IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network SecurityWhite Papers (View All Report Types)
26 - 50 of 702 Matches Previous Page  | Next Page
Use Case: Secure Internet Access for 71,000 Australian Students
sponsored by Websense, Inc.
WHITE PAPER: This white paper describes a use case involving an Australian educational in need of a centralized, scalable solution in order to distribute materials to 45,000 users per day in safe, easily accessible manner.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Websense, Inc.

Secure Mobile Access
sponsored by Dell Software
WHITE PAPER: Discover how to enhance mobile productivity among employees by using converged technology that combines the best of management and security capabilities.
Posted: 06 Aug 2014 | Published: 01 Mar 2014

Dell Software

McAfee Next Generation Firewall
sponsored by McAfee, Inc.
WHITE PAPER: This resource provides an inside glance at McAfee's next generation firewall (NGFW) solution that stands apart from the crowd.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

McAfee, Inc.

Simplified & Agile Networks: A Platform for Innovation
sponsored by HP
WHITE PAPER: Your network has always been a fundamental to business, but as cloud computing and mobility gain traction it becomes more important than ever to maintain and keep it flexible and agile.
Posted: 05 Aug 2014 | Published: 05 Aug 2014

HP

Advanced Attacks Demand New Defenses
sponsored by McAfee, Inc.
WHITE PAPER: Find out how your business should fight back against cyber-criminals utilizing APTs.
Posted: 04 Aug 2014 | Published: 28 Feb 2014

McAfee, Inc.

The ABCs of Mobile Device Management
sponsored by IBM
WHITE PAPER: Securely managing mobile devices, apps and docs can be difficult without the right tools. However, with so many options employees have when a BYOD campaign is set in place, differences in operating systems and hardware create even more trouble.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

IBM

Protect Against Advanced Evasion Techniques
sponsored by McAfee, Inc.
WHITE PAPER: This white paper explores a next generation firewall (NGFW) solution that takes on the challenges of network security.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

McAfee, Inc.

The Top 20 Critical Security Controls for Effective Cyber Defense
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper outlines how LogRhythm's Security Intelligence Platform maps directly to each of the 20 Critical Security Controls, developed by the SANS Institute to help prioritize the most effective methods and policies to safeguard assets, information, and infrastructure.
Posted: 31 Jul 2014 | Published: 31 Jan 2014

LogRhythm, Inc.

LogRhythm's Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm's Security Intelligence Platform, which combines enterprise-class SIEM, Log Management, File Integrity Monitoring, and Machine Analytics with Host and Network Forensics to provide profound visibility into threats and risks to which organizations are otherwise blind.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Identity Analytics: Exposing the "Who" in Anonymous Log and Machine Data
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper discusses LogRhythm's Identity Inference Engine™, which combines already-collected machine data with advanced analytics to automatically identify who is responsible for activities in your IT environment, a critical component of maintaining a secure network.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

LogRhythm Labs Embedded Expertise
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm Labs, an organization within LogRhythm that performs dedicated research to continually enhance the Security Intelligence Platform with embedded machine data intelligence, real-time threat detection, and automated compliance assurance.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Get the most from the move to a next-generation firewall
sponsored by McAfee, Inc.
WHITE PAPER: This white paper will help network and cybersecurity teams understand the things they can and should demand from next-generation firewalls.
Posted: 30 Jul 2014 | Published: 31 Dec 2013

McAfee, Inc.

From BlackBerry to BYOD
sponsored by Citrix
WHITE PAPER: This white paper discusses mobile device management tools and other solutions for enterprises in the era of BYOD and mobile device diversity.
Posted: 30 Jul 2014 | Published: 31 Dec 2013

Citrix

How Managed Endpoint Security Can Help Expand Your Managed Services Business
sponsored by N-able Technologies
WHITE PAPER: In this white paper, learn how utilizing a single integrated management platform for malware protection can help Managed Service Providers (MSPs) streamline and standardize their security efforts, and the many benefits of implementing managed endpoint security for MSPs and their customers.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

N-able Technologies

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by LogRhythm, Inc.
WHITE PAPER: Check out this Magic Quadrant report for security information and event management to see how leading vendors compare and contrast.
Posted: 29 Jul 2014 | Published: 25 Jun 2014

LogRhythm, Inc.

Data Center Trends and Network Security Impact
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper reviews the major data center trends that enterprises and service providers should be preparing for, as well as their anticipated impact on network security.
Posted: 29 Jul 2014 | Published: 31 Dec 2012

Fortinet, Inc.

DNS Challenges in a Changing Landscape
sponsored by F5 Networks
WHITE PAPER: This infographic provides a number of statistics that illustrate the current challenges of deploying an available, secure, high-performance DNS (Domain Name System) infrastructure.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

F5 Networks

Keeping Your Data Center Ahead of the Curve with New High Performance Solutions
sponsored by Fortinet, Inc.
WHITE PAPER: Explore this informative white paper to find out how to accommodate the evolving security requirements for networks, and take full advantage of the opportunities presented by the latest trends.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

Fortinet, Inc.

FortiOS® 5 Network Security Operating System
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover the key features of an industry-leading, next-gen firewall option.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

Fortinet, Inc.

Are you Ready for the Future of IT?
sponsored by Cisco Systems, Inc.
WHITE PAPER: Find out how you can utilize the technologies of today to create new business opportunities and prepare for the future of IT.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

Cisco Systems, Inc.

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by IBM
WHITE PAPER: This highly informative white paper from Gartner objectively evaluates a variety of SIEM technologies on a number of critical dimensions, including market responsiveness, customer experience, and pricing.
Posted: 24 Jul 2014 | Published: 25 Jun 2014

IBM

Enhanced Security Intelligence Enables Organizations to Reap Proven Rewards
sponsored by CDW Corporation
WHITE PAPER: Read now to learn more about this company's advanced security solutions, which work in conjunction with one another to leverage your enterprise's security, efficiency, compliance, and enablement.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

CDW Corporation

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
WHITE PAPER: This white paper explores the growing world of mobile application development and highlights the benefits of providing security for mobile applications during the development and deployment stages.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

IBM

Next-Generation Security: Intrusion Prevention Systems
sponsored by CDW Corporation
WHITE PAPER: This white paper describes how an intrusion prevention system (IPS) works and why it's more effective than traditional firewalls in analyzing your network activity to detect and prevent problems.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation

Keeping Advanced Persistent Threats in Check
sponsored by CDW Corporation
WHITE PAPER: This white paper provides valuable information on APTs and proposes one company's comprehensive next-generation security solution.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation
26 - 50 of 702 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement