IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network Security White Papers (View All Report Types)
26 - 50 of 695 Matches Previous Page  |  Next Page
Buyer'€™s Criteria for Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper gives you a detailed understanding of what controls need to be in place to stop the strongest attacks.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

How to Future Proof Application Delivery
sponsored by F5 Networks
WHITE PAPER: To learn more about the 4 key categories to consider when choosing an ADC platform that will stand the test of time, access this exhaustive white paper. Read now to learn how you can use this information to choose the ADC that's right for your organization.
Posted: 18 Mar 2015 | Published: 31 Dec 2014

F5 Networks

A Guide to a Multifaceted Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: This white paper can help you develop an innovative approach for catching even the most advanced malware.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Dell SecureWorks

Unified Communications Security Measures: Ensuring Peace of Mind
sponsored by ThinkingPhones
WHITE PAPER: This white paper discusses the essential security features all unified communications should have.
Posted: 17 Mar 2015 | Published: 01 Jan 2015

ThinkingPhones

Are you regularly monitoring log data?
sponsored by Alert Logic
WHITE PAPER: In this quick infographic, you will learn the 13 collections and alerts that help support the infrastructure security of an automated log management system.
Posted: 17 Mar 2015 | Published: 04 Feb 2015

Alert Logic

Selecting a Next-Generation Firewall: Top 10 Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to uncover how a next-gen firewall closes network gaps and explore the top 10 considerations for platform evaluation.
Posted: 17 Mar 2015 | Published: 12 Feb 2014

Cisco Systems, Inc.

ROI Analysis: How to reduce security risks and labor related costs
sponsored by Alert Logic
WHITE PAPER: This economic impact report analyzes one effective risk management solution to give you an accurate assessment of that product's ROI.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

Alert Logic

Defend against data breaches with automated log management
sponsored by Alert Logic
WHITE PAPER: This brief guide gives you a quick and clear outline of the fundamentals of log management and the log collection sources you need to have.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Alert Logic

Better Manage Your BYOD Program
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper provides indispensible advice on how to select device specifications for BYOD, how to streamline management, and more.
Posted: 11 Mar 2015 | Published: 31 Oct 2014

Dell, Inc. and Intel®

Enhancing employee flexibility while reducing IT complexity
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Read this exclusive case study to find out what solutions Dell took to embrace BYOD, streamline IT, and manage their security at the same time.
Posted: 11 Mar 2015 | Published: 31 Aug 2014

Dell, Inc. and Intel®

6 Steps to SIP Trunking Security
sponsored by Flowroute
WHITE PAPER: This white paper tells you how to create a secure connection for your SIP.
Posted: 11 Mar 2015 | Published: 31 Dec 2014

Flowroute

Discover the Power of Network Simplicity
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper presents a possible solution to the problem of wireless network management.
Posted: 10 Mar 2015 | Published: 31 Jan 2015

Hewlett-Packard Limited

Enhance Your Malware Protection
sponsored by IBM
WHITE PAPER: This white paper describes a malware protection that can accurately identify even the most advanced malware.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Traps Advanced Endpoint Protection: Technology Overview
sponsored by Palo Alto Networks
WHITE PAPER: This white paper describes a security approach that provides protection before the attacks can penetrate.
Posted: 02 Mar 2015 | Published: 30 Nov 2014

Palo Alto Networks

Threat Trend: Threat Landscape Review
sponsored by Palo Alto Networks
WHITE PAPER: This exlusive security report identifies threats from malware over a wide array of applications by executing them in a virtual environment and observing their behavior. Read on to learn what was discovered, and what the new cybercrime trends are moving forward.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Palo Alto Networks

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

Why DNS Security is Essential
sponsored by Cloudmark
WHITE PAPER: This white paper covers exactly how attackers use DNS to compromise a network.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Cloudmark

Deliver Robust Wi-Fi for Ultimate Guest Satisfaction
sponsored by Xirrus
WHITE PAPER: This exclusive white paper takes an in-depth look at how to provide rock-solid Wi-Fi connection for your guests, keeping them happy and productive. Read on to learn more.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Xirrus

Scalable and Affordable Wi-Fi for Campuses
sponsored by Xirrus
WHITE PAPER: This exclusive white paper details a Wi-Fi solution that was able to deliver a rock-solid connection to the masses, allowing everyone on the network to be more productive. Read on to learn more.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Xirrus

What is Software Diversification?
sponsored by WhiteCryption
WHITE PAPER: This document describes the concept of software diversification and explains why it should be an integral part of the protection scheme of all software systems run on untrusted hosts. Read on to learn more.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

WhiteCryption

Application Usage and Threat Report
sponsored by Palo Alto Networks
WHITE PAPER: This exclusive white paper offers a look at key findings with common sharing applications and why they are mostly used by hackers as a delivery system for cybercrime and theft. Read on to learn more.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Palo Alto Networks

Taking Steps to Protect Financial Mobile Applications from Cybercrime and Malware
sponsored by WhiteCryption
WHITE PAPER: This exclusive white paper takes an in-depth look at how to protect your mobile applications from cybercrime and malware. Read on to learn more.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

WhiteCryption

BYOD and the New Way to Work
sponsored by Unify
WHITE PAPER: This exclusive resource is aimed at helping organizations understand the savings opportunities that come with BYOD, and why providing corporate owned devices may be a thing of the past. Read on to learn more.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Unify

Discover the Capabilities of a Next Generation Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This in-depth white paper provides a close look at a next generation firewall, describing each of its capabilities in detail.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Next-Generation Network Security: A Buyers’ Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: This buyer's guide provides an in-depth explanation of the factors that impel organizations to look at next generation security solutions.  Read on to learn more.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Cisco Systems, Inc.
26 - 50 of 695 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement