IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
226 - 250 of 873 Matches Previous Page  |  Next Page
Is Your Network Security Limited to Defending Yesterday's Threats?
sponsored by IBM
WHITE PAPER: In this infographic, you will discover how to safeguard your organization from new and emerging threats with a next-gen IPS. Read on how to move beyond pattern matching and apply behavior-based protection to combat advanced and unknown threats to defend your organization.
Posted: 25 Jan 2016 | Published: 03 Nov 2015


A Definitive Guide to Windows 10 Management for Your Enterprise
sponsored by VMware
WHITE PAPER: This white paper will help you evolve your Windows management from a disruptive PC-centric approach to one that offers maximum flexibility. Discover how to leverage conventional Windows management tools utilized today, and delve into the specific management technologies that W10 requires.
Posted: 25 Jan 2016 | Published: 30 Nov 2015


The Top 5 Tasks to Automate for Privileged Account Management and Security
sponsored by Thycotic
WHITE PAPER: In this white paper, you will discover the top 5 tasks to automate for privileged account management. Access this paper to keep up with the scale and scope of the networks and systems your IT must manage.
Posted: 22 Jan 2016 | Published: 31 Dec 2015


Importance of User Behavior Analytics for Cloud Service Security
sponsored by Palerra Inc.
WHITE PAPER: Traditional security solutions can't keep up with the growing sophistication of today's attacks. To combat modern threats, many organizations are turning to user behavior analytics (UBA) to focus on finding vulnerabilities quickly. View this white paper to examine the effectiveness of UBA and decide if it can benefit your defense strategy.
Posted: 19 Jan 2016 | Published: 04 Dec 2015

Palerra Inc.

How to Overcome Distributed Network Security Risks
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper examines into how you can overcome the major network security risks facing distributed retail environments today. Learn how to build and maintain a secure network, protect cardholder data, and more.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

WatchGuard Technologies, Inc.

A Practical Guide to Combating Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper features research based on thousands of pieces of malware they detected over the course of one year. Access this guide for details on four capabilities designed to help protect your organization against next-generation network threats.
Posted: 18 Jan 2016 | Published: 30 Sep 2014

WatchGuard Technologies, Inc.

The right way to manage remote and mobile workers
sponsored by LogicNow
WHITE PAPER: This whitepaper discusses some of the best ways to manage and protect your mobile workforce, such as setting up certain policies and key tools that can help.
Posted: 18 Jan 2016 | Published: 18 Jan 2016


The 10 Essential Network Security Best Practices for 2016
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this infographic, you will discover the top 10 essential, expert-recommended security best practices for identifying issues in real time and addressing the majority of attacks anticipated in 2016. Access this graphic to bolster your network defenses and prepare for ransomware that targets Android devices and Mac laptops, and more.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

WatchGuard Technologies, Inc.

8 Reasons why Users are Rethinking their SIEM Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief yet informative infographic highlights eight reasons why having the right SIEM approach is critical to productivity, compliance and ROI. Read on to determine if your current SIEM practices are doing the most for your network security.
Posted: 11 Jan 2016 | Published: 11 Jan 2016

LogRhythm, Inc.

Combating the Insider Threat: Your Guide to Staying Secure
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource explores the danger of insider threats and provides suggestions on preventing them. Read on to learn why you need to focus your security inward and what practices will help you do so.
Posted: 05 Jan 2016 | Published: 31 Dec 2015

Cisco Systems, Inc.

Threat Intelligence Platforms: Everything You’ve Ever Wanted to Know But Didn’t Know to Ask
sponsored by ThreatConnect
WHITE PAPER: Today's cyber-threats are relentless, and they come in all forms. This in-depth resource covers the ins and outs of threat intelligence, discussing everything from what threat intelligence is to how you can best utilize it.
Posted: 15 Dec 2015 | Published: 15 Dec 2015


Critical Capabilities for Security Information and Event Management (SIEM)
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this Gartner report for insight on aligning IT's needs with 3 key use cases to choose the best SIEM tool for your organization.
Posted: 12 Nov 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

Compliant Calling: How Mobile Industry Regulations Influence Financial Services
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will discover how to enforce the highest standard of call compliance in your enterprise by ensuring mobile calls are recorded and under the control of network administrators. Access this white paper to understand how financial organizations are addressing the challenges of mobile call recording compliance.
Posted: 18 Jan 2016 | Published: 18 Jan 2016


A Proactive Approach to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: Discover how to move to a proactive incident response model to stop cyber-attacks before they can steal data or harm your reputation. Read on and learn what steps to take to achieve proactive IR.
Posted: 08 Jan 2016 | Published: 19 Aug 2015

Blue Coat Systems

SSL/TLS Visibility: Determining Your Network Security Blind Spot Cost
sponsored by Blue Coat Systems
WHITE PAPER: This white paper will assist you in calculating the cost of leaving the SSL/TLS network security blind spot open to hackers and presents strategies to mitigate risks.
Posted: 08 Jan 2016 | Published: 16 Dec 2015

Blue Coat Systems

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and describes how encrypted traffic management can help mitigate these risks.
Posted: 07 Jan 2016 | Published: 09 Dec 2013

Blue Coat Systems

Detect and Thwart Insider Threats
sponsored by Lancope
WHITE PAPER: This white paper discusses how you can stop insider threats with enhanced network visibility. Read on to learn how to keep your organization secure from the inside out.
Posted: 05 Jan 2016 | Published: 31 Dec 2015


Detect Network Anomalies with the Right Netflow Analysis Tool
sponsored by Lancope
WHITE PAPER: In this article, a security expert discusses how he found a security tool that met his netflow analysis needs. Read on and learn how you can obtain the deep network insights necessary for stopping advanced hacks in your organization.
Posted: 04 Jan 2016 | Published: 18 Nov 2014


Case Study: School District Stops Breaches with Heightened Network Visbility
sponsored by Lancope
WHITE PAPER: Access this case study to discover how a large school district blocked breaches with network visibility, improved its incident response time, and more.
Posted: 30 Dec 2015 | Published: 30 Dec 2015


Breaking the Cyber Attack Lifecycle
sponsored by Palo Alto Networks
WHITE PAPER: This white paper discusses the modern landscape of cybersecurity, and how enterprises can detect and prevent attacks at every stage of the attack lifecycle, and remain agile in the face of advanced attacks.
Posted: 10 Dec 2015 | Published: 31 Mar 2015

Palo Alto Networks

Predictive Mobile Threat Defense
sponsored by Skycure
WHITE PAPER: This white paper explains the 3 reasons why traditional mobile security approaches can no longer protect users and organizations. Access this resource now to learn how to advance mobile security into a next-gen mobile threat defense to protect networks, apps, and users.
Posted: 03 Dec 2015 | Published: 11 Nov 2015


Top IT Security Concerns
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper shares the top 5 security priorities that concerned network security professionals over the last year.
Posted: 17 Nov 2015 | Published: 08 Apr 2015

Fortinet, Inc.

What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: Learn how to uncover the what, when, and how of security incidents to fortify your security strategy against increasingly sophisticated attacks. Examine the shortcomings of conventional breach investigation approaches and how to build intelligence to navigate investigations faster and easier in this helpful whitepaper.
Posted: 12 Nov 2015 | Published: 14 Apr 2014


New Buyers of SSL Certificates FAQs
sponsored by Symantec Website Security Solutions
WHITE PAPER: Industry analyst Chris Kissel presents and answers the top FAQs asked by new SSL certificate buyers to ease the purchasing process.
Posted: 09 Nov 2015 | Published: 14 Oct 2015

Symantec Website Security Solutions

Solidify Your Network Protection with Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper you will learn the ins and outs of deploying an ISFW. Learn how to protect your company from the latest advanced security threats and compartmentalize access to sensitive data and apps.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.
226 - 250 of 873 Matches Previous Page    8 9 10 11 12 13    Next Page
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement