IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network SecurityWhite Papers (View All Report Types)
226 - 250 of 689 Matches Previous Page  | Next Page
Protecting Your Enterprise Network
sponsored by Infoblox
WHITE PAPER: This comprehensive white paper provides deeper insight into enterprise IT security threats and the implementation of modern tools that are available to build more robust domain name server (DNS) infrastructures, including DNS firewalls to close security gaps.
Posted: 23 Sep 2013 | Published: 30 Aug 2013

Infoblox

Disaster Preparedness for Core Network Services
sponsored by Infoblox
WHITE PAPER: This in-depth white paper details the potential of network failure and how building a more resilient network infrastructure can cut back on time lost during disaster recovery.
Posted: 18 Sep 2013 | Published: 31 Jan 2013

Infoblox

Top Five DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 13 Sep 2013 | Published: 31 May 2013

Infoblox

Five Pillars for Controlling Firewall ACLs and Rules
sponsored by Infoblox
WHITE PAPER: Read this white paper to learn how to leverage automation to shorten time to deploy, improve staff efficiency and maintain a secure network.
Posted: 11 Sep 2013 | Published: 31 Jan 2013

Infoblox

Defeating Advanced Persistent Threat Malware
sponsored by Infoblox
WHITE PAPER: How can you protect your organization from APT Malware?  Read this whitepaper to learn why a DNS Firewall implementation is a MUST for your organization and how the Infoblox DNS Firewall may be the industry's first true DNS security solution.
Posted: 10 Sep 2013 | Published: 31 Jan 2013

Infoblox

Beyond the Next Generation: Meeting the Converging Demands of Network Security
sponsored by IBM
WHITE PAPER: Read this whitepaper to learn more about rising to the converging demands of network security. Topics covered include the evolution of network security, the development of "next-generation" approaches, use cases and more.
Posted: 04 Sep 2013 | Published: 30 Sep 2012

IBM

NSA Series data sheet
sponsored by Dell Software
WHITE PAPER: In this data sheet, see how your organization can be both secure and productive without compromising network performance thanks to Dell's SonicWALL™ NSA Series next-generation firewalls.
Posted: 23 Aug 2013 | Published: 30 Jun 2013

Dell Software

A New Set of Network Security Challenges
sponsored by Dell Software
WHITE PAPER: In this e-book, IDG discusses a new set of network security challenges as companies try to balance productivity and security. Download your copy today.
Posted: 23 Aug 2013 | Published: 23 Aug 2013

Dell Software

How to Build a Massively Scalable Next-Generation Firewall
sponsored by Dell Software
WHITE PAPER: Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. It also outlines the kind of technical innovations needed to produce a massively scalable NGFW, and results from a benchmark test comparing the four leading next-generation firewalls.
Posted: 23 Aug 2013 | Published: 23 Aug 2013

Dell Software

Unchain your network with application intelligence and control
sponsored by Dell Software
WHITE PAPER: This paper discusses the new risks of Web-based applications, and offers best practices for gaining control of applications, data and bandwidth.
Posted: 23 Aug 2013 | Published: 31 Jul 2012

Dell Software

Leverage Security Intelligence for Energy and Utilities Companies
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 21 Aug 2013 | Published: 31 Jul 2013

IBM

A Foundation for Next-Generation Data Center Security
sponsored by Citrix
WHITE PAPER: This white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing datacenter infrastructure.
Posted: 13 Aug 2013 | Published: 28 Sep 2012

Citrix

9 Reasons Why NetScaler Beats F5
sponsored by Citrix
WHITE PAPER: This whitepaper compares two market-leading application delivery controllers (ADCs) to help your organizations find the one that best aligns with your business needs.
Posted: 12 Aug 2013 | Published: 31 May 2013

Citrix

Wireless Solutions for Tablets and Smartphones
sponsored by Xirrus
WHITE PAPER: As the popularity of mobility grows, so do the challenges for IT. This resource explores how you can transform mobility from an IT challenge into a business opportunity by designing and managing a better wireless network.
Posted: 02 Aug 2013 | Published: 31 Dec 2011

Xirrus

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett-Packard Company

Common Telecom Challenges and How to Overcome Them
sponsored by Unimax
WHITE PAPER: This white paper details the day-to-day challenges telecom and IT departments face and how leveraging advanced technology together with an innovative approach to solving those telecom challenges simplifies moves, ads and changes (MACs) for help desk agents to understand and execute.
Posted: 06 Sep 2013 | Published: 06 Sep 2013

Unimax

Network Forensics in a 10G World
sponsored by WildPackets, Inc.
WHITE PAPER: This resource outlines the challenges inherent to 10G network forensics, explains why traditional network analysis is ineffective, and offers guidance on how to build and deploy effective forensics in a 10G world.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

WildPackets, Inc.

Next-Generation Firewalls (NGFWs)
sponsored by AlgoSec
WHITE PAPER: This paper will highlight tips to effectively implement next-generation firewalls and optimize policies so that you can enjoy the clear benefits without falling into overly complex, unmanageable and risky policy traps.
Posted: 27 Aug 2013 | Published: 31 Dec 2012

AlgoSec

Voice over IP (VoIP) Growth and the Strain on Network Security
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Explore how VoIP can expose your organization to numerous risks and uncover why traditional firewalls often cannot thwart the many challenges VoIP presents.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

WatchGuard Technologies, Inc.

4 Questions to Ask When Evaluating Network Security Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.
Posted: 21 Aug 2013 | Published: 21 Aug 2013

WatchGuard Technologies, Inc.

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

Disaster Preparedness for Core Network Services
sponsored by Infoblox
WHITE PAPER: This white paper will take a look at how failures can unexpectedly disrupt core network services and the applications that depend on them despite employing traditional approaches to providing redundant configurations. Read this white paper to learn how to minimize the effects of failures to ensure business continuity.
Posted: 15 Aug 2013 | Published: 31 Jan 2013

Infoblox

Delivering IT to the Virtual Workforce
sponsored by Citrix
WHITE PAPER: Uncover the four key requirements of workshifting, the technologies needed to achieve them, and the solutions that can provide these capabilities to your organization.
Posted: 13 Aug 2013 | Published: 30 Jun 2011

Citrix

Delivering enhanced BYOD infrastructure with the Dell Networking W-Series Wireless portfolio
sponsored by Dell, Inc.
WHITE PAPER: Realizing the value of bring-your-own-device (BYOD) is only possible with a secure and flexible wireless solution in place. This resource explores the challenges of BYOD and the need for wireless connectivity in a wide range of industries, and offers guidance to help you get started.
Posted: 05 Aug 2013 | Published: 31 Jul 2013

Dell, Inc.

Strategy guide to business protection for physician practices
sponsored by HP and Intel® Xeon® processors
WHITE PAPER: This white paper demonstrates how hospitals can manage risk and keep critical IT infrastructure up and running. Read now to learn how HIT leaders can ensure a high availability IT infrastructure that can improve service and protect their business.
Posted: 01 Aug 2013 | Published: 15 Nov 2012

HP and Intel® Xeon® processors
226 - 250 of 689 Matches Previous Page    8 9 10 11 12 13    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement