IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
1 - 25 of 853 Matches Previous Page  |  Next Page
Enhance Productivity with Managed Mobile Office Apps
sponsored by TechData Corporation
WHITE PAPER: In 2017, 90 per cent of enterprises will have two or more mobile operating systems to support. IT teams are under immense pressure to manage these systems and the influx of mobile devices that the age of BYOD has wrought. Access this white paper now to learn how to manage identities, devices, apps, and data from a single solution.
Posted: 05 May 2016 | Published: 31 Dec 2015

TechData Corporation

The Evolution of Wireless Business Continuity
sponsored by Accelerated Concepts
WHITE PAPER: Discover in this white paper how to avoid expensive outages and downtime that drastically impact your reputation by formulating a business continuity plan with first-class connectivity. Learn how to take advantage of the expanding IoT to back up your business-critical data, devices, and more.
Posted: 05 May 2016 | Published: 31 Jan 2016

Accelerated Concepts

IBM X-Force Threat Intelligence Quarterly – Q4 2015
sponsored by IBM
WHITE PAPER: This report highlights four key trends that were observed throughout 2015, including an increase in "onion-layered" security incidents, ransomware attacks and insider threats. Access now to figure out how your organization can easily find the footprints attackers leave behind.
Posted: 05 May 2016 | Published: 31 Dec 2015

IBM

Enterprise Campus Architectures—Transformed
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover in this resource the benefits of collapsing your entire enterprise network into a single platform—including guarantees of increased agility and improved user satisfaction. Read on to deploy cloud network architecture that accommodates your unending need for more bandwidth.
Posted: 05 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Discover the Best Ways to Manage Shadow IT
sponsored by Juniper Networks, Inc.
WHITE PAPER: Access this guide to discover the current trends driving the rise of shadow IT, exploring the drawbacks and benefits it offers, as well as learn how designing and building the right network is essential for your preferred shadow IT strategy.
Posted: 05 May 2016 | Published: 05 May 2016

Juniper Networks, Inc.

SD-WAN Solutions Brief
sponsored by Verizon
WHITE PAPER: The need for efficient and reliable cloud and mobile technologies is creating a demand for better application performance. Read on to learn how software-defined wide area network (SD-WAN) overcomes the obstacles and demands of mobile technologies, and how it is just the first step in aligning your IT with your business.
Posted: 04 May 2016 | Published: 30 Sep 2015

Verizon

Digitization Drives the Need for Application Strengthening
sponsored by Ixia
WHITE PAPER: This white paper discusses the changing business landscape as it moves into the digital era. In this IT-driven era, competitive advantage is based on an organization's ability to be agile and adapt to changes as well as to make rapid shifts to capture market transitions.
Posted: 04 May 2016 | Published: 01 Apr 2016

Ixia

Proving Change in Business Critical Environments
sponsored by Ixia
WHITE PAPER: This white paper shows you how to properly test your product to meet the challenges you're responsible for. Learn how to test your project end-to-end to ensure your network can handle a new application rollout and to make sure protocols are handled properly to the lowest level.
Posted: 04 May 2016 | Published: 01 Mar 2016

Ixia

Ensuring Document Security Across Any Device
sponsored by BlackBerry
WHITE PAPER: Mobile devices have become more common in the workplace and produced a goal of ensuring that sensitive documents can be shared and accessed securely from any device. Access this white paper to learn about a solution that circumvents device management and instead allows for management of the documents themselves.
Posted: 04 May 2016 | Published: 05 Apr 2016

BlackBerry

Top 3 Reasons Your Enterprise Network Matters More in the Cloud Era
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this guide, you will explore the top 3 IT trends that will impact your cloud strategy, and learn how to build a network that's 100% cloud-ready. Read on to prepare your network for high bandwidth demands, high SLAs, increased scalability and security requirements, and more.
Posted: 04 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Top 3 Ways to Modernize Your Enterprise Campus Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Are you prepared to secure campus and branch networks in your cloud-enabled enterprise? Discover in this expert white paper how to modernize your enterprise campus network by utilizing 3 proven, cloud-driven strategies. Read on for guidance on simplifying your network, adopting an open framework, and more.
Posted: 04 May 2016 | Published: 04 May 2016

Juniper Networks, Inc.

Internal Segmentation Firewall Deployment Guide
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper presents both a design approach as well as a reference architecture for implementing an firewall strategy for your enterprise.
Posted: 02 May 2016 | Published: 31 Dec 2015

Fortinet, Inc.

The Total Economic Impact Of Forcepoint’s SureView Insider Threat Single Company Analysis
sponsored by Forcepoint
WHITE PAPER: This white paper shows you an appliance-based security system that monitors and investigates internal threats across all endpoints and channel communications.
Posted: 02 May 2016 | Published: 01 Oct 2014

Forcepoint

Virtualization Best Practices Guide
sponsored by Kaspersky Lab
WHITE PAPER: This white paper shows you how to best protect your virtual desktops through a wide range of Windows-based environments. Choose the security approach that's best for your business' specific virtual needs.
Posted: 02 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

Expertise from Authorized Professional Services Providers, Available On-Demand
sponsored by Juniper Networks, Inc.
WHITE PAPER: Do you have a network project but no expertise on staff? Access this brochure to find available services for your network that are simple and fast, from posting your project to instant connection with the perfect partner and/or service provider that best suits your project goals and budget.
Posted: 02 May 2016 | Published: 02 May 2016

Juniper Networks, Inc.

GLOBAL BANK REDUCES SECURITY RISKS & REAPS COST BENEFITS OF OPEN SOURCE
sponsored by Black Duck Software
WHITE PAPER: This white paper shows you how to properly identify and implement OSS to fit your business' needs. Save time and money by automating the management of open source code from the point it enters your organization and through development.
Posted: 02 May 2016 | Published: 01 Apr 2016

Black Duck Software

What Is the Cost of One More Test?
sponsored by Ixia
WHITE PAPER: This white paper gives you up to date statistics on today's cyber threat landscape and shows you how you can get ahead with early prevention. Access now to see where other organizations failed and how you may better protect yourself against today's most dangerous attacks.
Posted: 02 May 2016 | Published: 01 Apr 2016

Ixia

Unlocking Business Success: The Five Pillars of User Risk Mitigation
sponsored by Forcepoint
WHITE PAPER: This white paper shows you how to embrace a BYOD policy for your organizations and best practices for visibility into all user activity. Access now to gain a formidable defense against both malicious and unintentionally harmful insiders.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Forcepoint

For Enterprise IT: Extend Your VPN to Bring Better Security, Performance, Reliability to the Cloud
sponsored by AT&T
WHITE PAPER: As clouds are increasingly being used to store business-critical applications and data, they become more likely targets for attacks. Using public Internet to access your clouds is like leaving a window open. Access this white paper to learn how to ensure security and shut attackers out with VPN-based connectivity for the cloud.
Posted: 29 Apr 2016 | Published: 20 Apr 2016

AT&T

Executive_Summary_DefendAgainstTheUndetected
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, you'll discover why you network must have a comprehensive internal and external solution designed to protect your perimeter, your core, your endpoint and everything else in-between. Access now to learn how you can more effectively detect, prevent and remediate harmful actors.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Data Theft Prevention The Key to Security, Growth & Innovation
sponsored by Forcepoint
WHITE PAPER: This white paper shows you a holistic approach to protecting your critical data. Learn about cybersecurity from a Data Theft Prevention perspective, which is broader in scope and more effective in defending sensitive information.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Forcepoint

Maximize Efficiency by Simplifying Your Network Management
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover in this paper how to leverage a next-generation cloud infrastructure to deliver to your organization greater network agility, enabling you to capitalize on advances in virtualization. Access now and learn how to simplify your network management to achieve business goals.
Posted: 29 Apr 2016 | Published: 29 Apr 2016

Juniper Networks, Inc.

Six Steps To A Better Security Strategy
sponsored by AllClear ID
WHITE PAPER: In this white paper, you'll learn six steps to create an effective security strategy that's linked with key business interests for great success.
Posted: 29 Apr 2016 | Published: 22 Jan 2016

AllClear ID

Protecting_Against_APTs_minibook
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper helps you better understand the security challenges that businesses face today. Access now to learn insight from a range of industry analysts, consultants and hands-on experts on how they believe you should tackle your security problems.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Best Practices for Protecting Patient Data in the Cloud
sponsored by Digital Guardian
WHITE PAPER: Now that many healthcare organizations are using cloud computing to store and share sensitive patient information, they must figure out how to extend data loss prevention (DLP) strategies to include cloud storage. Discover best practices for applying DLP to the cloud.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Digital Guardian
1 - 25 of 853 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement