IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
101 - 125 of 828 Matches Previous Page  |  Next Page
Re-Thinking The Network: Delivering Transformation With Simplicity
sponsored by 128 Technology
WHITE PAPER: Overly complex networks are barely meeting today's business requirements. How will they meet the demands of tomorrow? Learn how you can remove the barrier of network complexity from the way you do business.
Posted: 05 May 2017 | Published: 30 Dec 2016

128 Technology

Rethinking the Approach to Cybersecurity
sponsored by Fortinet, Inc.
WHITE PAPER: Before an effective network security strategy can be put in place, you need to understand the top cybersecurity challenges putting organizations at risk today. Learn more about these challenges, including cloud adoption, IoT and ransomware.
Posted: 04 May 2017 | Published: 10 Feb 2017

Fortinet, Inc.

The IoT Explosion's Impact on Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Find out what's driving the IoT explosion and how you can prepare your network for the potential security risks that accompany it.
Posted: 03 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

Countering Evolving Cybersecurity Challenges
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about an intelligent, new approach to network security that can seamlessly follow and protect data, provide actionable threat intelligence and close gaps left by legacy point products and platforms.
Posted: 03 May 2017 | Published: 23 Jan 2017

Fortinet, Inc.

What's Driving Hybrid WAN Adoption?
sponsored by Silver Peak
WHITE PAPER: Selecting a hybrid WAN without knowledge of the challenges it needs to address is a recipe for disaster. Learn about these challenges in this white paper.
Posted: 02 May 2017 | Published: 30 Dec 2016

Silver Peak

A Security Leaders Definitive Guide to the Threat Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: This guide goes in-depth on five network trends that are causing security pros to panic, so you can begin to understand what your security infrastructure is up against and how to best prepare for it.
Posted: 02 May 2017 | Published: 30 Jan 2017

Fortinet, Inc.

6 Ways to Use Threat Intelligence Data
sponsored by Splunk
WHITE PAPER: Uncover 6 ways threat intelligence data can help you gain broader perspective of any threat. Discover how it can help you detect malicious activities, provide visibility, save time/resources, and more.
Posted: 02 May 2017 | Published: 31 Dec 2016

Splunk

Six Ways to Improve Your Network Security with SD-WAN
sponsored by Silver Peak
WHITE PAPER: Learn six ways to improve network security and compliance by implementing SD-WAN.
Posted: 01 May 2017 | Published: 28 Apr 2017

Silver Peak

What's Driving WAN Architecture Simplification?
sponsored by Silver Peak
WHITE PAPER: Learn more about what challenges are driving WAN architecture simplification and how you can take advantage of it in this white paper.
Posted: 01 May 2017 | Published: 30 Dec 2016

Silver Peak

How Fortinet Security Fabric Addresses Today's Top Security Concerns
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how you can get the networks security you need to protect your organization from IoT, ransomware, a lack of skilled IT security staff and more.
Posted: 01 May 2017 | Published: 03 Mar 2017

Fortinet, Inc.

Demystifying The Threat Landscape: 10 Ways Network Security Pros Can Step Up Game
sponsored by F5 Networks
WHITE PAPER: In this eBook, you'll learn more about the changing network security landscape, where your business is most vulnerable today, and 10 areas you can step up your security game.
Posted: 24 Apr 2017 | Published: 30 Dec 2016

F5 Networks

DDoS Recommended Practices
sponsored by F5 Networks
WHITE PAPER: In this white paper, learn recommended network and application practices for successful DDoS attack protection.
Posted: 24 Apr 2017 | Published: 30 Dec 2016

F5 Networks

Debunking the Top Four Myths About DDOS Attacks
sponsored by F5 Networks
WHITE PAPER: If you think you're ready for a DDoS attack—or that you don't need to worry about one—make sure you're not buying into some of these popular myths.
Posted: 21 Apr 2017 | Published: 30 Dec 2016

F5 Networks

Key Considerations in Deploying an SSL Solution
sponsored by F5 Networks
WHITE PAPER: In this white paper, learn what you need to know about Secure Sockets Layer (SSL) and how to construct your security strategy.
Posted: 21 Apr 2017 | Published: 30 Dec 2016

F5 Networks

SD-WAN: The Pathway to a Digitally Transformed Branch
sponsored by Windstream Communications
WHITE PAPER: This IDC white paper examines how digital transformation has necessitated a rethinking of WAN connectivity for distributed enterprises.
Posted: 14 Apr 2017 | Published: 28 Feb 2017

Windstream Communications

Prepping for the Oncoming Wave of SD-WANs
sponsored by Windstream Communications
WHITE PAPER: In this TechTarget white paper, learn what the experts are saying about the near future for SD-WANS.
Posted: 12 Apr 2017 | Published: 31 Jan 2017

Windstream Communications

An Introduction to the Security Advantages of Mirco-Segmentation
sponsored by VMware
WHITE PAPER: Traditional data center works to defer threats from breaching your network's perimeter, so what do you do once it gets inside? Read this white paper to learn why we can't permanently resolve the perimeter-style network security problem and what micro-segmentation offers as a supplement to your existing network security.
Posted: 29 Mar 2017 | Published: 30 Nov 2016

VMware

Micro-segmentation: Security for Every Data Center
sponsored by VMware
WHITE PAPER: Firewalls are a security strategy that companies are discovering is wholly inadequate against today's sophisticated cyberattacks. To defend against cyberattacks, today's enterprises need a sophisticated approach to data center security. In this white paper, learn about a new approach to data center security designed for current threats.
Posted: 28 Mar 2017 | Published: 30 Sep 2016

VMware

Why Firewalls Alone Are No Longer Enough
sponsored by VMware
WHITE PAPER: What do you do when a threat makes it past the firewall and starts moving laterally inside the data center? To combat today's advanced cyberattacks, many organizations are moving past archaic firewall protection and empowering their security with network virtualization and micro-segmentation.
Posted: 28 Mar 2017 | Published: 30 Sep 2016

VMware

Modern Security for the Modern Data Center
sponsored by VMware
WHITE PAPER: Upgrading your data center security from an antiquated perimeter-based model is in your best interest if you don't want to end up dealing with the financial impact of a breach. Inside learn about a new, advanced data center security model that provides the protection your business needs for today and the future.
Posted: 27 Mar 2017 | Published: 30 Sep 2016

VMware

Modernizing Your Data Center's Security
sponsored by VMware
WHITE PAPER: The classic approach to data center security is to guard the perimeter and block threats from getting inside—but that's no longer adequate. Learn how micro-segmentation can provide your data center with the security it needs for today's advanced threats.
Posted: 27 Mar 2017 | Published: 30 Sep 2016

VMware

Eight Toxic Networking Vendor Selection Philosophies
sponsored by Extreme Networks
WHITE PAPER: This Forrester Research report reveals eight common statements that organizations use to rationalize their poor network choices. Discover each invalid justification for continuing to work with network vendors and infrastructure that just don't work for you.
Posted: 21 Mar 2017 | Published: 13 Jul 2016

Extreme Networks

Fast-Forward Business with On-Demand App Deployments
sponsored by VMware and Presidio
WHITE PAPER: In this e-book, learn how to automate your IT and application delivery process to meet the demands of the cloud.
Posted: 01 May 2017 | Published: 30 Dec 2016

VMware and Presidio

Meeting the Network Requirements of Intelligent Transportation Systems
sponsored by TechData - Digi
WHITE PAPER: In this white paper, learn how to choose a router and vendor that can provide your organization with Global 3G/4G LTE options, centralized mass configuration, remote troubleshooting and more.
Posted: 10 Apr 2017 | Published: 29 Jan 2016

TechData - Digi

What Changing Mobile Communications Mean for Your Business
sponsored by Mitel Networks Limited
WHITE PAPER: In this TechTarget white paper, learn how to prepare your business for mobile communications with a mobile-centric strategy that encompasses collaboration, customer experience and future technology like IoT and machine-to-machine communications.
Posted: 10 Apr 2017 | Published: 30 Dec 2016

Mitel Networks Limited
101 - 125 of 828 Matches Previous Page    3 4 5 6 7 8    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement