IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Multimedia (View All Report Types)
51 - 75 of 150 Matches Previous Page  |  Next Page
Security on the Edge Classroom
sponsored by
VIRTUAL ENVIRONMENT: This classroom looks at enterprise strategies for network perimeter defense and next generation tools such as network access control, single sign-on, encryption certificates and more.
Posted: 05 May 2015 | Premiered: 04 May 2015

Security case study: Improving your network visibility
sponsored by Gigamon
VIDEO: This case study introduces a new security approach used by the University of Glasgow, a renowned academic institution, which improves network visibility and security without adding on expensive appliances. View now to learn how to detect and remedy infected endpoints, among other solutions.
Posted: 13 Apr 2015 | Premiered: 25 Feb 2015


SSL Decryption for Greater Threat Visibility
sponsored by Gigamon
WEBCAST: This webcast explores a new approach to SSL security and decryption.  View now to learn more and how to enhance your current security solutions.
Posted: 09 Apr 2015 | Premiered: Oct 28, 2014


SIEM Battleground Unfolds Security School
sponsored by
VIRTUAL ENVIRONMENT: This classroom looks at next-generation security information and event management (SIEM), analytic tools and cloud-based systems designed to help CISOs make sense of security data.
Posted: 05 Mar 2015 | Premiered: 16 Mar 2015

Web Security Meets DDoS Security School
sponsored by
VIRTUAL ENVIRONMENT: In this virtual environment, John Pescatore of SANs Institute explores new DDoS attack vectors and discusses how you can protect yourself from them.
Posted: 18 Feb 2015 | Premiered: 20 Feb 2015

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

Next-Generation Firewalls: Breaking Through the Hype
sponsored by
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 01 Feb 2015 | Premiered: 10 Dec 2013

Security School: Defending Against DDoS Attacks
sponsored by
VIRTUAL ENVIRONMENT: This Security School lesson reviews recent cases of DOS attacks, what happened and why, and the lessons you can learn in devising the best DoS defense.
Posted: 15 Aug 2014 | Premiered: 15 Aug 2014

Next-Generation Firewalls Classroom
sponsored by
VIRTUAL ENVIRONMENT: Discover the NGFW tools currently available and the demands enterprises are placing on vendors to supply the tools they need to protect their assets in an increasingly vulnerable world.
Posted: 20 Jun 2014 | Premiered: 20 Jun 2014

Discover how to Optimize your SIEM
sponsored by
VIRTUAL ENVIRONMENT: This Security classroom explores how to enhance and extend SIEM technology to effectively support incident response.
Posted: 14 May 2014 | Premiered: 14 May 2014

Security University: New network security architecture
sponsored by
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

Securing Data After a Hack
sponsored by Hewlett-Packard Enterprise
WEBCAST: This brief video explores how one company learned from a past security breach and now is focusing more time and money towards system security.
Posted: 13 Feb 2014 | Premiered: Oct 3, 2013

Hewlett-Packard Enterprise

Collaboration: Delivering a More Dynamic, Secure Mobile Workforce
sponsored by Hewlett-Packard Enterprise
VIDEO: Take 30 seconds out of your day to see why GE is securely penetrating their emerging markets and enabling customers to take advantage of their services. Watch this video to learn more.
Posted: 12 Feb 2014 | Premiered: 12 Feb 2014

Hewlett-Packard Enterprise

Enterprise Mobility University: Mobile Device Management and BYOD Classroom
sponsored by
VIRTUAL ENVIRONMENT: This classroom will provide a mobile landscape overview, along with strategies for staying afloat in this BYOD era.
Posted: 06 Sep 2013 | Premiered: 16 Aug 2013

Forrester on Addressing IT Challenges in Today's Mobile World
sponsored by Commvault
WEBCAST: In this webcast, Rachel Dines, senior analyst at Forrester Research, discusses the effect that data growth is having on an ever-changing IT landscape, and how the future will be defined by flexible solutions featuring converged backup and archive.
Posted: 30 Dec 2014 | Premiered: Feb 28, 2013


Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
sponsored by Symantec Corporation
WEBCAST: Tune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
Posted: 12 May 2014 | Premiered: Mar 4, 2014

Symantec Corporation

About APCON – Intelligent Network Monitoring Solutions
sponsored by APCON, Inc.
VIDEO: This video introduces APCON, who develop industry-leading scalable network switching solutions that provide complete network visibility, improved network security, and optimized monitoring tool efficiency.
Posted: 09 May 2014 | Premiered: 09 Apr 2014


Web Security – Virtual Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.

Cisco Visual Networking Index Global Mobile Data Traffic Forecast for 2013 to 2018
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage outlines some top trends in mobile data trafficking and explains how this will affect the way IT departments deal with the rising traffic.
Posted: 04 Apr 2014 | Premiered: 05 Feb 2014

Cisco Systems, Inc.

Reducing Your Patch Cycle to Less Than 5 Days
sponsored by Tenable Network Security
WEBCAST: This informative webcast explores the challenges of vulnerability management and creative solutions to help you fully leverage your vulnerability management process and reduce your patch cycle.
Posted: 27 Sep 2013 | Premiered: Sep 3, 2013

Tenable Network Security

Podcast: Rethink Your Strategy with a Network Monitoring Switch
sponsored by Ixia
PODCAST: This podcast discusses a practical, five-step approach for organizations to get the most from their network and security monitoring tools.
Posted: 20 Sep 2013 | Premiered: Sep 19, 2013


Rethink Your Strategy with a Network Monitoring Switch
sponsored by Ixia
WEBCAST: Organizations worldwide are deploying best practices and turning to a network monitoring switch to provide the visibility, control, performance and security required for today's networks. Watch this webcast to learn about a practical, five-step approach for organizations to get the most from their network and security monitoring tools.
Posted: 20 Sep 2013 | Premiered: Sep 17, 2013, 14:00 EDT (18:00 GMT)


Reducing Security Complexity
sponsored by Optus Business
VIDEO: In this webcast, you will be provided with a high level overview of the emerging threats within the Australian security landscape and how these affect midsized organisations.
Posted: 04 Sep 2013 | Premiered: 27 Aug 2013

Optus Business

Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.

Simplify Network Monitoring with Ixia Anue NTO
sponsored by Ixia
VIDEO: Are you ready to make network monitoring simple and secure again? View this video to learn about a solution that can help you achieve just that.
Posted: 03 Sep 2013 | Premiered: 03 Sep 2013

51 - 75 of 150 Matches Previous Page    1 2 3 4 5 6    Next Page
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement