IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
101 - 125 of 872 Matches Previous Page  |  Next Page
A Powerful Platform for Cloud Security Analytics
sponsored by Exabeam
WHITE PAPER: Security architects and SOC managers need a solution for integrating activity across all deployments and making sense of behavior in an open, cloud-based architecture. Discover how you can analyze account lockouts, detect unusual access patterns, and prevent data loss while allowing your organizations to continue growing with the cloud.
Posted: 20 May 2016 | Published: 31 Dec 2015

Exabeam

Top Ten Reasons You Don't Need Mobile Device Management (MDM)
sponsored by IBM MaaS360
WHITE PAPER: Mobile device management (MDM) is a dying trend. Smartphones are a fad. Tablets? Simply an unruly smartphone that's too smart for its own good. Who needs them? Read on for ten reasons why you don't need to bother with this MDM nonsense.
Posted: 20 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Detect Compromised Credentials with Behavioral Analytics
sponsored by Exabeam
WHITE PAPER: User behavior intelligence and security session assembly can help enterprises root out attackers that impersonate employees. Discover how the right solution can help you give more complex tasks to junior security analysts while speeding up data analysis.
Posted: 20 May 2016 | Published: 31 Dec 2014

Exabeam

Detect, Prioritize, and Respond to Modern Cyber Attacks
sponsored by Exabeam
WHITE PAPER: They need the ability to automatically analyze user behavior to respond effectively. Learn how to leverage existing log data to detect modern attacks and prioritize incidents efficiently. Used correctly, user behavior analytics adds a powerful analytics layer over existing security technologies, guiding a more effective response to attacks.
Posted: 20 May 2016 | Published: 31 Dec 2015

Exabeam

Beyond CLM and MDM: Why your Organization needs Unified Endpoint Management (UEM)
sponsored by Matrix42
WHITE PAPER: Unified endpoint management (UEM) combines mobile device management with client lifecycle management to create a new central management environment. Read on to learn more about how UEM works and its benefits for businesses, IT and users.
Posted: 19 May 2016 | Published: 30 Dec 2015

Matrix42

Surfing the Windows 10 Wave with UEM
sponsored by Matrix42
WHITE PAPER: Mobile devices are going largely unmanaged in the workplace. Windows 10 looms large on the horizon. Chaos seems inevitable. Read on to uncover a unified endpoint management solution that will manage all devices across various operating systems and help prepare for the Windows 10 rollout.
Posted: 19 May 2016 | Published: 31 Dec 2015

Matrix42

Tackling Workplace Mobility
sponsored by VMware
WHITE PAPER: 84% of employees use a mobile device during their work day and as mobility takes over the workplace, problems with security, compliance, and cost begin to pop up. Learn more about the mobile takeover and find a solution that tackles these challenges.
Posted: 18 May 2016 | Published: 29 Apr 2016

VMware

Mobile is the New Playground for Thieves
sponsored by IBM MaaS360
WHITE PAPER: You need to modernize your security with a robust way to proactively detect, analyze and remediate new mobile threats. Learn the true cost of a data breach and how to best implement your own BYOD policy.
Posted: 18 May 2016 | Published: 31 Dec 2015

IBM MaaS360

Ten Rules for Bring Your Own Device (BYOD)
sponsored by IBM MaaS360
WHITE PAPER: Bring your own device (BYOD) is the facet of mobility that is leaving many organizations feeling vulnerable. Here are ten rules, each broken down, to keep you on the right track to taking full advantage of all that mobility has to offer.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Enterprise Mobility Management: How Mobile Device Management Exploded to Include Devices, Apps and Content
sponsored by IBM MaaS360
WHITE PAPER: 20% of CIOs reported that their organizations do not have a mobile technology strategy. In order to survive in the mobile-centric world, a nuanced strategy is in order. See how enterprise mobility management has evolved over the past two decades and how to ensure that your organization doesn't fall behind.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

In-depth Analysis on Network Visibility
sponsored by Gigamon
WHITE PAPER: It's time to get real with security realities. Understand how to achieve greater visibility into your network traffic and learn where other organizations stand in the cyber security war.
Posted: 17 May 2016 | Published: 01 Feb 2016

Gigamon

Applying User Behavior Analytics to Prevent Data Loss
sponsored by Exabeam
WHITE PAPER: User behavior analytics (UBA) provides the context needed to evaluate user behavior accurately and efficiently. It focuses on the user handling the data rather than the data itself. Learn how you can pair your DLP tools with UBA to best prevent data loss and exfiltration.
Posted: 16 May 2016 | Published: 01 Apr 2016

Exabeam

Eissmann Group Automotive Evaluates NextGen Firewall F-Series
sponsored by Barracuda Networks
WHITE PAPER: Learn what went into Eissmann Group Automotive's decision to replace their firewall when their existing routers were reaching their performance limits.
Posted: 12 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Safeguard Protected Health Information
sponsored by Citrix
WHITE PAPER: Securing protected health information is a major priority for healthcare organizations and a major challenge since file sharing is such an important aspect of the industry. Learn how you can prevent information leaks while increasing productivity and collaboration.
Posted: 12 May 2016 | Published: 30 Jun 2015

Citrix

IBM QRadar - Sense and Detect Modern Threats with the Most Sophisticated Security Analytics Platform
sponsored by IBM
WHITE PAPER: This white paper shows you how to "sense" chains of malicious activities and rapidly deploy security tools across your entire network including cloud-based resources. Access now to greatly improve your remediation efforts and minimize potential damage to your organization.
Posted: 11 May 2016 | Published: 01 Apr 2016

IBM

Five Critical Rules for Firewall Management: Lessons from the Field
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
Posted: 11 May 2016 | Published: 08 Jun 2011

Dell SecureWorks

A Secure Alternative to Personal File Sharing Services in the Enterprise
sponsored by Citrix
WHITE PAPER: Personal file sharing invites data leakage and compliance violations by allowing files being shared to escape beyond IT's control. Simply blocking network access of personal file sharing services is no longer a viable option. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Posted: 10 May 2016 | Published: 31 Dec 2015

Citrix

Top 5 requirements for secure enterprise file sync and sharing
sponsored by Citrix
WHITE PAPER: The mobile data access challenge poses both risk and opportunities for IT. The use of personal file sharing makes it hard to maintain security of sensitive information. Discover how IT can help employees work and collaborate more effectively from anywhere while supporting the evolution of business mobility enterprise-wide.
Posted: 10 May 2016 | Published: 29 Apr 2016

Citrix

Threat Defense Isn't Just About Detection: It's How Your Respond
sponsored by Intel Security
WHITE PAPER: EDR can mitigate threats before they impact your organization. Discover 5 key factors to look for when researching EDR to best determine which solutions are most proactive in helping to prevent attacks.
Posted: 10 May 2016 | Published: 31 Dec 2015

Intel Security

Top Strategies to Automate Across Your Enterprise Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover the top methods for increasing network efficiency through automation. You'll see how you can begin reducing operational costs and growing the role of automation in the network.
Posted: 06 May 2016 | Published: 29 Apr 2016

Juniper Networks, Inc.

Enterprise Campus Architectures—Transformed
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover in this resource the benefits of collapsing your entire enterprise network into a single platform—including guarantees of increased agility and improved user satisfaction. Read now to deploy cloud network architecture that accommodates your unending need for more bandwidth.
Posted: 05 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

TechTarget's Top 6 Security Measures for the Enterprise Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover a next-generation security model that moves away from traditional security tools. Learn how you can bring together all critical network security elements to provide an integrated security framework for your cloud-enabled enterprise.
Posted: 11 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

Nemertes Research: Re-Architecting the Enterprise Network For WLAN, Cloud, Mobility, Bandwidth, and Cybercrimes
sponsored by Juniper Networks, Inc.
WHITE PAPER: IT professionals continue to embrace new technologies but are they thinking about the infrastructure across which they're to delivering these technologies? Learn how to re-architect the enterprise network and security infrastructure, in light of the momentum towards cloud, mobility, bandwidth-hungry apps, and advanced security threats.
Posted: 09 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

IDC Research: 7 Trends Impacting Enterprise Campus Networks
sponsored by Juniper Networks, Inc.
WHITE PAPER: Reliance upon cloud applications for mission-critical business functions has heightened network requirements at the edge. Discover in this exclusive white paper 7 prevalent issues in today's enterprise campus networks, and how to leverage a cloud-enabled network to seamlessly glue your network edge to the cloud and optimize your cloud applications.
Posted: 06 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.
101 - 125 of 872 Matches Previous Page    3 4 5 6 7 8    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement