IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
1 - 25 of 790 Matches Previous Page  |  Next Page
Networking Checklist: Follow the Steps of Industry Peers
sponsored by Spectrum Enterprise
WHITE PAPER: When networking technology challenges are daunting and you need a new strategy, some of the best guidance comes from those who've been there. Learn from industry peers on how to overcome technology challenges and enable business growth.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Spectrum Enterprise

Protecting Data in the Healthcare Industry
sponsored by Mimecast
WHITE PAPER: The healthcare industry finds itself under cyberattack from many vectors, including ransomware, malware and targeted attacks. Read this white paper to determine strategies to secure your data.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Mimecast

Ambushed By Data
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: This recent survey of 233 security professionals takes a look into the security gaps that still plague the market. Uncover the results to the questions posed to these professionals and an analysis of their relevance.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Arctic Wolf Networks, Inc.

Is the Network the New Firewall?
sponsored by Verizon
WHITE PAPER: Learn how threat intelligence and network analytics performed at your network provider's level can help to head off attacks before they even reach your firewalls.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Verizon

Migrating to an Intelligent Hybrid Network? It's a Virtual Evolution.
sponsored by Verizon
WHITE PAPER: Learn how to take a hybrid networking approach that incorporates SD-WAN and virtualization to help you manage traffic and control access to the cloud without driving up costs or sacrificing app performance and security.
Posted: 17 Aug 2017 | Published: 31 Dec 2016

Verizon

Digital Advisory Services: Map out Your Software Defined Networking Journey
sponsored by Verizon
WHITE PAPER: With SD-WAN and virtualization, you can quickly scale your environment, centralize management, maintain security, and control costs better – but it can be hard to get started. Learn about a SD-WAN Awareness Workshop that's designed to help deepen your understanding of SD-WAN, its challenges, use cases, and beyond.
Posted: 17 Aug 2017 | Published: 31 Dec 2016

Verizon

Addressing Today's Endpoint Security Challenges
sponsored by Citrix
WHITE PAPER: Endpoint security has become a major issue for enterprise IT as business mobility and BYOD render traditional perimeter based protection ineffective. Read this white paper to uncover key strategies for mobile and endpoint security, including multilayered protection for apps, data, devices and networks.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Citrix

Insider Threats to Financial Services
sponsored by Recorded Future
WHITE PAPER: More companies than ever before are seeking insider threat detection and prevention processes and tools. Read this white paper to uncover benefits from insider threat detection as well as prevention processes and tools.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Recorded Future

Passive Optical LAN for Hospitality, Communications, and Entertainment Services
sponsored by Nokia
WHITE PAPER: Learn how to support guest services with POL to improve hotel operations and guest experiences. Discover how POL and GPON outperform Ethernet LAN in a variety of areas to enhance network capacity, costs, security, energy use, and more.
Posted: 14 Aug 2017 | Published: 14 Aug 2017

Nokia

The Role of Automation in Optimizing Network Performance and Security
sponsored by FireMon
WHITE PAPER: As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

FireMon

How to Scale for IoT Connectivity
sponsored by Aeris
WHITE PAPER: Discover how to create a M2M and IoT connectivity strategy that suits not only the needs of today but scales for the demands of tomorrow. Read on to learn about 3 traits to look for in an IoT partner and 3 IoT connectivity case studies.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Aeris

Automated, Real-time Risk Analysis and Remediation
sponsored by FireMon
WHITE PAPER: Managing risk within today's enterprise network environments is a significant challenge. This resource uncovers how to bridge the gap between enterprise risk and network teams.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

FireMon

14 Steps to Protect Your Organization from Ransomware
sponsored by Carbon Black
WHITE PAPER: Ransomware is on track to be a $1 billion crime in 2017, according to FBI data. That's a substantial increase from 2015, when ransomware was a "mere" $24 million crime. Uncover immediate steps you can take today to protect against ransomware like WannaCry and NotPetya.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Carbon Black

Ransomware: Defending Against 5 Major Types
sponsored by Commvault
WHITE PAPER: Not all ransomware is alike, so no one-size-fits-all strategy exists for defending against these attacks. Explore 5 major types of ransomware attacks and learn how to defend against them to bolster your network security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Commvault

The Need for Rapid Security Investigation
sponsored by Splunk
WHITE PAPER: Often when an issue or unsuspected attack occurs, IT teams find out too late. Explore an analytics-driven approach to security that enables organizations to respond to incidents as soon as possible.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Splunk

Protecting the Keys to Your Kingdom
sponsored by Thycotic
WHITE PAPER: In this white paper, take an in-depth dive into privileged account management in order to ensure that employees only have the permissions they need for the job – not ones that make you vulnerable.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

Thycotic

Achieve GDPR Readiness with Secure App and Data Delivery
sponsored by Citrix
WHITE PAPER: A Ponemon Institute study finds that most organizations do not feel prepared for the requirements of the GDPR. Discover how you can meet GDPR compliance through application security, contextual access, and more.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Citrix

The Five Essential Capabilities of an Analytics-Driven SOC
sponsored by Splunk
WHITE PAPER: Organizations are now looking to analytics-driven security operations centers (SOCs) to close the gaps in their network defenses. In this white paper, uncover how a successful SOC should have 5 key attributes.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Splunk

The Need for a New IT Security Architecture
sponsored by Citrix
WHITE PAPER: In a recent Ponemon Institute survey, 399 IT and IT security practitioners in the UK were asked about trends in IT security risks and why policies need to evolve in order to deal with threats from disruptive technologies. Access now to uncover their take on these topics and more.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Citrix

The Road to a Secure, Compliant Cloud
sponsored by HyTrust
WHITE PAPER: Corporations must innovate to stay ahead of the competition, deliver new services to attract and keep new customers, and keep their costs low. Uncover how a well-designed virtualized cloud offers businesses a solution, by keeping their crucial data secure while providing agility and adaptability.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

HyTrust

Incident Response for Today's Top 3 Security Scenarios
sponsored by Exabeam
WHITE PAPER: This whitepaper looks at the top three security scenarios that are ripe with risk to the organization, and discusses steps to properly respond should these events occur.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Exabeam

The Challenges of Legacy SIEM Platforms
sponsored by Exabeam
WHITE PAPER: Explore 3 reasons why legacy SIEM tools no longer meet the needs of most organizations. Plus, uncover the benefits of a modern security intelligence [platform.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Exabeam

Securing Industrial IoT Technology: 4 Key Considerations
sponsored by Bayshore Networks
WHITE PAPER: Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Bayshore Networks

5 Strategies to Improve Your Security Posture
sponsored by Citrix
WHITE PAPER: Reducing business security risk, protecting sensitive customer data, and ensuring compliance with regulations and standards are priorities for all organizations. Explore 5 ways you can overcome these security challenges.
Posted: 02 Aug 2017 | Published: 31 Dec 2016

Citrix

Data Center Security and Networking Assessment
sponsored by Avnet
WHITE PAPER: Discover a network virtualization platform that helps to fill in the defense gaps in your data center strategy by providing software defined micro-segmentation – preventing threats from moving laterally through your data center.
Posted: 31 Jul 2017 | Published: 31 Jul 2017

Avnet
1 - 25 of 790 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement