IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network Security White Papers (View All Report Types)
1 - 25 of 782 Matches Previous Page  |  Next Page
Secure Content For the Mobile Enterprise
sponsored by Acronis
WHITE PAPER: Download and discover how Acronis Access Advanced enables simple, secure and managed mobile file access, sync and share.
Posted: 02 Jul 2015 | Published: 31 Jul 2014

Acronis

The Changing Face of Security Management
sponsored by Global Knowledge
WHITE PAPER: Access this white paper to learn how you can implement a threat based, network cognizant security system that is prepared for the constantly changing landscape of security.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Global Knowledge

Don’t Let Your DDoS Defense Fall Behind
sponsored by Neustar®
WHITE PAPER: This white paper examines the pros and cons of several different DDoS mitigation approaches. Access now to learn how to evaluate and choose the ideal strategy based on your risk assessment.
Posted: 01 Jul 2015 | Published: 13 May 2015

Neustar®

10 Things Security Experts Wish End Users Knew
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you'll learn the 10 concerns that security experts want end users to know about security at work and at home.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge

Analyzing Consumer IT Security Bad Habits that are Coming into the Office
sponsored by WinMagic
WHITE PAPER: This analytical white paper delves into the false sense of security employees live within as well as the facts and truths about the lack of data security measures in place to mitigate risks. View now to learn how to eliminate user bad habits.
Posted: 29 Jun 2015 | Published: 24 Feb 2014

WinMagic

Data Encryption Demystified: Seven Common Misconceptions and the Solutions that Dispel Them
sponsored by WinMagic
WHITE PAPER: This white paper presents the top 7 myths and misconceptions about encryption and how new approaches dispel them. Access this helpful resource now to get caught up on encryption technology today and learn why you need it in your modern cybersecurity strategy.
Posted: 29 Jun 2015 | Published: 27 May 2015

WinMagic

A Guide to Managing Microsoft BitLocker in the Enterprise
sponsored by WinMagic
WHITE PAPER: This white paper explores how to ensure comprehensive FDE on all platforms and devices.
Posted: 29 Jun 2015 | Published: 10 Apr 2014

WinMagic

Today's Top Mobile Security Challenges and Defense Strategies
sponsored by HID
WHITE PAPER: This white paper examines the top mobile security challenges IT is facing today and the most successful defense strategies being used to mitigate threats.
Posted: 26 Jun 2015 | Published: 05 May 2015

HID

Five Pillars of Transparent Data Security
sponsored by WinMagic
WHITE PAPER: This white paper outlines the 5 essential pillars of transparent data security to remove workflow and performance burdens.
Posted: 26 Jun 2015 | Published: 19 Dec 2012

WinMagic

What Consumers Believe About Cloud File Sharing & Why That’s a Warning to IT Pros
sponsored by WinMagic
WHITE PAPER: This white paper explores the pros and cons of three file sync and share security strategies. Continue reading to learn the 3 crucial aspects for securing files destined for the cloud and how to appropriately evaluate the risks of cloud file sync and share approaches.
Posted: 26 Jun 2015 | Published: 20 Apr 2015

WinMagic

Enabling Your Mobile Workforce with Secure Mobile Content Collaboration
sponsored by Box
WHITE PAPER: This white paper explores the leading mobile security strategies in use today to secure the enterprise network.
Posted: 26 Jun 2015 | Published: 17 Jun 2015

Box

Managing App Sideloading Threats on iOS 2015
sponsored by Lookout
WHITE PAPER: Download and discover how hackers are using app sideloading to take advantage of your enterprise provisioning, and learn how you can manage the emerging security threats.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Lookout

Insider Threats: The Unexpected Risk
sponsored by Varonis
WHITE PAPER: This white paper reveals just how prevalent insider threats are and gives you advice on stopping them.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Varonis

The State of Enterprise Mobile Threats
sponsored by Lookout
WHITE PAPER: Access this white paper to learn everything you need to know about the current state of mobile security threats for both iOS and Android.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Lookout

Five Things You Must Know About Microsoft BitLocker
sponsored by WinMagic
WHITE PAPER: This white paper presents a 5 step strategy to resolve all BitLocker security issues.
Posted: 25 Jun 2015 | Published: 17 Jun 2015

WinMagic

Special Report: Detailed Reviews of 7 IPS Platforms
sponsored by IBM
WHITE PAPER: This report presents detailed reviews of seven IPS platforms to help you decide which one meets your specific needs.
Posted: 24 Jun 2015 | Published: 29 Dec 2014

IBM

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

The 5 Questions Mobile Businesses Are Asking
sponsored by Lookout
WHITE PAPER: In this white paper, you'll discover the 5 key questions that are most concerning to the lack of visibility in a mobile business.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Lookout

How to Create the Secure Mobile Enterprise
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 18 Jun 2015 | Published: 27 Apr 2015

Dell, Inc.

BYOD: In a Maturing Market, Employee Satisfaction Is The Top Priority
sponsored by Intel
WHITE PAPER: Access this white paper to learn how IT leaders in conservative markets can develop a sophisticated approach to managing the risks associate with mobile device proliferation within the enterprise.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Intel

Eight Questions You Must Ask When Considering an SD-WAN
sponsored by Talari Networks
WHITE PAPER: Access this white paper to learn the 6 key benefits of a software-defined WAN that make it exactly what you need for modern business networking, as well as 8 questions to ask before when considering the change.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Talari Networks

Enterprise Mobility Management Without Investing in a New Solution
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how you can activate the EMM capabilities of your existing virtual private network (VPN) so that you can successfully manage mobile devices without migrating to a new system.
Posted: 11 Jun 2015 | Published: 29 May 2015

Pulse Secure

Manage Remote, Mobile and Campus Access to the Data Center and Cloud from a Single Console
sponsored by Pulse Secure
WHITE PAPER: Access this white paper and discover how you can centrally manage remote, mobile and campus access policies, report on appliance health and endpoint compliance and update appliances by group.
Posted: 11 Jun 2015 | Published: 30 Apr 2015

Pulse Secure

2015 Mobile Threat Report
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to discover in-depth research about the current state of mobile security and learn what you need to do to keep your enterprise protected.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Pulse Secure

Balancing Security and User Experience: A Day in the Life of the Mobile Worker
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how to balance IT's difficulties with managing mobile security and the need to deliver a seamless mobile user experience.
Posted: 10 Jun 2015 | Published: 29 Aug 2014

Pulse Secure
1 - 25 of 782 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement