quickly adopted by businesses to help further advance processes.
Posted: 29 Aug 2014 | Premiered: Aug 29, 2014

Fiberlink

Proven Practices for Securing Your Website Against DDoS Attacks
sponsored by Dyn
WEBCAST: This expert webcast discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.
Posted: 26 Aug 2014 | Premiered: Aug 25, 2014

Dyn

Security School: Defending Against DDoS Attacks
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson reviews recent cases of DOS attacks, what happened and why, and the lessons you can learn in devising the best DoS defense.
Posted: 15 Aug 2014 | Premiered: 15 Aug 2014

SearchSecurity.com

Mobile Security: Getting Past No to Yes
sponsored by Bluebox
WEBCAST: This webcast reveals how focusing on mobile security can improve your organization, specifically because of the booming emergence of the mobile market.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Bluebox

SDN & Security for Next-Generation Data Centers
sponsored by Fortinet, Inc.
WEBCAST: In this two-part webcast, hear what Gartner analyst Mark Fabbi has to say about how software-defined networking will affect data centers and network security.
Posted: 29 Jul 2014 | Premiered: Jun 30, 2014

Fortinet, Inc.

New Strategies for Protecting Enterprise Networks and Endpoints
sponsored by CDW Corporation
WEBCAST: This webcast presents a next-generation firewall solution to protect your organization's network and endpoints.
Posted: 21 Jul 2014 | Premiered: May 31, 2014

CDW Corporation

Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security
sponsored by Imperva
WEBCAST: This on-demand webinar, Gartner Research Director Adam Hils discusses how IPS and NGFWs leave dangerous gaps in enterprise security, explains why web application firewalls (WAFs) are worth the investment for enterprises, and reviews the major features of WAF technology, deployment options and selection guidelines.
Posted: 15 Jul 2014 | Premiered: Jul 15, 2014

Imperva

How to easily configure antivirus policies in GFI Cloud
sponsored by GFI Cloud
VIDEO: This short video demonstrates – by walking you through, step by step – how to easily configure antivirus policies in GFI Cloud. Watch now to discover how to achieve improved network security in the cloud.
Posted: 10 Jul 2014 | Premiered: 09 Jul 2014

GFI Cloud

The Definitive Guide to Next Generation Firewalls: Which One is Right for You?
sponsored by Fortinet, Inc.
WEBCAST: This exclusive webcast takes an in-depth look at NGFWs, discussing five crucial "must-haves" for firewall success. Tune in now to find out more.
Posted: 23 Jun 2014 | Premiered: Jun 23, 2014

Fortinet, Inc.

Next-Generation Firewalls Classroom
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: Discover the NGFW tools currently available and the demands enterprises are placing on vendors to supply the tools they need to protect their assets in an increasingly vulnerable world.
Posted: 20 Jun 2014 | Premiered: 20 Jun 2014

SearchNetworking.com

Integrating SIEM and Incident Response Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security classroom explores how to enhance and extend SIEM technology to effectively support incident response.
Posted: 14 May 2014 | Premiered: 14 May 2014

SearchSecurity.com

Why Enterprises Are Really Deploying NGFWs
sponsored by Fortinet, Inc.
WEBCAST: This exclusive webcast takes a look at five organizations that have embraced next generation firewall solutions, examining their motivations for picking those solutions as well as the key requirements they established before making a purchase.
Posted: 19 Mar 2014 | Premiered: Mar 19, 2014

Fortinet, Inc.

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

Ixia’s Visibility Architecture
sponsored by Ixia
VIDEO: Learn more about the importance of your access to and control of data at every point in the physical and virtual network, and how to enable end-to-end visibility and security.
Posted: 27 Feb 2014 | Premiered: 27 Feb 2014

Ixia

Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
sponsored by Symantec Corporation
WEBCAST: Tune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
Posted: 12 May 2014 | Premiered: Mar 4, 2014

Symantec Corporation

About APCON – Intelligent Network Monitoring Solutions
sponsored by APCON, Inc.
VIDEO: This video introduces APCON, who develop industry-leading scalable network switching solutions that provide complete network visibility, improved network security, and optimized monitoring tool efficiency.
Posted: 09 May 2014 | Premiered: 09 Apr 2014

APCON, Inc.

Web Security – Virtual Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.

Cisco Visual Networking Index Global Mobile Data Traffic Forecast for 2013 to 2018
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage outlines some top trends in mobile data trafficking and explains how this will affect the way IT departments deal with the rising traffic.
Posted: 04 Apr 2014 | Premiered: 05 Feb 2014

Cisco Systems, Inc.
1 - 25 of 122 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement