IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
1 - 25 of 880 Matches Previous Page  |  Next Page
The Top Cybersecurity Risks – And How Enterprises Are Responding
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers.
Posted: 23 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Mitigate Data Theft and Inappropriate Use in your Network
sponsored by LogRhythm, Inc.
WHITE PAPER: Security teams need tools to help deliver the deep insight necessary to detect a variety of threats. Uncover ways to detect and respond to today's security incidents with tools designed to pinpoint abnormal activity and prevent sensitive data loss.
Posted: 18 Nov 2016 | Published: 18 Nov 2016

LogRhythm, Inc.

Mitigate Security Risks with Hyperconverged Infrastructure
sponsored by SimpliVity
WHITE PAPER: Improve your security posture and best mitigate risks by implementing comprehensive security measures across your entire enterprise - from the network perimeter to the application layer. Discover how a hyperconverged infrastructure limits potential points of attack and consolidates security controls.
Posted: 18 Nov 2016 | Published: 31 Dec 2015

SimpliVity

From Reactive to Proactive: How to Avoid Alert Fatigue
sponsored by ThreatConnect
WHITE PAPER: Learn how to prioritize security alerts and reduce alert fatigue. Discover how to achieve active response, allowing you to respond to attacks as quickly as they are detected.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

ThreatConnect

Office 365: Enabling More Secure Collaboration
sponsored by VMware
WHITE PAPER: How can you ensure secure collaboration with Office 365? Learn 3 steps to make this possible, as well as 3 stages of adoption for security add-ons for Office 365.
Posted: 18 Nov 2016 | Published: 18 Nov 2016

VMware

The Connected Enterprise: Unify Communications to Manage Beyond the Remote Workforce
sponsored by Arkadin + BlueJeans
WHITE PAPER: The modern workplace no longer requires the whole team to be physically present. Email, video and instant messaging/social networking allow for almost instantaneous sharing of ideas. Learn how to manage your remote workforce by unifying these channels, and providing remote access to data while maintaining compliance.
Posted: 18 Nov 2016 | Published: 18 Nov 2016

Arkadin + BlueJeans

The Case for Modern Network Security Operations
sponsored by Forcepoint
WHITE PAPER: In this ESG white paper, examine how network security operations are completely fraught with challenges that need to be met in order for your organization to effectively protect itself.
Posted: 16 Nov 2016 | Published: 30 Sep 2016

Forcepoint

Change the Dynamics of Your IT
sponsored by Comarch
WHITE PAPER: This white paper explains why IT outsourcing, i.e. defining and isolating certain areas of IT in the enterprise and then transferring them to specialized third parties, is currently the best way to effectively develop and maintain the IT environment. Learn how you can simplify your IT now.
Posted: 14 Nov 2016 | Published: 31 Aug 2016

Comarch

Why Cybersecurity's Visibility Gap Matters and How Organizations Can Solve It
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover the origins of the cybersecurity visibility gap, its consequences and how to expand your field of view. Learn how to protect your people, data and brand more effectively by bringing your security tools beyond your network perimeter.
Posted: 10 Nov 2016 | Published: 31 Oct 2016

Proofpoint, Inc.

Empowering Business Evolution on Open Network Infrastructure
sponsored by Juniper Networks, Inc.
WHITE PAPER: See how you can remove inconveniences that have developed in legacy network and security infrastructure. Inside you will learn about a potential network architecture that embraces openness and simplicity as its main principals.
Posted: 10 Nov 2016 | Published: 31 Aug 2015

Juniper Networks, Inc.

Merit Network Delivers Michigan’s First Statewide, High-Speed Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Merit Network needed to build a high-performance infrastructure for nonprofits in the 10th most populated US state. Learn who they partnered with for all of their routing and communication requirements, allowing them to create a statewide network for schools, connect institutions to advanced network services, provide security, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Juniper Networks, Inc.

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

Agile Security for Virtualization, Software-DefinedNetworking, and Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how software-defined networking has changed security, and how some of the best policies can flourish when security is kept at the heart of the data center revolution.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

Fortinet, Inc.

Securing the Private Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: The demands on private cloud all too often leave operators in a position of favoring performance and agility over security. This white paper details how you can protect your private cloud environment by building security into the network that can accommodate powerful threat detection technologies while maximizing throughput and flexibility.
Posted: 07 Nov 2016 | Published: 28 Jul 2016

Fortinet, Inc.

Protecting the Hybrid Data Center in an Increasingly Virtualized World
sponsored by Juniper Networks, Inc.
WHITE PAPER: Virtualized server workloads have increased in the past year, however most security measures in place today are for purely physical environments. Uncover how to secure your organization's current or future virtualized environments and prevent harmful security tactics.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Juniper Networks, Inc.

At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed
sponsored by Absolute
WHITE PAPER: Learn about each type of insider threat and discover strategies to mitigate their impact on your organization. Visibility through routine scans to discover sensitive data in cloud-sync folders can help IT move from paranoia or a false sense of security to peace of mind.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Absolute

Protecting the Distributed Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to secure your wide area network behind a distributed enterprise firewall without sacrificing performance or usability. Learn 5 key requirements to keep all of your dispersed sites secure and keep maintenance costs low.
Posted: 01 Nov 2016 | Published: 31 Oct 2016

Fortinet, Inc.

Uncover Often Overlooked Holes in Your Security
sponsored by Dell SecureWorks
WHITE PAPER: Learn how a second opinion on your security policies could be beneficial in ways that could surprise your organization. Access now to discover improved cybersecurity safeguards, how to close hidden exposure to unknown external web connections, and more.
Posted: 31 Oct 2016 | Published: 31 Oct 2016

Dell SecureWorks

Transforming Your Security: A New Era in Enterprise Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to increase security effectiveness and reduce complexity by consolidating network security across the entire threat surface. Take a holistic approach, with central visibility and control of the borderless enterprise managed through a single pane of glass.
Posted: 31 Oct 2016 | Published: 30 Sep 2016

Fortinet, Inc.

Bot Defense Insights for Thwarting Automated Threats
sponsored by Distil Networks
WHITE PAPER: Learn not only what bots are but why they are a significant threat, why bad bots are created, and how to tackle the threat they represent to your enterprise. Access now to discover how to keep your organization safe from this very real menace.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Distil Networks

High Availability DNS Reduces Downtime Risk and Improves End-User Experience
sponsored by Dyn
WHITE PAPER: This white paper reviews the business advantages of implementing a high availability DNS architecture. You'll learn the critical role DNS plays in the user experience, the risks of relying on a single DNS solution, and the added performance benefits of a high availability DNS architecture.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Dyn

Closing the Circle of Network Security Defense
sponsored by Kaspersky Lab
WHITE PAPER: Explore how you can access comprehensive, trustworthy threat intelligence data so that you can defend against attacks before they're even launched. Uncover key features like accelerated incident response, threat hunting, and more.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Kaspersky Lab

Modernize Your Data Center Security
sponsored by VMware
WHITE PAPER: In a recent survey, 60% of respondents said they had adopted network virtualization to help address concerns with data security. Learn how building micro-segmentation on your virtualized network can help you verify and secure all resources, limit and strictly enforce access control, and more.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

VMware

Why Firewalls Alone Are No Longer Enough
sponsored by VMware
WHITE PAPER: Micro-segmentation is built upon a next-generation networking model better known as network virtualization. Learn how to enable fine-grained policies and network controls when you virtualize the network, scale firewall capabilities, and more.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

VMware

Protecting the Distributed Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to protect your distributed enterprise without compromising data access. Uncover the 5 requirements for a distributed enterprise firewall.
Posted: 28 Nov 2016 | Published: 31 Oct 2016

Fortinet, Inc.
1 - 25 of 880 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement