IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
1 - 25 of 802 Matches Previous Page  |  Next Page
DDoS Emerges as Primary Threat Vector for IoT
sponsored by Arbor Networks
WHITE PAPER: In this research content, learn why many organizations are turning to a cloud-based DDoS mitigation service with tremendous data scrubbing capacity. Then uncover how past IoT attacks influence organizations to prevent and detect application layer attacks faster.
Posted: 20 Oct 2017 | Published: 11 Nov 2016

Arbor Networks

The 6 Phases of a DDoS Incident Response Plan
sponsored by Arbor Networks
WHITE PAPER: Any enterprise that operates online needs to have robust defenses to detect and mitigate DDoS attacks. Key into this white paper to learn about how you can protect your organization against harmful DDoS attacks.
Posted: 20 Oct 2017 | Published: 20 Oct 2017

Arbor Networks

Economics of DDoS Attacks
sponsored by Arbor Networks
WHITE PAPER: DDoS attacks are cheaper than ever for the perpetrator, extremely lucrative for the attack service provider, and financially devastating for the target. Read this white paper to gain insight into DDoS attacks to prevent your company from having to pay the steep fines.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Arbor Networks

Research Report: IoT DDoS Attacks Show the Stakes Have Changed
sponsored by Arbor Networks
WHITE PAPER: How can IT network pros defend against DDoS attacks on IoT devices? In this white paper, uncover the recommendations on how to design your DNS infrastructure for stronger security against botnets. Then find out how Forrester Research believes the business technology ecosystem is changing.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Arbor Networks

What You SIEM is What You Get
sponsored by AlienVault
WHITE PAPER: No matter the company size, a properly executed SIEM strategy is difficult to achieve. Explore these white papers to uncover how to implement a successful SIEM strategy for your organization
Posted: 19 Oct 2017 | Published: 19 Oct 2017

AlienVault

The Stakes Have Changed, Have You? 20 Years of DDoS Attacks Targeting Business
sponsored by Arbor Networks
WHITE PAPER: According to the Worldwide Infrastructure Security Report, 93% of survey respondents experienced application layer-attacks and 56% experienced multi-vector DDoS attacks. Inside, learn how DDoS attacks have evolved and changed over time.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

Arbor Networks

Enterprise Endpoint Security Performance Benchmarks
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This white paper reveals an endpoint security report comparing 5 security products based on 17 benchmark performance metrics to assess product performance.
Posted: 18 Oct 2017 | Published: 10 Feb 2017

Symantec & Blue Coat Systems

Amazon Web Services: Overview of Security Processes
sponsored by Amazon Web Services
WHITE PAPER: You may be wondering, "how does AWS help ensure that my data is secure?" This document delivers the answer to this question and is intended to provide an overview of the security processes involved with Amazon Web Services.
Posted: 16 Oct 2017 | Published: 31 May 2017

Amazon Web Services

The Role of SAM in Information Security
sponsored by Snow Software
WHITE PAPER: Software asset management (SAM) provides an organization not just with the resources it needs to generate audit and reconciliation reports, but also to support information security initiatives. Learn ways information security can be more effectively addressed with the aid of SAM.
Posted: 12 Oct 2017 | Published: 09 May 2016

Snow Software

Introduction to AWS Security
sponsored by Amazon Web Services
WHITE PAPER: This document is intended to provide an introduction to AWS's approach to security, including the controls in the AWS environment and some of the products and features that AWS makes available to customers to meet your security objectives.
Posted: 10 Oct 2017 | Published: 31 Jul 2015

Amazon Web Services

AWS Best Practices for DDoS Resiliency
sponsored by Amazon Web Services
WHITE PAPER: Do not let your website or application become unavailable to end users - protect against DDoS attacks once and for all. Explore this white paper and learn how to improve resiliency of your applications against DDoS attacks with these best practices.
Posted: 10 Oct 2017 | Published: 30 Jun 2016

Amazon Web Services

Overview of AWS Security - Network Security
sponsored by Amazon Web Services
WHITE PAPER: Explore this white paper to learn more about AWS cloud monitoring tools designed to protect your network architecture from threats like DDoS attacks, IP spoofing, and more.
Posted: 10 Oct 2017 | Published: 31 Aug 2016

Amazon Web Services

Future of Website Security
sponsored by Symantec
WHITE PAPER: In this white paper, learn how to overcome the challenges associated with increased traffic and key guidelines for building an effective security strategy.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

Symantec

Evolve your Website Security
sponsored by Symantec
WHITE PAPER: In this white paper, learn about Symantec Complete Website Security. See how it helps protect against network breaches by performing weekly vulnerability assessments and daily malware scanning of web pages and web-based applications.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

Symantec

Confidence to Innovate
sponsored by Dell India
WHITE PAPER: What are the benefits of complete visibility and control over your security environment? This resource explains the importance of connecting the 4 foundational functions of IT security to enable organizations to adapt rapidly to changing threats, regulations and new technologies.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Dell India

Firewall Best Practices to Block Ransomware
sponsored by Sophos, Inc.
WHITE PAPER: Recent ransomware attacks like Wannacry and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. This white paper reveals best practices for configuring your firewall and network to protect against ransomware.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Sophos, Inc.

Synchronized Security: Best-of-breed defense that's more coordinated than attacks
sponsored by Sophos, Inc.
WHITE PAPER: Today's attacks are more sophisticated and coordinated than ever. According to ESG Group, 46% of organizations believe they have a problematic shortage of cybersecurity skills. Inside, learn how to protect against known and emerging threats.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Sophos, Inc.

Ensuring Network Profitability through Secure Service Enablement
sponsored by Nokia
WHITE PAPER: In this white paper, discover the immediate benefits of switching to a software-based approach to network security. Learn how to meet the demands of authentication, authorization and account (AAA); diameter routing agents (DRAs); and session boarder controllers (SBCs) by creating a path to the cloud through a simpler, secure and more agile network.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

Nokia

What do Financial Service Customers want from a Contract Center
sponsored by Five9
WHITE PAPER: In this research report, 995 survey respondents reveal how contact center technology plays an important role in their experience and how they choose their financial institutions.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

Five9

9 Reasons to Make the Move to a Cloud Contact Center
sponsored by Five9
WHITE PAPER: Discover the 9 reasons to make the switch to a cloud contact center. Learn how the cloud allows you to reduce hardware costs, speed deployment, enable agents to work remotely, and more.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

Five9

Create A Simpler, Secure, more Agile Network
sponsored by Nokia
WHITE PAPER: Uncover the immediate benefits of a virtualized software-based approach that makes it easier to enable essential network security elements. These include authentication, authorization and accounting, diameter routing agents and session border controllers.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

Nokia

Understanding and Mitigating DDoS Attacks
sponsored by Oracle + Dyn
WHITE PAPER: An average DDoS attack results in about 54 minutes of downtime, which can translate to substantial revenue loss. Inside, uncover how your DNS infrastructure is susceptible to a variety of DDoS attacks and how to overcome these threats.
Posted: 27 Sep 2017 | Published: 27 Sep 2017

Oracle + Dyn

SD-WAN vs. SDN: The Differences are in the Details
sponsored by Windstream Communications
WHITE PAPER: While the concept of a Software Defined WAN is generally understood, it's often confused with its technology parent, Software Defined Networking (SDN). Take a closer look at this white paper to reveal the differences between SD-WAN and SDN.
Posted: 26 Sep 2017 | Published: 08 Jun 2017

Windstream Communications

High Availability DNS Reduces Downtime Risk and Improves End-User Experience
sponsored by Oracle + Dyn
WHITE PAPER: Learn the benefits of implementing a high availability DNS infrastructure using redundant DNS services to help increase your online performance and reliability without negatively impacting user experience.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

Oracle + Dyn

Building the Agile Enterprise: Maintain Your Competitive Edge
sponsored by Verizon
WHITE PAPER: Enterprise leaders want a network that exceeds their customers' expectations. Explore this white paper to reveal how to collaborate better with employees and open up new business opportunities by virtualizing your network infrastructure.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Verizon
1 - 25 of 802 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement