IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
1 - 25 of 762 Matches Previous Page  |  Next Page
The Business Value of Securing and Authenticating Wireless and Wired Network Users
sponsored by Aruba Networks
WHITE PAPER: Network access control (NAC) is being largely seen as the answer to faster network security when it comes to dealing with the massive influx of mobile devices. This IDC report gives you what you need to plan your NAC strategy. You will get an overview of market trends, demographics, the business value a NAC system can help you realize, and more.
Posted: 26 Jun 2017 | Published: 29 Dec 2016

Aruba Networks

Advanced SD-WAN: Accelerating Digital Transformation and Powering the Cloud-Connected Enterprise
sponsored by Silver Peak
WHITE PAPER: With cloud becoming more of a factor in business networking, many are now looking to WAN and SD-WAN to help connect their business. This IDC report discusses the current state of SD-WAN and why so many organizations are scrutinizing it. Find out what benefits these organizations expect SD-WAN to deliver, several use cases, and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Silver Peak

Evaluation Guide: Criteria for Choosing an Enterprise SSL VPN
sponsored by Array Networks
WHITE PAPER: Download this SSL VPN evaluation guide to help identify, describe and prioritize the criteria you should consider when selecting an SSL VPN solution that best fits the needs of your organization.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Array Networks

Array Networks: The Network Functions Platform Company
sponsored by Array Networks
WHITE PAPER: Learn how Array Networks empowers enterprise NFV adoption through the flexibility of cloud and virtualization, the performance of purpose-built appliances, best-of-breed networking, security and app delivery funcitons, and more.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Array Networks

Pervasive Visibility Platform – A New Approach to Network Monitoring
sponsored by Gigamon
WHITE PAPER: Learn how to use a 4-tiered visibility platform to update your network monitoring and management toolset for SDN and NFV, driven by actionable data for traffic intelligence, orchestration, network security, and more.
Posted: 20 Jun 2017 | Published: 31 Mar 2017

Gigamon

Connecting the Cloud with On-Demand Infrastructure
sponsored by Telehouse
WHITE PAPER: Traditional networking models do not match the needs or expectations of cloud-focused businesses. Learn how you can make your network infrastructure cloud-ready.
Posted: 14 Jun 2017 | Published: 31 Mar 2017

Telehouse

Rackspace Fanatical Support for AWS
sponsored by Rackspace
WHITE PAPER: With everyone moving workloads to AWS, network security paradigms are shifting. This paper will discuss AWS security constructs and describe how they contribute to an overall security posture, and the new, non-siloed AWS governance model.
Posted: 08 Jun 2017 | Published: 06 Feb 2017

Rackspace

A Proactive Approach to Network Operations Management and Cost Reduction
sponsored by Indeni
WHITE PAPER: Explore how to create a real-time window into network health and stability, and reduce the amount of time spent on troubleshooting the seemingly never-ending stream of network issues. Learn how to navigate the myths of using automation in network monitoring and security.
Posted: 06 Jun 2017 | Published: 06 Jun 2017


Effective Business Bandwidth Management
sponsored by GFI
WHITE PAPER: Explore how to maximize your network's performance by addressing the blind spots that devices like bandwidth shapers and traditional performance management tools overlook.
Posted: 02 Jun 2017 | Published: 31 Dec 2016

GFI

Data Exfiltration and DNS – Closing Back-Door Access to Your Sensitive Data
sponsored by Infoblox
WHITE PAPER: DNS is increasingly being used as a pathway for data exfiltration either by malware-infected devices or by malicious insiders. This paper lays out the tactics hackers use to exploit DNS for purposes of DNS tunneling and data exfiltration.
Posted: 31 May 2017 | Published: 31 May 2016

Infoblox

A MOBILE-FIRST NETWORK: IS IT TIME?
sponsored by Aruba Networks
WHITE PAPER: Explore how an integrated, mobile-first network built around 802.11ac can provide SMBs with a higher performing, secure network. Discover how to implement wireless and wired infrastructure with end-to-end security, network performance analysis, simple cloud management, and more.
Posted: 31 May 2017 | Published: 31 Dec 2016

Aruba Networks

Securing the Evolving Enterprise Network – Inside and Out
sponsored by Aruba Networks
WHITE PAPER: This ESG white paper delves into the current state of network security and the complexities of working with mobile, cloud, IoT, and digital transformation. Uncover key lessons about "closed-loop" network security with visibility into all devices, centralized policy management, and user and entity behavior analytics.
Posted: 30 May 2017 | Published: 30 Apr 2017

Aruba Networks

Information Protection in the Web and Cloud Era
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Explore a modern approach to data protection in the web and cloud era. Uncover 5 requirements for a modern DLP tool.
Posted: 26 May 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

The Security Benefits of Web Proxies
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: The web is central to the way we work, live, and play – and therefore it is also a focal point for cybercrime. Explore the functionality of web proxies and how you can use them to build a comprehensive defense against advanced web threats.
Posted: 26 May 2017 | Published: 26 May 2017

Symantec & Blue Coat Systems

Making Networks SDN-Ready with Segment Routing
sponsored by Cisco Systems, Inc.
WHITE PAPER: This Heavy Reading Report explains why segment routing has emerged as a highly promising and practical tool to end the network issues surrounding SDN.
Posted: 25 May 2017 | Published: 31 Jan 2017

Cisco Systems, Inc.

Toolkits, Apps, & Services Used Today to Launch DDoS Attacks
sponsored by A10 Networks
WHITE PAPER: This paper delves down into what DDoS attacks are and how they work. Learn about the different types of DDoS attacks and the tools, apps, and services attackers take advantage of to get past your security measures and infect your network.
Posted: 24 May 2017 | Published: 24 May 2017

A10 Networks

On the Radar: Bayshore Networks Protects the Industrial Internet of Things
sponsored by Bayshore Networks
WHITE PAPER: This Ovum report details how to get the network security you need to combat the dangers the Industrial Internet of Things presents.
Posted: 24 May 2017 | Published: 22 Feb 2016

Bayshore Networks

The Internet of Relevant Things
sponsored by Aruba Networks
WHITE PAPER: The Internet of Things (IoT) term itself can be misleading, so it is important to consider one thing before going into a project: relevancy. Access this white paper to learn how to evaluate your IoT projects for business relevancy and better manage projects with secure networking without compromising usability.
Posted: 17 May 2017 | Published: 18 Jan 2017

Aruba Networks

SD-WAN 101: What It Is, What It Does, Why You Need to Know Now
sponsored by Windstream Communications
WHITE PAPER: Learn what you need to know about SD-WAN in this resource, including what it is, what it does and the benefits it can offer your enterprise.
Posted: 16 May 2017 | Published: 01 Feb 2017

Windstream Communications

Securing Digital Healthcare Communities — Addressing 10 Common Security Challenges
sponsored by Cisco Umbrella
WHITE PAPER: In this whitepaper, uncover 10 common security challenges that healthcare organizations are facing today, including malware, legacy applications support, IoT, and more.
Posted: 16 May 2017 | Published: 16 May 2017

Cisco Umbrella

Get Your Network and Security Digital-Ready
sponsored by Aruba Networks
WHITE PAPER: This white paper explores how to get your network ready to handle the demands of a digital workplace for modern user experiences, security, and innovation. Learn how to update your enterprise mobility and IoT strategies and uncover 6 steps for prepping your network.
Posted: 16 May 2017 | Published: 16 May 2017

Aruba Networks

Maximize Productivity with Secure Delivery of Apps to Mobile Devices
sponsored by Citrix
WHITE PAPER: Explore a simple, secure, and unified way to deliver all types of apps to any device that employees use to execute critical functions. Learn how Citrix NetScaler makes it easy for users to access apps from any device – including mobile platforms like laptops or smartphones – without sacrificing security or increasing complexity.
Posted: 15 May 2017 | Published: 31 Dec 2016

Citrix

Achieve Centralized Visibility and Management for Multivendor Access Networks
sponsored by Aruba Networks
WHITE PAPER: In order to proactively optimize network performance, strengthen network security, and improve end-user experiences, find out how to leverage Aruba AirWave to achieve centralized visibility and control for multivendor access networks.
Posted: 15 May 2017 | Published: 15 May 2017

Aruba Networks

Why Outsource your DNS
sponsored by Dyn
WHITE PAPER: Learn the top four reasons to outsource your DNS in this resource.
Posted: 12 May 2017 | Published: 30 Dec 2016

Dyn

Array Purpose-Built SSL VPN Overview
sponsored by Array Networks
WHITE PAPER: Learn about the issues with SSL VPN firewall integration and how to overcome them in this white paper.
Posted: 31 May 2017 | Published: 28 Feb 2017

Array Networks
1 - 25 of 762 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement