IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
26 - 50 of 777 Matches Previous Page  |  Next Page
Security Services for Defeating Sophisticated Attacks
sponsored by CrowdStrike
WHITE PAPER: This white paper discusses what you can achieve with the right people looking out for your security.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

CrowdStrike

Mobility-as-a-Service: See What's New in Workforce Mobility
sponsored by Sprint
WHITE PAPER: High device prices and complex management requirements can fall short when you're in the process of rethinking your mobility. This white paper examines a new mobility-as-a-service platform. Read on to learn how you can receive new and improved wireless service benefits.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

Sprint

Modern-Day SDN Gets an Interoperability Facelift
sponsored by Citrix
WHITE PAPER: Existing architectures have proven inadequate for rapid deployment of applications. As interoperability grows among vendors, Software Defined Networking (SDN) is moving beyond the purely theoretical. This white paper advises you on implementing more efficient and effective approaches to application server load balancing.
Posted: 31 Jul 2015 | Published: 31 Jan 2015

Citrix

Safeguarding Data and the Mobile Enterprise
sponsored by IBM
WHITE PAPER: As enterprises explore the use of mobile applications, new processes have to be built to secure these applications against compromise. This white paper addresses the unique risks associated with mobile devices, and the capabilities you should consider when building your roadmap to safeguarding data and applications.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

IBM

Case Study: Achieving Next Generation Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: This case study describes how a managed care provider strengthened its security by obtaining visibility into all endpoints across the network.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

Make Your Security Proactive, Not Reactive
sponsored by CrowdStrike
WHITE PAPER: This report explains how indicators of attack – suspicious behaviors that can alert organizations to a potential hacks – can be instrumental in preventing sophisticated, targeted attacks.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

Cyber Attack Survival Checklist
sponsored by CrowdStrike
WHITE PAPER: This cyber-attack survival checklist will help you avoid common mistakes and eliminate deficiencies within your existing security measures.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

Strengths and Weaknesses of 13 SIEM Solutions
sponsored by AlienVault
WHITE PAPER: This Gartner report provides detailed reviews of the strengths and weaknesses of 13 different SIEM solutions.
Posted: 30 Jul 2015 | Published: 20 Jul 2015

AlienVault

A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: This white paper examines the modern DoS landscape, and provides several solutions in dealing with current DoS threats, given their fast-growing numbers.
Posted: 28 Jul 2015 | Published: 31 Jan 2015

Citrix

Beyond Malware: Detecting the Undetectable
sponsored by CrowdStrike
WHITE PAPER: This report details how successful attacks targeting high-profile government and corporate entities are able to easily bypass traditional defenses.
Posted: 27 Jul 2015 | Published: 27 Jul 2015

CrowdStrike

Defend Web Properties from Modern Threats with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: This white paper examines the challenges of, and provides a solution for, a defense against new enterprise application threats. Read on to learn how you can reduce security risk by thwarting advanced malware.
Posted: 27 Jul 2015 | Published: 30 Jan 2015

Citrix

The Definitive Guide to Mobile Application Management
sponsored by Apperian, Inc.
WHITE PAPER: Learn how to get your mobile apps securely distributed and rapidly adopted by 100% of target users, including BYOD, contractors, dealers and partners, while driving the highest possible levels of mobile app ROI.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

Apperian, Inc.

9 Steps to a Secure Printer
sponsored by Nuance
WHITE PAPER: This white paper discusses just how much danger your printer poses to your organization and gives you nine tips for mitigating that danger.
Posted: 21 Jul 2015 | Published: 31 May 2015

Nuance

Rank Higher on Google with Always-On SSL
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper explores how to improve SEO ranking and be found by more customers through always-on SSL.
Posted: 20 Jul 2015 | Published: 17 Jun 2015

GeoTrust, Inc.

How to Choose A Certificate Authority For Safer Web Security
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper looks at the role of CAs in web security, including what measures a CA can take to promote trust in its certificates and the criteria to consider when choosing the best CA for the job.
Posted: 17 Jul 2015 | Published: 11 Nov 2013

GeoTrust, Inc.

Increase E-commerce Conversion Rates with Extended Validation SSl Certificates
sponsored by GeoTrust, Inc.
WHITE PAPER: Learn how deploying an EV certificate on your eCommerce website can protect against threats, while showing your customers that they can transact with confidence, helping increase your sites conversion rates.
Posted: 17 Jul 2015 | Published: 11 Nov 2014

GeoTrust, Inc.

Understanding Valdation: Understanding the Art and Science of SSL Certificate Validation
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper acts as a buyer's guide to choosing the right level of SSL certificate validation for your organization.
Posted: 16 Jul 2015 | Published: 15 Jan 2014

GeoTrust, Inc.

Why Always-on SSL is Critical for Company Websites Today
sponsored by GeoTrust, Inc.
WHITE PAPER: This paper discusses how always-on SSL offers enhanced security to protect against these attacks, while delivering several additional business benefits.
Posted: 16 Jul 2015 | Published: 01 Jul 2015

GeoTrust, Inc.

Reaping the Benefits of Strong, Smarter User Authentication
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses what the changes in enterprise IT mean for implementing smart authentication practices.
Posted: 16 Jul 2015 | Published: 31 Oct 2013

Symantec Corporation

Update to the Status of Cloud DNS
sponsored by Neustar®
WHITE PAPER: This in-depth white paper explores the finer points of DNS and traffic management.
Posted: 16 Jul 2015 | Published: 08 Jul 2015

Neustar®

Defending Against Cloud Security Threats
sponsored by Data#3
WHITE PAPER: This white paper is a comprehensive guide to securing your cloud and virtual infrastructure using Microsoft Azure.
Posted: 16 Jul 2015 | Published: 28 Feb 2015

Data#3

Selecting a Next-Generation Firewall: Top 10 Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, uncover 10 considerations to weigh when evaluating next-generation firewall tools to ensure that the solution you select best protects your networks from today's broad range of risk.
Posted: 16 Jul 2015 | Published: 28 Feb 2014

Cisco Systems, Inc.

DDoS Extortion and Bitcoin: New Security Threat on the Horizon
sponsored by Neustar®
WHITE PAPER: This white paper profiles DD4BC and how to protect your network and organization from the attack.
Posted: 15 Jul 2015 | Published: 08 Jul 2015

Neustar®

Holiday Ecommerce Security Preparedness: It's Never Too Early
sponsored by Neustar®
WHITE PAPER: This white paper acts a guide for how to ensure retail operations function efficiently and securely through the holiday season.
Posted: 15 Jul 2015 | Published: 08 Jul 2015

Neustar®

4 Components of a Solid Mobile App Security Strategy
sponsored by IBM
WHITE PAPER: This white paper explains how to design a business-driven app strategy that advances business goals without putting enterprise data and your network at risk.
Posted: 15 Jul 2015 | Published: 08 Jul 2015

IBM
26 - 50 of 777 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement