IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Multimedia (View All Report Types)
26 - 50 of 126 Matches Previous Page  |  Next Page
Best Practices for Eliminating SSL Encrypted Traffic Blind Spots
sponsored by Blue Coat Systems
WEBCAST: Learn how to apply policies and protection to combat threats hidden in HTTPS traffic and applications in this helpful webcast.
Posted: 19 Feb 2016 | Premiered: Jan 22, 2016

Blue Coat Systems

Threat intelligence
sponsored by
VIRTUAL ENVIRONMENT: This security school looks at what a threat intel service can and cannot provide and discusses the status of the new(ish) standards for intelligence exchange.
Posted: 20 Jan 2016 | Premiered: 15 Jan 2016

2016 Prediction in Cybercrime
sponsored by WatchGuard Technologies, Inc.
VIDEO: Watch this video to get a glimpse into what cybercrime will look like in the coming year.
Posted: 20 Jan 2016 | Premiered: 16 Dec 2015

WatchGuard Technologies, Inc.

Bolster Network Security for the Latest Social Engineering Tactics
sponsored by WatchGuard Technologies, Inc.
VIDEO: This brief video explores customized social engineering tactics that can compromise your network security. Tune in for a quick security recommendation that get you up to speed on the latest social engineering techniques.
Posted: 19 Jan 2016 | Premiered: 10 Dec 2015

WatchGuard Technologies, Inc.

Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 01 Oct 2015 | Premiered: May 12, 2015

WhiteHat Security

Free Download: Real-Time, Comprehensive Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: Thankfully, this free trial gives you the opportunity to experiment with a comprehensive unified security management product.
Posted: 08 Apr 2015 | Premiered: 08 Apr 2015


Next-Generation Firewalls Classroom
sponsored by
VIRTUAL ENVIRONMENT: Discover the NGFW tools currently available and the demands enterprises are placing on vendors to supply the tools they need to protect their assets in an increasingly vulnerable world.
Posted: 20 Jun 2014 | Premiered: 20 Jun 2014

Discover how to Optimize your SIEM
sponsored by
VIRTUAL ENVIRONMENT: View this security classroom and learn how to enhance and extend your SIEM technology so it effectively supports incident response. Discover how to assess the variety of vendor products, what noncommercial sources to consider, what costs are involved, and how much heavy lifting is required.
Posted: 14 May 2014 | Premiered: 14 May 2014

Security University: New network security architecture
sponsored by
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

Testimonial: Network Infrastructure and Security
sponsored by A10 Networks
VIDEO: Watch this video testimonial and learn how one CIO took advantage of network management tools to optimize the infrastructures and security of companies worldwide.
Posted: 15 Feb 2016 | Premiered: 02 Feb 2015

A10 Networks

Behavioral Analytics: Telling the Stories Hidden in IT Security and Operations Data
sponsored by Prelert
WEBCAST: In this webcast, learn how to go beyond anomaly detection with behavioral analytics and insights. Discover how to investigate commonalities between anomalies to better understand and identify potential threats.
Posted: 02 Feb 2016 | Premiered: Jan 27, 2016


Behavioral Analytics: Let Your Data Tell the Story
sponsored by Prelert
WEBCAST: In this brief webcast, learn how to analyze log data, find anomalies, and like them together faster. Uncover the steps to understand not only what happened in an incident, but how it happened as well. View now to learn more.
Posted: 02 Feb 2016 | Premiered: Jan 20, 2016


The Four Horsemen of Mobile Security
sponsored by Skycure
WEBCAST: In this webcast, hear from security professionals as they explore today's mobile threat landscape and describe alternative security strategies.
Posted: 03 Dec 2015 | Premiered: Jun 25, 2015


A Definitive Guide to Windows 10 Management
sponsored by VMware
WEBCAST: This webcast examines the impact W10 will have on enterprise mobility in the next 5 years. Access this video to redefine your mobility management strategy with W10, and reap the benefits of its cloud-based management capabilities.
Posted: 02 Dec 2015 | Premiered: Dec 2, 2015


Continuous Testing: How to Streamline Performance, Regression, and Security Testing
sponsored by Citrix and NRG Global
WEBCAST: This webinar reveals how you can use a continuous testing strategy to incorporate any alterations into your environment quickly and with confidence.
Posted: 26 Oct 2015 | Premiered: Nov 4, 2015

Citrix and NRG Global

Advanced Threat Protection: Why an Integrated Approach is Your Game Changer
sponsored by Fortinet, Inc.
WEBCAST: Explore a tri-layered security approach that integrates sandboxing with more traditional technologies to thwart hidden threats. Access this brief webcast to learn how to effectively use sandboxing technology in your network security strategy.
Posted: 05 Jun 2015 | Premiered: May 20, 2015

Fortinet, Inc.

Machine Learning Anomaly Detection for IT Ops
sponsored by Prelert
VIDEO: Discover how an anomaly detection solution can not only notify an enterprise when there is a problem, but also narrow down the causes so a fix can be created quickly. Learn how this solution zeros-in on vital information and sifts through bulky data quickly to resolve, in real-time, issues that can cripple an enterprise's operations.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015


Security Analytics: Anomaly Detection for IT Security
sponsored by Prelert
VIDEO: Watch this video to learn how anomaly detection systems use advanced analytics to uncover even the subtlest cybercriminals.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015


Next-Generation Firewalls: Breaking Through the Hype
sponsored by
VIRTUAL ENVIRONMENT: This SearchSecurity School resource cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 01 Feb 2015 | Premiered: 10 Dec 2013

Forrester on Addressing IT Challenges in Today's Mobile World
sponsored by Commvault
WEBCAST: In this webcast, Rachel Dines, senior analyst at Forrester Research, discusses the effect that data growth is having on an ever-changing IT landscape, and how the future will be defined by flexible solutions featuring converged backup and archive.
Posted: 30 Dec 2014 | Premiered: Feb 28, 2013


Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
sponsored by Symantec Corporation
WEBCAST: Tune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
Posted: 12 May 2014 | Premiered: Mar 4, 2014

Symantec Corporation

About APCON – Intelligent Network Monitoring Solutions
sponsored by APCON, Inc.
VIDEO: This video introduces APCON, who develop industry-leading scalable network switching solutions that provide complete network visibility, improved network security, and optimized monitoring tool efficiency.
Posted: 09 May 2014 | Premiered: 09 Apr 2014


Web Security – Virtual Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.

Cisco Visual Networking Index Global Mobile Data Traffic Forecast for 2013 to 2018
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage outlines some top trends in mobile data trafficking and explains how this will affect the way IT departments deal with the rising traffic.
Posted: 04 Apr 2014 | Premiered: 05 Feb 2014

Cisco Systems, Inc.

Reducing Your Patch Cycle to Less Than 5 Days
sponsored by Tenable Network Security
WEBCAST: This informative webcast explores the challenges of vulnerability management and creative solutions to help you fully leverage your vulnerability management process and reduce your patch cycle.
Posted: 27 Sep 2013 | Premiered: Sep 3, 2013

Tenable Network Security
26 - 50 of 126 Matches Previous Page    1 2 3 4 5    Next Page
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement