IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network SecurityWhite Papers (View All Report Types)
226 - 250 of 735 Matches Previous Page  | Next Page
A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: As cybercrime continues to grow, denial of service (DoS) attacks have become far more prevalent. This guide explores the current landscape of DoS attacks and what you can do to protect your network.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Citrix

Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks
sponsored by Palo Alto Networks
WHITE PAPER: In this valuable resource, discover a security platform designed to keep up with today's ever-evolving threat landscape, which offers optimum network security without lowering network performance or reducing business productivity.
Posted: 26 Dec 2013 | Published: 31 Aug 2013

Palo Alto Networks

Buyers guide to next-gen firewalls
sponsored by Palo Alto Networks
WHITE PAPER: In this resource, uncover a buyers guide for next-generation firewalls that details all the must-have functions in order to ensure optimum network security. Click now to see how to choose the right solution for your organization's needs.
Posted: 26 Dec 2013 | Published: 26 Dec 2013

Palo Alto Networks

10 Things Your Next Firewall Must Do
sponsored by Palo Alto Networks
WHITE PAPER: This valuable resource highlights the renewed focus on firewalls to improve security given the increasing complexities in network architectures. Click now to explore next-generation firewalls, and 10 things that they must do to protect your organization.
Posted: 24 Dec 2013 | Published: 19 Aug 2013

Palo Alto Networks

The next generation of firewalls for the mobile age
sponsored by Palo Alto Networks
WHITE PAPER: Access this white paper to discover a next-generation firewall that integrates with mobile device management solutions to ensure secure mobile network access from any device that authorized users choose.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Palo Alto Networks

Essentials of Secure Network Access for Remote Workers
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you will discover two options that can maintain a company's network security while also meeting the ever-changing needs of today's constantly mobile workforce and consumer base.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Global Knowledge

Extending Role Security in Analysis Services for SQL Server
sponsored by Global Knowledge
WHITE PAPER: This step-by-step guide describes a method that allows users to extend role security in Analysis Services for SQL Server.
Posted: 13 Dec 2013 | Published: 31 Dec 2013

Global Knowledge

EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager
sponsored by IBM
WHITE PAPER: Many security teams struggle with the limitations of traditional, isolated security tools. For today's complex IT infrastructure, you need a comprehensive, integrated way to manage the security of your applications, network, and data.
Posted: 06 Dec 2013 | Published: 03 Jul 2013

IBM

Are your DNS Servers as Secure and Available as the Rest of Your Network?
sponsored by Infoblox
WHITE PAPER: Did you know that DNS is probably a hole in your security? Fortunately, this white paper gives you information about how to protect your servers. Read on to learn what you can do to protect your organization.
Posted: 03 Dec 2013 | Published: 30 Sep 2013

Infoblox

Why You Need A Next-Generation Firewall
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Hewlett-Packard Company

Frost & Sullivan: Continuous Compliance and Next Generation NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Let's face it, cybercrime is growing and attacks are becoming far more prevalent. This guide explores the role of NAC in securing your network and how it is important to keep your network up-to-date as BYOD and mobility continue to rise.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

ForeScout Technologies, Inc.

ESG Market Report: The EVAS Market - The Evolution of NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: For many businesses, network access control is essential for their network security since the days of Ethernet and IP. This guide outlines the history of network access control and how you can implement more effective policies to secure your network.
Posted: 27 Dec 2013 | Published: 31 Jul 2013

ForeScout Technologies, Inc.

Taming the Integration Nightmares of a 1,000 App Enterprise
sponsored by Palo Alto Networks
WHITE PAPER: Access this informative white paper today, which highlights an innovative integration approach that will enable you to significantly boost business agility and cost control.
Posted: 26 Dec 2013 | Published: 28 Jan 2014

Palo Alto Networks

Checklist: 5 Impactful Tips for Securing BYOD in the Enterprise
sponsored by Code42
WHITE PAPER: This comprehensive checklist includes 5 critical things to consider when constructing a mobile security strategy so that your organization can confidently utilize BYOD initiatives without worry of risk.
Posted: 24 Dec 2013 | Published: 24 Dec 2013

Code42

Seeding Clouds on Power Systems with IBM SmartCloud Entry - Executive Summary
sponsored by IBM
WHITE PAPER: As cloud computing continues to grow, businesses are looking to decide which strategy is best for them. This guide explores a range of cloud services and how it will fit in with your system.
Posted: 23 Dec 2013 | Published: 31 Jan 2012

IBM

Secure virtual desktop infrastructure with Citrix NetScaler and Palo Alto Networks Next Generation Firewall
sponsored by Citrix and Palo Alto Networks
WHITE PAPER: As desktop virtualization continues to grow in popularity, organizations are looking to optimize their potential benefits. This guide explores virtual desktop infrastructure, potential implementation challenges and how to overcome these challenges.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Citrix and Palo Alto Networks

Top 10 Considerations for Deploying Lync on Smartphones and Tablets
sponsored by Aruba Networks
WHITE PAPER: Microsoft Lync is becoming an increasingly important part of enterprise telephony by offering a more collaborative interaction. This brief guide outlines the top ten considerations for deploying Microsoft Lync on smartphones and tablets.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

Aruba Networks

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Compliance Management's Seven Steps to Success
sponsored by Infoblox
WHITE PAPER: Failure to meet compliance can result in fines, dangerous network exposure and damage to a company's reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.
Posted: 26 Nov 2013 | Published: 31 Jul 2013

Infoblox

Defending Against Denial of Service Attacks
sponsored by F5 Networks
WHITE PAPER: Access this white paper for key information about how denial of service (DoS) attacks have taken advantage of the lack of security and compliance measures around network availability. Read on to learn how you can leverage networks and applications to defend against these threats.
Posted: 25 Nov 2013 | Published: 31 Oct 2012

F5 Networks

Automation: The Future of Network Visibility
sponsored by Ixia
WHITE PAPER: As the trend towards data center automation continues, network monitoring becomes increasingly important when optimizing your network. In this white paper, they will explore the data center automation and its importance to company performance and efficiency.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Ixia

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: It is becoming increasingly important for service providers to support lawful data intercept requests. This guide explores data intercepts and how they are expanding far into the data world.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Ixia

Integrating security with HP TippingPoint
sponsored by HP & Intel®
WHITE PAPER: Access this resource to explore the key features of an intrusion prevention system (IPS) solution that keeps highly-virtualized, hybrid-delivered cloud services secure while ensuring top delivery performance.
Posted: 22 Nov 2013 | Published: 30 Nov 2012

HP & Intel®

Strong Authentication: Achieve the Level of Identity Assurance You Need
sponsored by HID
WHITE PAPER: In this resource, uncover the growing need for stronger authentication systems that manage user credentials across various levels of access, ensuring security from any device or location.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

HID

3 Major Consequences of Free File Sharing
sponsored by Infrascale
WHITE PAPER: This paper will identify three data loss incidents that were cause specifically by free file sharing and what could have been done to prevent them.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Infrascale
226 - 250 of 735 Matches Previous Page    8 9 10 11 12 13    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement