IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
176 - 200 of 902 Matches Previous Page  |  Next Page
IT Executive Guide to Security Intelligence
sponsored by IBM
WHITE PAPER: Many organizations lack accurate threat detection and informed risk-management capabilities. Access this white paper and learn how security intelligence can address these shortcomings – and critical concerns in 6 key areas – to maintain comprehensive and cost-effective information security.
Posted: 18 Feb 2016 | Published: 17 Jun 2015

IBM

Network Forensic Investigations Market Study
sponsored by IBM
WHITE PAPER: In this white paper, find out how forensic tools are being used and where organizations are falling short in their investigative security strategies.
Posted: 18 Feb 2016 | Published: 30 Dec 2014

IBM

Today's Top Intrusion Prevention Systems
sponsored by IBM
WHITE PAPER: This Magic Quadrant presents the strengths and weaknesses of today's top next-generation intrusion prevention system (NGIPS) vendors and outlines what capabilities your security strategy needs. View now to learn how to evaluate NGIPS vendors and platforms.
Posted: 18 Feb 2016 | Published: 16 Nov 2015

IBM

Next Generation Intrusion Prevention System (NGIPS) Test Report
sponsored by IBM
WHITE PAPER: This white paper presents the recent test results of IBM's latest NGIPS network security solution.
Posted: 17 Feb 2016 | Published: 02 Dec 2015

IBM

Vendor Comparisons for Fifteen SIEM Products
sponsored by IBM
WHITE PAPER: This Gartner report can help you navigate the multitude of SIEM options available in today's marketplace and select the one that's right for you. Take a look to learn the strengths, weaknesses, and capabilities of fifteen leading SIEM products.
Posted: 17 Feb 2016 | Published: 20 Jul 2015

IBM

Secure Enterprise Mobility: Leverage Real-Time Context to Mitigate Today's Risks
sponsored by Aruba Networks
WHITE PAPER: With the current shift toward mobility becoming the business norm, security needs to be your top priority. Discover how to protect BYOD workflows and deliver secure enterprise-class mobility and learn about mobile security best practices.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Aruba Networks

Rethinking remote access: Centralize your mobile operations
sponsored by Aruba Networks
WHITE PAPER: There's a gap in productivity caused by traditional remote access. Discover a remote access point solution that integrates your network operations and security requirements.
Posted: 17 Feb 2016 | Published: 17 Feb 2016

Aruba Networks

A Dynamic, Integrated System Designed to Disrupt the Lifecycle of Advanced Attacks and Help Prevent Loss
sponsored by IBM
WHITE PAPER: In this white paper, learn how you can stay ahead of advanced threats by leveraging an integrated system that can disrupt the entire lifecycle of an attack, evolve to prevent new threats, and more. Additionally, explore the ways one threat protection system can address today's most pressing security concerns.
Posted: 16 Feb 2016 | Published: 30 Jun 2015

IBM

Security Intelligence Platforms Review
sponsored by IBM
WHITE PAPER: IT professionals weigh in on SIEM options and benefits in this independently conducted study from the Ponemon Institute.
Posted: 16 Feb 2016 | Published: 28 Feb 2014

IBM

Comprehensive Protection from Today's Evolving Threats
sponsored by IBM
WHITE PAPER: Security should enhance network performance – not detract from it. Discover how an integrated security strategy can create comprehensive protection from today's evolving threats, without compromising the performance and reliability of your network.
Posted: 16 Feb 2016 | Published: 31 Mar 2013

IBM

Top 10 Database Security Threats
sponsored by Imperva
WHITE PAPER: Read this paper to understand the top 10 database threats and how you can protect your most valuable assets.
Posted: 16 Feb 2016 | Published: 30 Dec 2015

Imperva

Mobility and the New Face of Security Threats
sponsored by Aruba Networks
WHITE PAPER: In this white paper, you will examine the new face of security threats against today's enterprise mobility struggles. Read on to bolster your network by tying together granular contextual information from devices to policy engine and traffic protection.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

Aruba Networks

10 Things Your Cybersecurity Solution Must Do
sponsored by Palo Alto Networks
WHITE PAPER: As cybercrime evolves, so must your defence strategy to secure your organisation; however, multiple tools often do not mesh perfectly and vulnerabilities are left open. In this white paper, learn the 10 must-have security capabilities for your strategy.
Posted: 15 Feb 2016 | Published: 23 Dec 2015

Palo Alto Networks

Building a Trust-Based Internet of Things
sponsored by Aruba Networks
WHITE PAPER: This white paper discusses the security you need to implement as the IoT pervades every part of the enterprise. Included within is a description of how the IoT is changing certain industries specifically, and what you'll need to do to secure your business.
Posted: 15 Feb 2016 | Published: 31 Dec 2015

Aruba Networks

End-to-End Security for Next-Generation Distributed Healthcare
sponsored by Fortinet, Inc.
WHITE PAPER: Discover an end-to-end network security solution for next-generation distributed healthcare. Learn how to enable patient interaction through mobile devices and apps while protecting data and delivering high-speed performance and universal access.
Posted: 18 Feb 2016 | Published: 11 Jun 2015

Fortinet, Inc.

Network Security for the Digital Classroom
sponsored by Fortinet, Inc.
WHITE PAPER: Access this brief resource to uncover top network security strategies for educational institutions. Discover how you can efficiently manage bandwidth, protect data, and meet compliance standards in the classroom.
Posted: 18 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

7 Best Practices of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper give you steps you should take and point of interest you should review in your network security.
Posted: 17 Feb 2016 | Published: 27 Jan 2016

Alert Logic

Higher Education Network Security: Satisfying Today's Bandwidth-Hungry Students
sponsored by Fortinet, Inc.
WHITE PAPER: This resource presents a strategy that helped a leading higher education institution protect their network without slowing it down or affecting availability. Learn about benefits like in-depth visibility and reporting of network activities, identity-centric authentication for device security, and much more.
Posted: 17 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

Secure Wireless LAN for Uninterrupted Clinical Applications
sponsored by Fortinet, Inc.
WHITE PAPER: This resource presents a solution that addresses the security and performance requirements for uninterrupted clinical applications, with the least amount of administrative complexity.
Posted: 16 Feb 2016 | Published: 29 Jul 2015

Fortinet, Inc.

Advanced Threat Protection for the Healthcare Industry
sponsored by Fortinet, Inc.
WHITE PAPER: View this white paper to discover how you can prevent, detect, and mitigate security risks in the healthcare industry with an advanced threat protection framework. Learn how you can experience benefits like network protection, endpoint protection, email security, and more.
Posted: 16 Feb 2016 | Published: 24 Jul 2015

Fortinet, Inc.

Secure Patient Records from Cyberattacks
sponsored by Fortinet, Inc.
WHITE PAPER: This resource describes the most common kinds of healthcare cyberattacks and presents a way to protect critical systems and patient data. Learn about a strategy to ensure the safety of every patient's medical records without having to choose between performance and security for your applications and networks.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Secure Wi-Fi for K-12 Education
sponsored by Fortinet, Inc.
WHITE PAPER: Mobile devices present new security challenges for schools that need to protect their network integrity as well as restrict students' access to dangerous sites. Access this resource to learn about a solution that unifies network and application security and delivers maximum control at a low cost.
Posted: 16 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

Case Study: Increasing Bandwidth and Network Security
sponsored by Fortinet, Inc.
WHITE PAPER: This case study details how one leading university was able to bolster its network security as bandwidth increased. View now to learn how they achieved this goal and the benefits they were able to reap.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

Fortinet, Inc.

2016 Security Predictions: Understanding the Most Serious Threats and How to Protect Against Them
sponsored by A10 Networks
WHITE PAPER: This security predictions guide highlights 5 emerging threats of 2016. Armed with tactics to stay steps ahead of cybercriminals, you'll feel good about leading your team through the trenches as you mitigate IoT, mobile, and cloud risks.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

A10 Networks

Solution Brief: Satisfying Today's Bandwidth Hungry Consumers
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights a high performance next generation firewall solution that protects information and applications without slowing down your network or affecting availability. Read on to see how this firewall solution can provide your enterprise with in-depth visibility and reporting, highly effective intrusion prevention system, and more.
Posted: 12 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.
176 - 200 of 902 Matches Previous Page    6 7 8 9 10 11    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement