IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
126 - 150 of 807 Matches Previous Page  |  Next Page
10 Things Your Next Firewall Must Do
sponsored by Palo Alto Networks
WHITE PAPER: Uncover the 10 things your next firewall must do in order to strike the balance between blocking attacks and allowing mission-critical apps to run when and where you need them.
Posted: 03 Feb 2017 | Published: 31 Dec 2016

Palo Alto Networks

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Firewall Clean Up Recommendations
sponsored by FireMon
WHITE PAPER: At the core of the firewall is the policy that enforces what access is permitted. Discover the benefits of proper firewall policy for your organization and learn the main causes of firewall policy mistakes.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

FireMon

From Reactive to Proactive: How to Avoid Alert Fatigue
sponsored by ThreatConnect
WHITE PAPER: Learn how to prioritize security alerts and reduce alert fatigue. Discover how to achieve active response, allowing you to respond to attacks as quickly as they are detected.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

ThreatConnect

The Case for Modern Network Security Operations
sponsored by Forcepoint
WHITE PAPER: In this ESG white paper, examine how network security operations are completely fraught with challenges that need to be met in order for your organization to effectively protect itself.
Posted: 16 Nov 2016 | Published: 30 Sep 2016

Forcepoint

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

5 Most Dangerous Data Center Security Threats
sponsored by A10 Networks
WHITE PAPER: Gain an in-depth look into the top 5 most dangerous threats to your data center infrastructure. Learn their tricks, behaviors, how devastating they can be and how to make sure your enterprise isn't the next victim.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

A10 Networks

10 Critical Requirements for Optimizing Application Delivery
sponsored by A10 Networks
WHITE PAPER: Learn the 10 capabilities that should be a critical component of your selection criteria when evaluating application delivery controllers, including intelligent traffic management, global load balancing, and more.
Posted: 19 Oct 2016 | Published: 19 Oct 2016

A10 Networks

A New Approach to Securing the Enterprise Network
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper introduces a new concept in implementing enterprise network security, based on three defining principles: Holistic, collaborative, and transformative. Read on to learn more.
Posted: 10 Oct 2016 | Published: 10 Oct 2016

Fortinet, Inc.

Securing Office 365 Is Easier Than You Think
sponsored by Palo Alto Networks
WHITE PAPER: SaaS security concerns can no longer be ignored: Discover how to safely enable Office 365. Read on to address O365-specific security concerns, including details on how to secure O365 from malware insertion and data loss, gain visibility into SaaS usage, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Plan Your Firewall Migration to Increase Security Resilience
sponsored by Ixia
WHITE PAPER: This paper examines best practices for maximizing uptime and achieving high availability during a firewall migration.
Posted: 09 Feb 2017 | Published: 30 Dec 2016

Ixia

5 Ways to Maximize the Value of Security & Monitoring Tools
sponsored by Ixia
WHITE PAPER: ROI is an important factor for evaluating the value of your network security infrastructure. In this white paper, learn how you can start eliminating visibility and security blind spots and extend the life of your monitoring tools.
Posted: 08 Feb 2017 | Published: 30 Dec 2016

Ixia

Fast Breach Mitigation Without Network Disruption
sponsored by Ixia
WHITE PAPER: With network breaches unfolding with growing frequency, your ability to quickly mitigate a crisis begins with knowing where it occurred, and what data was compromised. Discover how to capture the critical data you need to respond more rapidly to emerging situations.
Posted: 08 Feb 2017 | Published: 30 Dec 2016

Ixia

Do You Trust Your Network Security?
sponsored by Ixia
WHITE PAPER: Protecting your network requires a deeper strategy than simply buying security inspection tools, integrating them, and expecting them to comprehensively inspect all of your traffic. Learn how to test your network elements before you go live in order to provide your organization the confidence that your network can survive an attack.
Posted: 06 Feb 2017 | Published: 30 Dec 2016

Ixia

Security Everywhere: A Growth Engine for the Digital Economy
sponsored by Cisco
WHITE PAPER: Learn how security can become an enabler for businesses to take full and secure advantage of opportunities presented by new digital business models and the growing pervasiveness of the IoE.
Posted: 19 Jan 2017 | Published: 19 Jan 2017

Cisco

Content Delivery Networks Take on New Roles
sponsored by Limelight Networks, Inc.
WHITE PAPER: Content delivery networks (CDNs) can pave the way for using rich media in an enterprise but make sure you understand how it works. In this e-guide, Tom Nolle, President of CIMI Corporation dives into how CDNs work, their protection from denial of service attacks and the new mission for CDN providers.
Posted: 12 Dec 2016 | Published: 07 Dec 2016

Limelight Networks, Inc.

Mitigate Security Risks with Hyperconverged Infrastructure
sponsored by SimpliVity
WHITE PAPER: Improve your security posture and best mitigate risks by implementing comprehensive security measures across your entire enterprise - from the network perimeter to the application layer. Discover how a hyperconverged infrastructure limits potential points of attack and consolidates security controls.
Posted: 18 Nov 2016 | Published: 31 Dec 2015

SimpliVity

Masergy's Unified Enterprise Security Solution
sponsored by MASERGY
WHITE PAPER: This white paper explores how Masergy's Unified Enterprise Security Solution provides an integrated approach to security, combining predictive data sharing with an agile analytics and correlation program. Learn how Masergy can help you build an affordable, multi-layered security infrastructure that causes no additional network latency.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

MASERGY

Top 5 Pitfalls to Avoid in Your Data Protection Strategy
sponsored by HDS and Veritas
WHITE PAPER: Discover five critical pitfalls to avoid when building a successful data protection strategy for your organization. Learn how to best navigate the various data protection solutions from digital to physical and private to public clouds while ensuring enterprise scalability.
Posted: 14 Oct 2016 | Published: 30 Sep 2016

HDS and Veritas

Five Essential Elements of Mobile Security
sponsored by vmware airwatch
WHITE PAPER: End users want access to data anytime, anywhere, but enterprise mobility creates increased opportunities for cyberattacks. In this trend brief, you'll review the essential elements of building a mobile security strategy. Access now to learn about ways to construct your strategy and protect data.
Posted: 15 Aug 2016 | Published: 29 Apr 2016

vmware airwatch

Enterprise Mobility: How Mobile Device Management Exploded to Include Devices, Apps and Content
sponsored by IBM MaaS360
WHITE PAPER: Today, nearly every enterprise works with mobile devices, but few know how to maximize their potential. So, how do you turn mobility into a valued asset? Access this white paper to learn about workplace mobility and how to successfully implement a unified mobile policy.
Posted: 09 Aug 2016 | Published: 31 Mar 2016

IBM MaaS360

The Threat Defense Lifecycle: Intelligent Endpoint Threat Defense
sponsored by Intel Security
WHITE PAPER: Adopt a threat defense lifecycle that will allow you to discover threats faster, respond quicker and overall outsmart attackers, driving business efficiency forward. Learn how to then apply these insights to an automated policy that can block similar attack attempts up front.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

Maximize Your VPN to Enhance Cloud Connectivity
sponsored by AT&T
WHITE PAPER: This white paper evaluates the impact of cloud on various enterprise applications; which is, in turn, driving the demand for secure private network connectivity to cloud. Also explained are the business benefits of deploying an integrated MPLS VPN and cloud solution.
Posted: 01 Jul 2016 | Published: 31 Mar 2016

AT&T

Infographic: Health IT Networking Insights, Trends
sponsored by Avaya TSG
WHITE PAPER: How do new and emerging networking technologies affect health IT specifically? Access this infographic to learn how telemedicine, mobile, cloud computing, virtualization, and more, are being used in a healthcare setting to benefit patients, as well as medical professionals.
Posted: 30 Jun 2016 | Published: 31 May 2016

Avaya TSG

Top Reasons for Implementing App Delivery on Hyperconverged Infrastructure
sponsored by Array Networks
WHITE PAPER: Whether you're refreshing your current infrastructure or scaling for new growth, make your infrastructure invisible. Learn the top 10 reasons for deploying an invisible infrastructure at your business.
Posted: 29 Jun 2016 | Published: 28 Jun 2016

Array Networks
126 - 150 of 807 Matches Previous Page    4 5 6 7 8 9    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement