IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
1 - 25 of 811 Matches Previous Page  |  Next Page
Managed DNS Evaluation Guide: Understanding What Matters Most When Selecting Managed DNS
sponsored by Dyn
WHITE PAPER: This guide explains how a cloud-based DNS service can help you improve business results and provides guidelines for choosing a managed DNS service provider.
Posted: 17 Jan 2017 | Published: 30 Nov 2016

Dyn

Wi-Fi is Easy, Secure Wi-Fi is the Challenge.
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this eBook, learn about the increasing demand for Wi-Fi, and more importantly, how to secure your wireless network.
Posted: 13 Jan 2017 | Published: 10 Oct 2016

WatchGuard Technologies, Inc.

Navigating Market Complexity to Fulfill Network Security Requirements
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper explores how to take a strategic approach to selecting the right tools for modern network security. Discover how SMBs can tackle the challenge of navigating the market to make sure they're putting pragmatic, streamlined, and effective security measures in place.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

WatchGuard Technologies, Inc.

Improve Network Security Speed and Performance
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this data sheet, you'll learn about security technology that upholds performance even as more security functions and features get added. Learn about these features, including agile firewall throughput, comprehensive network security services, and more.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

WatchGuard Technologies, Inc.

Gain Complete Control of Your Digital Ecosystem with PKI
sponsored by Entrust, Inc.
WHITE PAPER: Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.
Posted: 11 Jan 2017 | Published: 14 Sep 2016

Entrust, Inc.

IoT Strategy: 8 Key Questions to Ask
sponsored by Cisco Systems, Inc.
WHITE PAPER: IoT introduces tremendous risk if the connected products and services are not designed, deployed and supported properly. The 8 questions presented in this white paper provide a step-by-step approach for turning an IoT vision into reality.
Posted: 29 Dec 2016 | Published: 30 Nov 2016

Cisco Systems, Inc.

Capitalizing on The Internet of Things
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how transform a product business into a service business, the core benefits and challenges of IoT, as well as 5 fundamentals to consider when evaluating how your company can best leverage the internet of things.
Posted: 29 Dec 2016 | Published: 29 Dec 2016

Cisco Systems, Inc.

Achieving End-to-End Security in the Internet of Things
sponsored by Cisco Systems, Inc.
WHITE PAPER: Minimize risk and optimize operations for mission-critical connected devices using cellular IoT for secure connections. Learn how you can capitalize on the IoT's endless possibilities without becoming tomorrow's headline
Posted: 27 Dec 2016 | Published: 30 Jun 2016

Cisco Systems, Inc.

Innovative Monetization Approaches for Home Security and Automation Organizations
sponsored by Cisco Systems, Inc.
WHITE PAPER: Take an in-depth look at four innovative IoT approaches home security organizations are using to expand their services and grow their bottom line.
Posted: 27 Dec 2016 | Published: 30 Apr 2016

Cisco Systems, Inc.

Best Practices for Implementing Global IoT Initiatives
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how to successfully launch, secure and maintain your IoT service. Discover six best practices for managing IoT complexity and six crucial areas you must be prepared to address.
Posted: 23 Dec 2016 | Published: 31 Mar 2016

Cisco Systems, Inc.

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your mobile workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Manage Risk by Protecting the Apps and Data that Drive Business Productivity
sponsored by Citrix
WHITE PAPER: Traditional perimeter-based security has been rendered ineffective by mobility and the cloud. In this infographic, learn how to successfully navigate the increasingly volatile IT business environment and take a new approach to information security.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Overcome Cloud Challenges with Open Networking and Flexible Tools
sponsored by Dell EMC and Intel®
WHITE PAPER: Discover how to integrate different cloud offerings with a combined SDN infrastructure and hybrid cloud strategy. Read on to learn how to situate your cloud infrastructure as to take advantage of SDN's real-time intelligence, deep app integration, and high levels of automation.
Posted: 21 Dec 2016 | Published: 21 Dec 2016

Dell EMC and Intel®

Building A Scalable Remote Access Environment in AWS
sponsored by Palo Alto Networks
WHITE PAPER: Learn about a scalable remote access tool available to AWS users. Inside, you will see how you can protect your mobile workforce, as well as the network as a whole, from threats originating on the web. At the same time, you can minimize your administrative costs associated with remote access and mobile security.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

Palo Alto Networks

Securing Your Microsoft Environment
sponsored by Palo Alto Networks
WHITE PAPER: The challenge your organization faces is how to best protect your infrastructure from cyberattacks. Discover ways to adopt a prevention-first security posture that protects the network and digital assets.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

Palo Alto Networks

UEM is the Next Step in the Evolution of Device Management
sponsored by vmware airwatch
WHITE PAPER: Read this white paper to uncover AirWatch's leading unified endpoint management (UEM) approach. Find out how it enables organizations to take a consistent approach to endpoint security and management across a plethora of devices, apps, and deployments.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

vmware airwatch

5 Trends in Windows 10 Adoption
sponsored by vmware airwatch
WHITE PAPER: This flipbook reveals the five key trends in Windows 10 adoption and migration. Give your customers the ability to unify desktop and mobile management under one model.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

vmware airwatch

Firewall Buyer's Guide: Evaluating Enterprise Network Firewalls
sponsored by Palo Alto Networks
WHITE PAPER: Learn to navigate your way through the firewall market, and choose a program that will allow your administrators to easily define which applications are and are not allowed on your business' network. Discover 10 essential characteristics of the modern firewall, tips for constructing a RFP, how to physically evaluate your firewall, and more.
Posted: 15 Dec 2016 | Published: 15 Dec 2016

Palo Alto Networks

Seeing Through the Clouds: Cloud Visibility Improves Network Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper explains why network telemetry is the key to better cloud security. Learn how network telemetry can expand advanced visibility, threat detection, and security analytics capabilities to the cloud for more comprehensive network protection.
Posted: 15 Dec 2016 | Published: 30 Sep 2016

Cisco Systems, Inc.

Best Practices for Dealing With Phishing and Ransomware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research white paper focuses on current problems in security with phishing and ransomware, and gives recommendations on how to mitigate these threats. Learn how to implement security awareness training for all users, maintain quality backups and implement detection and elimination systems for your network.
Posted: 14 Dec 2016 | Published: 30 Sep 2016

KnowBe4

The Foundation of Next-Gen Enterprise Security is Embedded in your Endpoints
sponsored by Absolute
WHITE PAPER: As the lines between corporate and personal have blurred, or even blended altogether, the enterprise security team has less and less true control over all of the endpoints being used by employees. Learn how to activate embedded security in your endpoints to ensure complete protection of your valuable assets.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Absolute

IDC Technology Spotlight: Modern "Embedded" Endpoint Security
sponsored by Absolute
WHITE PAPER: This IDC Technology Spotlight explains why modern endpoint security strategies need an innovative approach that maintains always-on IT connectivity to corporate laptops and mobile devices. Learn how to maintain vigilance and identify threats at the earliest stages before a breach can occur.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Absolute

Accelerating Your Incident Response & Improving Your Network Forensics
sponsored by Blue Coat Systems
WHITE PAPER: Network visibility is key to insightful security intelligence. Learn how to protect your workforce, fortify your network and improve overall security processes with complete visibility and streamlined forensics.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

Blue Coat Systems

Firewall Sprawl: Four Security Gaps Exposed
sponsored by FireMon
WHITE PAPER: Discover the truth surrounding next-generation firewalls (NGFWs). Learn the four firewall security gaps that could be putting your organization at risk, and the proper management processes to patch those gaps.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

FireMon

Content Delivery Networks Take on New Roles
sponsored by Limelight Networks, Inc.
WHITE PAPER: Content delivery networks (CDNs) can pave the way for using rich media in an enterprise but make sure you understand how it works. In this e-guide, Tom Nolle, President of CIMI Corporation dives into how CDNs work, their protection from denial of service attacks and the new mission for CDN providers.
Posted: 12 Dec 2016 | Published: 07 Dec 2016

Limelight Networks, Inc.
1 - 25 of 811 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement