IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
1 - 25 of 826 Matches Previous Page  |  Next Page
5 Ways to Manage Mobility and IOT Risks
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper, learn the five steps you need to take to mitigate the risk of mobile and IoT-enabled data breaches.
Posted: 24 Mar 2017 | Published: 30 Dec 2016

Hewlett Packard Enterprise

Endpoint Visibility For Wired And Wireless
sponsored by Hewlett Packard Enterprise
WHITE PAPER: With the billions of IoT devices expected to connect to networks in the next three years there is a warranted demand among IT professionals for real-time visibility and reporting. In this white paper, learn how you can get the real-time, endpoint visibility and reporting you need keep up with IoT and BYOD.
Posted: 24 Mar 2017 | Published: 30 Nov 2016

Hewlett Packard Enterprise

The Customer Journey to SD-WAN: Functional, Technical, and Economic Considerations
sponsored by TATA Communications
WHITE PAPER: Is SD-WAN right for your network? This paper will help you determine just that. Find the 4 key determinants that early adopters have used to justify their investment, 3 SD-WAN architectures choices, and the major differences from your legacy WAN.
Posted: 22 Mar 2017 | Published: 30 Dec 2016

TATA Communications

Eight Toxic Networking Vendor Selection Philosophies
sponsored by Extreme Networks
WHITE PAPER: This Forrester Research report reveals eight common statements that organizations use to rationalize their poor network choices. Discover each invalid justification for continuing to work with network vendors and infrastructure that just don't work for you.
Posted: 21 Mar 2017 | Published: 13 Jul 2016

Extreme Networks

SD-WAN: Functional, Technical, and Economic Considerations
sponsored by TATA Communications
WHITE PAPER: Change is on the wind and business needs are mounting up, demanding more and more from your network than ever. In this white paper, learn if moving to SD-WAN might be a smart move for your organization.
Posted: 20 Mar 2017 | Published: 20 Mar 2017

TATA Communications

Deploying an Adaptable NFV Infrastructure
sponsored by Red Hat
WHITE PAPER: Network functions virtualization (NFV) helps communications service providers take advantage of new market opportunities faster and more efficiently while cutting costs and preparing their infrastructure for the future. In this short white paper, learn how to deploy NFV and provide your organization with increased infrastructure performance.
Posted: 16 Mar 2017 | Published: 30 Dec 2016

Red Hat

How IT Leaders Combine Network Analytics with Automated Control and Management
sponsored by Extreme Networks
WHITE PAPER: Businesses that have issues with network performance and reliability often point to a lack of visibility into their network infrastructure as the root cause. But getting the visibility needed to rectify these issues isn't as difficult as it may seem. This white paper discusses the how you can overcome lackluster network visibility.
Posted: 16 Mar 2017 | Published: 29 Jul 2016

Extreme Networks

The Different Types of Cyber-Attacks and How to Prevent Them
sponsored by SonicWall
WHITE PAPER: This e-book explores four primary strategies cybercriminals use to infiltrate your network, and best practices for countering them. Learn how you can successfully combat common cyber-attacks ransomware, encrypted attacks and more.
Posted: 10 Mar 2017 | Published: 30 Dec 2016

SonicWall

SD-WAN: A Simplified Network for Distributed Enterprises
sponsored by Citrix
WHITE PAPER: Discover how SD-WAN delivers to the demands of distributed enterprises, including bandwidth savings and architecture optimized for cloud. Download to learn how to integrate SD-WAN with your existing architecture, view 3 key factors to consider when evaluating deployment, SD-WAN vs. MPLS cost comparison, and more.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

Citrix

A Massively Scalable Approach to Network Security
sponsored by SonicWall
WHITE PAPER: This white paper details a better approach to network security: an innovative network-based model for massively scaling a next-generation firewall that can address today's network needs and provide increased performance, higher resiliency and lower TCO.
Posted: 10 Mar 2017 | Published: 30 Dec 2016

SonicWall

Eight Ways to Protect Your Network Against Ransomware
sponsored by SonicWall
WHITE PAPER: This e-book provides eight ways you can protect your network against ransomware attacks and avoid giving your money to cybercriminals.
Posted: 10 Mar 2017 | Published: 30 Dec 2016

SonicWall

SD-WAN: From Zero Touch Provisioning to Secure Business Intent
sponsored by Silver Peak
WHITE PAPER: Essential requirements for software-defined WANs (SD-WANs) include granular visibility into both legacy and cloud applications, as well as centrally assigned business intent policies to secure and control all WAN traffic. In this white paper, learn about Silver Peak's SD-WAN solution that can help you provide this functionality and more.
Posted: 09 Mar 2017 | Published: 30 Dec 2016

Silver Peak

Easy Cloud for Hybrid IT
sponsored by Aviatrix Systems
WHITE PAPER: Migrating to the hybrid cloud can present challenges like complex network configuration, new security risks and difficult data integration. But is it worth it? This white paper explores the benefits, risks, and challenges of hybrid cloud networking.
Posted: 07 Mar 2017 | Published: 30 Dec 2016

Aviatrix Systems

The Value of Network Penetration Testing
sponsored by Dell SecureWorks
WHITE PAPER: Penetration tests are a critical part in identifying vulnerabilities in your network and IT environment that a scanner will not pick up. This concise white paper provides practical information to consider as you determine the proper testing needed to strengthen and improve your network's security posture.
Posted: 06 Mar 2017 | Published: 30 Dec 2016

Dell SecureWorks

Managing Cybersecurity Risk: How Directors and Corporate Officers Can Protect Their Businesses
sponsored by BAE Systems
WHITE PAPER: Go beyond simple risk management by implementing cybersecurity practices designed not only to prevent breaches but anticipate the damage and recover from attacks. Discover how to bolster endpoint security and data loss prevention by identifying potential attackers to improve your organization's threat awareness and put the right tools in place.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

BAE Systems

Modernize Windows 10 Management and Security with Unified Endpoint Management
sponsored by vmware airwatch
WHITE PAPER: In today's increasingly mobile world, the risk of threats is spreading across devices and networks. In this white paper, learn about a new software designed to unite ITmanagement teams and consolidatetools, lower costs, increase IT efficiency,and harden enterprise security for Windows 10.
Posted: 03 Mar 2017 | Published: 03 Mar 2017

vmware airwatch

New Network Management Megatrends
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This Enterprise Management Associates (EMA) research summary examines several major areas of change and evolution affecting network management, or what EMA calls "megatrends." Inside, discover key network management findings on trends like hybrid cloud, IoT, outsourcing, and more.
Posted: 02 Mar 2017 | Published: 29 Apr 2016

Riverbed Technology, Inc.

Wi-Fi: Secure Enough for The Federal Government?
sponsored by HPE and Intel®
WHITE PAPER: As Wi-Fi continues to evolve, so does its security functionality. But is it secure enough to protect the US Federal Government? In this white paper, get a detailed, technical explanation of how modern enterprise Wi-Fi networks are secured, and whether Wi-Fi has the ability to fully protect the federal government.
Posted: 02 Mar 2017 | Published: 30 Sep 2016

HPE and Intel®

The Business Benefits of Hybrid Cloud Networking
sponsored by Aviatrix Systems
WHITE PAPER: This paper explores the challenges that enterprises face when building networks to support hybrid cloud and multi-cloud architectures, and how you can overcome them.
Posted: 02 Mar 2017 | Published: 31 Jan 2017

Aviatrix Systems

7 Essential Components of a Threat Intelligence Program
sponsored by Recorded Future
WHITE PAPER: The goal of threat intelligence is to reduce operational risk. Uncover critical concepts and practical details, where necessary, to produce a world-class threat intelligence capability from scratch.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

Recorded Future

Overview of the Secure Development Lifecycle
sponsored by APC by Schneider Electric
WHITE PAPER: Secure development lifecycle (SDL) is a process that keeps security in mind with every step of the app development process. Uncover an overview of SDL and 8 key practices that will enable your organization to design and build software securely.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

APC by Schneider Electric

8 Ways to Protect Your Network Against Ransomware
sponsored by Dell SonicWALL
WHITE PAPER: This e-book provides eight ways you can protect your network against ransomware attacks and avoid giving your money to cybercriminals.
Posted: 24 Feb 2017 | Published: 30 Dec 2016

Dell SonicWALL

Optimizing the Software-Defined Wide-Area Network
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper explores the concept of software-defined WAN and how to optimize it. Uncover the answers to essential questions, like: What does the expansion of the initial usage of SDN mean to CIOS? What should they do to make the most of SD-WAN? Plus, learn about 5 key advantages and the main challenges of SD-WAN.
Posted: 22 Feb 2017 | Published: 22 Feb 2017

Riverbed Technology, Inc.

11 ECM Vendors Researched, Analyzed, and Scored
sponsored by Box
WHITE PAPER: Before you pinpoint the ECM vendor that's best for you now and into the future, it's important to explore how ECM vendors have been trending over the last couple years. In this Forrester report from 2 years ago, 11 ECM software vendors were researched, analyzed, and scored. Discover who was leading the pack, and how the ECM landscape has evolved.
Posted: 21 Feb 2017 | Published: 28 Aug 2015

Box

Empowering the Mobile Workforce with MDM and EMM
sponsored by Snow Software
WHITE PAPER: This white paper examines a platform that provides both mobile device management (MDM) and enterprise mobile management (EMM) capabilities. Discover how to take your MDM and mobile app management to the next level by unlocking security features that allay IT concerns, creating transparency and insight into device and app use, and more.
Posted: 21 Feb 2017 | Published: 31 May 2016

Snow Software
1 - 25 of 826 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement