IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network Security Multimedia (View All Report Types)
1 - 25 of 117 Matches Previous Page  |  Next Page
Ensuring Data Security in the Cloud and on Endpoints
sponsored by WinMagic
WEBCAST: This webcast explores the risks of cloud file sync and share services and how to ensure data protection in the cloud.
Posted: 01 Jul 2015 | Premiered: Jun 3, 2015

WinMagic

Enhancing Microsoft BitLocker for Your Enterprise
sponsored by WinMagic
WEBCAST: While BitLocker is a popular data encryption option, there are some gaps in the technology that need filling. This webcast explores how to enhance BitLocker to protect data at rest on any endpoint.
Posted: 30 Jun 2015 | Premiered: Dec 17, 2014

WinMagic

Simplifying Data at Rest Encryption and Security
sponsored by WinMagic
WEBCAST: This webcast explores full-disk encryption and how it can simplify securing data at rest as well as access management and network security.
Posted: 29 Jun 2015 | Premiered: Jun 10, 2015

WinMagic

The Human Firewall – Strengthening Email Security
sponsored by Mimecast
WEBCAST: Listen to guest speaker Nick Hayes from Forrester Research and Steve Malone from Mimecast for insight into how technology and awareness together can strengthen defenses.
Posted: 26 Jun 2015 | Premiered: Jun 10, 2015

Mimecast

Unlock Your Customer Identities: Virtualize SQL to Deliver Better Security and Services
sponsored by Radiant Logic, Inc.
WEBCAST: This webinar explains how a common identity service for all constituents can improve security and deliver better services to your customers.
Posted: 25 Jun 2015 | Premiered: Mar 9, 2015

Radiant Logic, Inc.

Verizon Enterprise Solutions Overview
sponsored by Verizon
VIDEO: Access this short video to see an introduction to a networking alternative that will let you expand your reach, increase your agility and maintain longevity.
Posted: 25 Jun 2015 | Premiered: 19 Sep 2013

Verizon

The Peripheral You're Not Managing, and The Risk It Poses
sponsored by Nuance
WEBCAST: This webcast discusses the hidden security risk multi-function printers and other devices pose and gives advice for mitigating that risk.
Posted: 25 Jun 2015 | Premiered: Jun 9, 2015

Nuance

Enabling Competitive Advantage in the Digital Experience
sponsored by Verizon
VIDEO: This short, lighthearted video serves as an introduction to a digital experience service that can help you grown and prevent disruptions.
Posted: 25 Jun 2015 | Premiered: 22 Jan 2015

Verizon

Gain Control of Sensitive Documents
sponsored by Nuance
VIDEO: Take a look at this brief video to discover just how dangerous an insecure printer can be, and to learn what you can do to protect your sensitive documents.
Posted: 22 Jun 2015 | Premiered: 03 Apr 2015

Nuance

Software-Defined Security and the Agile Data Center
sponsored by CloudPassage
WEBCAST: On this webinar, you'll hear from Neil MacDonald, VP Distinguished Analyst from Gartner Research, and CloudPassage's Co-founder and Chief Strategy Officer, Carson Sweet. They'll share insights into the changes required for security and compliance in the new, more agile data center.
Posted: 22 Jun 2015 | Premiered: Jun 22, 2015

CloudPassage

A10 Networks Thunder ADC Provides Protection from Encrypted Threats
sponsored by A10 Networks
VIDEO: Access this short video to see a visualization of the threat posed by encrypted data traffic, and what a solution looks like.
Posted: 02 Jun 2015 | Premiered: 02 Jun 2015

A10 Networks

New Capabilities of Next-Gen Firewalls
sponsored by Dell Software
VIRTUAL ENVIRONMENT: This virtual environment explores why firewalls that are only 2-3 years old are failing to protect organizations from malware and other cybercrime attacks.
Posted: 01 Jun 2015 | Premiered: 10 Dec 2014

Dell Software

A10 Networks ACOS for Better End User Experience and Superior ROI
sponsored by A10 Networks
VIDEO: Access this short video to see why traditional network solutions won't stand up to increased pressure, and how you can use high speed shared memory in an ADC to improve your business.
Posted: 01 Jun 2015 | Premiered: 01 Jun 2015

A10 Networks

Managing SSL/TLS Vulnerabilities and Virtual Patching Best Practices
sponsored by Trend Micro
WEBCAST: Access this webinar to learn the options you have to better manage vulnerabilities and discover new methods to adapt and mitigate known and unknown threats.
Posted: 08 May 2015 | Premiered: May 12, 2015

Trend Micro

Anatomy of Cyber Attack
sponsored by Hewlett-Packard Company
WEBCAST: Attend this webinar to learn the anatomy of an advanced persistent threat and why it's critical to detect and isolate the attack at "patient zero," the initial point of infection.
Posted: 06 May 2015 | Premiered: Mar 31, 2015

Hewlett-Packard Company

Security on the Edge Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom looks at enterprise strategies for network perimeter defense and next generation tools such as network access control, single sign-on, encryption certificates and more.
Posted: 05 May 2015 | Premiered: 04 May 2015

SearchSecurity.com

Machine Learning Anomaly Detection for IT Ops
sponsored by Prelert
VIDEO: Watch this brief video to discover how you can more effectively monitor all your data and discover why a problem occurs before it can harm your network.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

Security Analytics:Anomaly Detection for IT Security
sponsored by Prelert
VIDEO: Watch this video to learn how anomaly detection systems use advanced analytics to uncover even the subtlest cybercriminals.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

Overcoming Evolving Cyberthreats and Next-Gen Firewalls
sponsored by Juniper Networks, Inc.
WEBCAST: In this webcast, learn how to deal with new threats as they evolve and design dynamic security into cloud environments.
Posted: 24 Mar 2015 | Premiered: Dec 4, 2014

Juniper Networks, Inc.

SIEM Battleground Unfolds Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom looks at next-generation security information and event management (SIEM), analytic tools and cloud-based systems designed to help CISOs make sense of security data.
Posted: 05 Mar 2015 | Premiered: 16 Mar 2015

SearchSecurity.com

Web security meets DDoS Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: John Pescatore explores new DDoS attack vectors and discusses incident response planning (tools and processes) you need to plan for in 2015.
Posted: 18 Feb 2015 | Premiered: 20 Feb 2015

SearchSecurity.com

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

Next-Generation Firewalls: Breaking Through the Hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 01 Feb 2015 | Premiered: 10 Dec 2013

SearchSecurity.com

The Importance of Integrating Printing/Imaging Into Your IT Security Strategy
sponsored by Hewlett-Packard Limited
WEBCAST: This exclusive webcast dives into some of the toughest challenges with print and imaging security.  Read on to learn more.
Posted: 27 Jan 2015 | Premiered: Jan 27, 2015

Hewlett-Packard Limited

Forrester on Addressing IT Challenges in Today's Mobile World
sponsored by Commvault
WEBCAST: In this webcast, Rachel Dines, senior analyst at Forrester Research, discusses the effect that data growth is having on an ever-changing IT landscape, and how the future will be defined by flexible solutions featuring converged backup and archive.
Posted: 30 Dec 2014 | Premiered: Feb 28, 2013

Commvault
1 - 25 of 117 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement