IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Multimedia (View All Report Types)
26 - 50 of 150 Matches Previous Page  |  Next Page
Hammertoss: How a Cyber-Threat Militia Hacks Into Networks Using Twitter
sponsored by FireEye
WEBCAST: This special network security webinar will guide you through an in-depth analysis of Hammertoss and its particulars as a concern to network security View now to delve into the specific inner workings of Hammertoss and the 5 stages of its attack.
Posted: 28 Sep 2015 | Premiered: Sep 16, 2015


Operation Clandestine Wolf: A Successful Zero-Day Attack Examined
sponsored by FireEye
WEBCAST: This webcast explores the anatomy of the attack on an Adobe Flash Player vulnerability, and how APT3, the cybercrime group conducting it, achieved success in breaking through security.
Posted: 25 Sep 2015 | Premiered: Jun 24, 2015


Accelerate WAN Optimization with a Cloud-Based Approach
sponsored by Citrix
VIDEO: In this brief video, join Gopinath Durairaj and Rachna Srivastava from Citrix to discuss a smarter approach to WAN optimization, one which compresses the amount of network traffic to streamline your app performance. Watch now to optimize your WAN for accelerated productivity.
Posted: 18 Sep 2015 | Premiered: 28 Jan 2014


Infrastructure Monitoring with Speed at Scale
sponsored by SevOne
VIDEO: This short video shows how denial of service attacks can be detected, identified and analyzed.
Posted: 17 Sep 2015 | Premiered: 17 Sep 2015


How to Turn Data into Actionable Threat Intelligence
sponsored by BrightPoint Security
VIDEO: This brief video presents a way to automate the analysis of threat intelligence, turning it into data you can use to enhance your security.
Posted: 08 Sep 2015 | Premiered: 27 Aug 2015

BrightPoint Security

VMware NSX Security and Micro Segmentation Overview Video
sponsored by VMware
VIDEO: Watch this brief video to learn about a network virtualization platform that provides the network and security foundation for the SDDC. You'll find out how this platform works and how it's providing the key functions of micro-segmentation.
Posted: 02 Sep 2015 | Premiered: 11 Sep 2014


Cloud-Based Communication Case Study: Upgrading TheLadders
sponsored by ThinkingPhones
WEBCAST: In this webcast case study, Nick Giordano, Technical Support Specialist at TheLadders, explains how his organization upgraded their infrastructure by transitioning from a legacy system to cloud-enabled business communications through a third-party service.
Posted: 01 Sep 2015 | Premiered: Aug 10, 2015


A Cloud-Enabled Communications Case Study: Platinum Partners
sponsored by ThinkingPhones
WEBCAST: In this webcast, Paul Poteat, Chief Technology Officer at Platinum Partners, briefly discusses how his organization accelerated its enterprise mobility with cloud communications services. View this video now to learn how to drive intelligent communications in your enterprise, using a cloud-enabled collaboration platform.
Posted: 01 Sep 2015 | Premiered: Jul 28, 2015


An Introduction to VMware NSX
sponsored by VMware
VIDEO: This video explains the benefits of a network virtualization and security platform for the software-defined data center.
Posted: 27 Aug 2015 | Premiered: 27 Sep 2013


Selecting a SIEM: Experiences from the Trenches
sponsored by LogRhythm, Inc.
WEBCAST: This webcast features a panel discussion that will give you practical insights from SIEM veterans to help you refine your security strategy.
Posted: 06 Aug 2015 | Premiered: Aug 6, 2015

LogRhythm, Inc.

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WEBCAST: In this webinar, three cyber security veterans discuss today's rapidly evolving cyber threat landscape and how you can detect advanced threats that normally go undetected.
Posted: 06 Aug 2015 | Premiered: Aug 6, 2015

LogRhythm, Inc.

Test-Drive a Comprehensive Security Platform
sponsored by AlienVault
SOFTWARE DEMO: This trial software allows you to sample a security platform that gives you all the tools you need to secure yourself against today's advanced threats.
Posted: 30 Jul 2015 | Premiered: 30 Jul 2015


Managing Security Threats in Today's Mobile Enterprise
sponsored by BlackBerry
WEBCAST: This video tackles the issue of mobile security and discusses how, despite the multitude of threats facing mobile devices, you can ensure your enterprise remains secure.
Posted: 14 Jul 2015 | Premiered: Jul 14, 2015


Strengthening Security From the Inside Out
sponsored by Mimecast
WEBCAST: Listen to guest speaker Nick Hayes from Forrester Research and Steve Malone from Mimecast for insight into how technology and awareness together can strengthen defenses.
Posted: 26 Jun 2015 | Premiered: Jun 10, 2015


Unlock Your Customer Identities: Virtualize SQL to Deliver Better Security and Services
sponsored by Radiant Logic, Inc.
WEBCAST: This webinar explains how a common identity service for all constituents can improve security and deliver better services to your customers.
Posted: 25 Jun 2015 | Premiered: Mar 9, 2015

Radiant Logic, Inc.

Enabling Competitive Advantage in the Digital Experience
sponsored by Verizon
VIDEO: This short, lighthearted video serves as an introduction to a digital experience service that can help you grown and prevent disruptions.
Posted: 25 Jun 2015 | Premiered: 22 Jan 2015


Software-Defined Security and the Agile Data Center
sponsored by CloudPassage
WEBCAST: On this webinar, you'll hear from Neil MacDonald, VP Distinguished Analyst from Gartner Research, and CloudPassage's Co-founder and Chief Strategy Officer, Carson Sweet. They'll share insights into the changes required for security and compliance in the new, more agile data center.
Posted: 22 Jun 2015 | Premiered: Jun 22, 2015


Case Study: How Federal Agencies Secure Critical Information
sponsored by Fortinet, Inc.
WEBCAST: This brief webcast to learn how U.S. federal agencies are securing their network perimeter and core against insider and outside threats. View now to uncover how to ensure end-to-end security to avoid data breaches.
Posted: 15 Jun 2015 | Premiered: Apr 8, 2015

Fortinet, Inc.

Protection Against the Three Vectors of a Healthcare Cyberattack
sponsored by Fortinet, Inc.
WEBCAST: In this webinar, examine the top security threats and vulnerabilities facing healthcare today as well as strategies to overcome these challenges.
Posted: 12 Jun 2015 | Premiered: Jun 3, 2015

Fortinet, Inc.

NGFW 101: What Is It and Why Should You Care?
sponsored by Fortinet, Inc.
WEBCAST: This webcast presents and explores the basics of next-gen firewalls (NGFW). View now to learn what makes a firewall a next-gen firewall, the challenges and benefits of adopting NGFWs, and more.
Posted: 12 Jun 2015 | Premiered: May 4, 2015

Fortinet, Inc.

Reducing Network Complexity with a Next Generation Firewall
sponsored by Fortinet, Inc.
WEBCAST: View this brief whiteboard video to learn the additional capabilities next-gen firewalls (NGFW) provide such as application, user, or device control as well as IPS and web filtering. Access this resource now to learn the 3 key requirements to choosing NGFW as well as quick tips for evaluating platforms.
Posted: 10 Jun 2015 | Premiered: Jun 3, 2015

Fortinet, Inc.

Advanced Threat Protection: Why an Integrated Approach is Your Game Changer
sponsored by Fortinet, Inc.
WEBCAST: This brief webcast explores a tri-layered security approach that integrates sandboxing with more traditional technologies to thwart hidden threats. View now to learn how to effectively use sandboxing technology in your network security strategy.
Posted: 05 Jun 2015 | Premiered: May 20, 2015

Fortinet, Inc.

Breaking the Kill Chain of Advanced Attacks
sponsored by Fortinet, Inc.
WEBCAST: This brief webcast explores how to augment and enhance the performance of the kill chain with a 3-pronged network security approach. View now to learn how to expose hidden and unknown threats to avoid becoming the next breach victim
Posted: 05 Jun 2015 | Premiered: Dec 31, 2014

Fortinet, Inc.

Network Security from the Inside: Understanding the New Model of Firewall
sponsored by Fortinet, Inc.
WEBCAST: This 90-second whiteboard video illustrates how an internal network firewall (INFW) defends data from inside the network. Watch now to uncover the three critical criteria an INFW needs to meet to ensure network security.
Posted: 05 Jun 2015 | Premiered: Jun 3, 2015

Fortinet, Inc.

New Capabilities of Next-Gen Firewalls
sponsored by Dell Software
VIRTUAL ENVIRONMENT: This virtual environment explores why firewalls that are only 2-3 years old are failing to protect organizations from malware and other cybercrime attacks.
Posted: 01 Jun 2015 | Premiered: 10 Dec 2014

Dell Software
26 - 50 of 150 Matches Previous Page    1 2 3 4 5    Next Page
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement