IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
101 - 125 of 892 Matches Previous Page  |  Next Page
3 Ways to Modernize Your Enterprise Network and Optimize Cloud Investments
sponsored by Juniper Networks, Inc.
WHITE PAPER: When your organization moves to cloud-driven business models, you must decide upon the right technologies and partners to facilitate a successful transition. Read this white paper that examines the most important considerations when deciding upon a vendor to help you modernize and secure your enterprise campus and branch network infrastructure.
Posted: 04 May 2016 | Published: 04 May 2016

Juniper Networks, Inc.

Why extending Your VPN to the cloud will bring better performance and security
sponsored by AT&T
WHITE PAPER: As more applications get delivered through cloud models, IT must ensure maximum performance and availability. Why should you look to extend the capabilities of a VPN that is already in place? Learn the benefits of VPN-based connectivity for the cloud inside.
Posted: 29 Apr 2016 | Published: 20 Apr 2016

AT&T

Defend Against the Undetected
sponsored by Fortinet, Inc.
WHITE PAPER: Your network can no longer rely on perimeters with today's cybercriminals. You must have a comprehensive internal and external solution designed to protect your perimeter, your core, your endpoint and everything else in-between. Learn how you can effectively detect, prevent and remediate a threat before it succeeds.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Maximize Network Security and Simplify Operations with Automated Access Policies
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover in this paper how to leverage a next-generation cloud infrastructure that builds on advances in virtualization and automation to deliver greater agility, cost savings and enhanced security to your enterprise network.
Posted: 29 Apr 2016 | Published: 29 Apr 2016

Juniper Networks, Inc.

Six Steps To A Better Security Strategy
sponsored by AllClear ID
WHITE PAPER: In this white paper, you'll learn six steps to create an effective security strategy that's linked with key business interests for great success.
Posted: 29 Apr 2016 | Published: 22 Jan 2016

AllClear ID

Building An Effective Breach Detection And Response Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: This Forrester Research Inc. report shows you the benefits of implementing sandbox solutions to meet your security demands. Modern sandboxed are able to virtually replicate operating environments, execute suspicious code and observe behavior. Access now to best quell sophisticated attackers and prevent future ones.
Posted: 28 Apr 2016 | Published: 31 Oct 2015

Fortinet, Inc.

Total Economic Impact of IBM Security Network Protection (XGS), Forrester Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This white paper examines the benefits you will realize by deploying next generation intrusion prevention. Access now to discover how next-gen IPS could impact your organization.
Posted: 27 Apr 2016 | Published: 01 Feb 2016

IBM

How advanced endpoint protection is stopping fraudsters in their tracks
sponsored by IBM
WHITE PAPER: This white paper teaches you why antivirus software and firewalls on consumer endpoints aren't sufficient to combat today's sophisticated hacking tools. Access now to learn common misconceptions about endpoint protection and what unexpected benefits you can realize by extending protection to customer endpoints.
Posted: 26 Apr 2016 | Published: 01 Oct 2015

IBM

IBM 2015 Cyber Security Intelligence Index for Information and Communication
sponsored by IBM
WHITE PAPER: This white paper outlines cyber attack incidents of organizations in the information and communications industry. Access now to learn about past trends of cyber criminals and what to look for in the future of cyber crime.
Posted: 25 Apr 2016 | Published: 31 Dec 2015

IBM

Overview of the Asia-Pacic Intrusion Detection & Prevention Systems Market
sponsored by IBM
WHITE PAPER: This white paper shows you how greatly IDS/IPS is growing in Asia Pacific and methods they are using to stay ahead of advanced threats. Access now and learn how to improve your organization's awareness of these threats and prepare yourself against sophisticated attacks in the future.
Posted: 25 Apr 2016 | Published: 31 Dec 2015

IBM

Next-Generation IPS in the Era of Targeted Attacks
sponsored by IBM
WHITE PAPER: This white paper talks about the future of IPS and gives you statistics from the current IPS market. Access now to learn about the features, capabilitie, costs and impacts of next-generation IPS and the future of cyberattacks in general.
Posted: 21 Apr 2016 | Published: 01 Jan 2016

IBM

Navigating the Challenges with Wireless Security
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper explores the four drivers of Wi-Fi usage that are behind the explosion of wireless connectivity and the security implications that mustn't be forgotten.
Posted: 19 Apr 2016 | Published: 01 Jan 2016

WatchGuard Technologies, Inc.

eSentire Partner Program
sponsored by eSentire
WHITE PAPER: This white paper gives you a brief overview of the eSentire partner program and how becoming a partner will allow you to reach new customers, increase revenues, expand your portfolio and grow market share. Access now and learn about their program benefits, requirements and if it is the right fit for you.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

eSentire

Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: This white paper takes a deeper look at recent attacks on the government, Aramaco, Sony and others and breaks down what type of malware it was and how it works, measures you can take to mitigate the risk of an attack and considerations for protecting your data on file shares, endpoints and collaborative systems.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Meeting PCI DSS v3.1 Merchant Requirements with Watchguard UTM and Wireless Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper clearly outlines how firewall deployment impacts PCI DSS standards for a PCI DSS merchant. Access now for tables that include descriptions of PCI DSS standards and how you can achieve these requirements.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

WatchGuard Technologies, Inc.

Turn iOS, Android or BlackBerry Devices into Security Tokens
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will learn about two-factor user authentication by leveraging passwords and users' devices. Access now and learn how to reduce associated operational costs and increase productivity with a modern authentication system.
Posted: 18 Apr 2016 | Published: 02 Mar 2016

BlackBerry

Next-Generation Datacenter Security Implementation Guidelines
sponsored by Palo Alto Networks
WHITE PAPER: You need to implement new security policies to protect your data center from breach, but the complex architecture causing integration issues. What's next? Access these implementation guidelines for deploying new firewall and advanced threat prevention features in a physical, virtualized, or hybrid data center.
Posted: 14 Apr 2016 | Published: 30 Nov 2015

Palo Alto Networks

We’ve Been Breached- Now What?
sponsored by eSentire
WHITE PAPER: This white paper teaches you how to respond after a cyber threat becomes a cyber attack. Access now to learn how to eradicate cyber threats, repair infected systems and restore operations to normal after an attack occurs.
Posted: 14 Apr 2016 | Published: 31 Dec 2015

eSentire

Next-Generation Security Platform for Manufacturing
sponsored by Palo Alto Networks
WHITE PAPER: Vulnerabilities to cyberattacks have made the challenge of ensuring strong security in industries like manufacturing a formidable one. Discover ways a platform approach to security can protect networks, improve your ability to meet regulation, and more.
Posted: 13 Apr 2016 | Published: 31 Dec 2014

Palo Alto Networks

A Path Towards Secure Banking IT
sponsored by Palo Alto Networks
WHITE PAPER: This paper discusses a security blueprint particularly focused on enabling financial institutions to detect and prevent threats to their networks. This new detection capacity does not need to add complexity and overhead, indeed, it can improve network capability.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

Palo Alto Networks

Cyber Liability: Risks, Ramifications, and Mitigation
sponsored by eSentire
WHITE PAPER: Find out how you can better defend your organization against external attack and limit exposure by reducing your attack profile available to attackers by accessing this resource.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

eSentire

Advanced Zero Day Protection with APT Blocker
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper shows you four key characteristics your detection software must have to adequately secure your organization. Access now to go beyond simple signatuer-based antivirus detection and gain a cloud-based sandbox with full system emulation to detect the most advanced threats.
Posted: 12 Apr 2016 | Published: 01 Feb 2016

WatchGuard Technologies, Inc.

Deploying Apps Within a Hybrid Infrastructure
sponsored by F5 Networks
WHITE PAPER: This white paper demonstrates how to optimize your network and app performance with a comprehensive suite of services. Learn now about ways to eradicate the need for your teams to search and find the components they require.
Posted: 11 Apr 2016 | Published: 11 Apr 2016

F5 Networks

Best Practices for Protecting Patient Data in the Cloud
sponsored by Digital Guardian
WHITE PAPER: Now that many healthcare organizations are using cloud computing to store and share sensitive patient information, they must figure out how to extend data loss prevention (DLP) strategies to include cloud storage. Discover best practices for applying DLP to the cloud.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Digital Guardian

SD-WAN for Maximizing WAN Performance
sponsored by Fatpipe, Inc.
WHITE PAPER: More and more applications are moving to the cloud which is causing a decrease in WAN performance. This white paper displays how SD-WAN offers a solution to address these new network complexities and performance needs with a seven layered approach to WAN optimization.
Posted: 19 Apr 2016 | Published: 06 Apr 2016

Fatpipe, Inc.
101 - 125 of 892 Matches Previous Page    3 4 5 6 7 8    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement