IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network SecurityMultimedia (View All Report Types)
101 - 111 of 111 Matches Previous Page  |  Next Page
QuickTour Demo: Key Differentiators between MicroStrategy and Cognos
sponsored by MicroStrategy Incorporated
WEBCAST: This tour provides an overview of MicroStrategy platform's uniquely powerful enterprise BI capabilities and illustrates the 12 key differentiators between MicroStrategy and Cognos.
Posted: 09 Jun 2008 | Premiered: Jun 7, 2008

MicroStrategy Incorporated

Key Steps to Securing Your Organization and Evicting a Hacker
sponsored by Foundstone, Inc.
PODCAST: This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks.
Posted: 30 Apr 2008 | Premiered: Apr 30, 2008, 09:00 EDT (13:00 GMT)

Foundstone, Inc.

Symantec Protection Network and Online Backup: An Executive Overview
sponsored by Symantec Corporation
PODCAST: In this podcast, Sr. Manager of Product Management, Mike Baldwin, provides an overview of the Symantec Protection Network and the Online Backup offering of the newly launched Symantec service.
Posted: 29 Feb 2008 | Premiered: Feb 19, 2008

Symantec Corporation

SolarWinds ipMonitor v9.0
sponsored by SolarWinds, Inc.
TRIAL SOFTWARE: ipMonitor delivers out-of-the-box availability monitoring that is ideal for environments with less than 500 devices.
Posted: 25 Jan 2008 | Premiered: 25 Jan 2008

SolarWinds, Inc.

Simplifying Data Centers & Networks by Creating a Virtual Infrastructure Layer
sponsored by OnPATH Technologies
WEBCAST: View this Webcast to learn how a virtualized infrastructure layer (VIL) enables organizations to achieve an automated and simplified physical layer infrastructure to improve the availability, manageability, and performance of IT environments.
Posted: 15 Oct 2007 | Premiered: Nov 6, 2007, 14:00 EST (19:00 GMT)

OnPATH Technologies

EtherScope Series II Network Assistant
sponsored by Fluke Networks
PRODUCT DEMO: EtherScope Series II Network Assistant helps first responders solve network problems on both sides of the access point - fast. This virtual demo will show you an ideal portable platform for rogue hunting and troubleshooting.
Posted: 01 Jun 2007 | Premiered: 01 Jan 2006

Fluke Networks

5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk
sponsored by Lumeta Corporation
PODCAST: Join IT expert David Arbeitel and listen to the Podcast, "5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk" and discover how to make the most of your Vista migration.
Posted: 27 Apr 2007 | Premiered: Apr 27, 2007, 09:00 EDT (13:00 GMT)

Lumeta Corporation

GFI LANguard Network Security Scanner 8
sponsored by GFI Software
TRIAL SOFTWARE: GFI LANguard Network Security Scanner 8 is a network vulnerability management solution that scans the network and performs over 15,000 vulnerability assessments. It identifies all possible security threats and provides tools to patch and secure networks.
Posted: 19 Apr 2007 | Premiered: 19 Apr 2007

GFI Software

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Managing Your Network Security with Juniper Networks Flash Demo
sponsored by Juniper Networks, Inc.
SOFTWARE DEMO: Take a tour of the Juniper Networks NetScreen-Security Manager to see how you can manage integrated FW/VPN devices.
Posted: 30 Aug 2006 | Premiered: 30 Aug 2006

Juniper Networks, Inc.

Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation
101 - 111 of 111 Matches Previous Page    3 4 5    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement