IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
26 - 50 of 811 Matches Previous Page  |  Next Page
Neutralize Threats with a Collaborative Security Fabric
sponsored by Intel Security
WHITE PAPER: Discover how to get ahead of today's advanced threats and remediate attacks in a timely manner. Manage security operations faster by integrating all defenses across the threat lifecycle into a single collaborative fabric, enabling your organization to make smarter, more efficient security decisions.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

Intel Security

Improve Performance and Reliability with Supplemental DNS
sponsored by Dyn
WHITE PAPER: This white paper explains how you can improve the performance, security and reliability of your DNS infrastructure by adding a supplemental DNS service to your IT environment.
Posted: 08 Dec 2016 | Published: 31 Dec 2015

Dyn

Firewall Clean Up Recommendations
sponsored by FireMon
WHITE PAPER: At the core of the firewall is the policy that enforces what access is permitted. Discover the benefits of proper firewall policy for your organization and learn the main causes of firewall policy mistakes.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

FireMon

The Top Cybersecurity Risks – And How Enterprises Are Responding
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers.
Posted: 23 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

The Connected Enterprise: Unify Communications to Manage Beyond the Remote Workforce
sponsored by Arkadin + BlueJeans
WHITE PAPER: The modern workplace no longer requires the whole team to be physically present. Email, video and instant messaging/social networking allow for almost instantaneous sharing of ideas. Learn how to manage your remote workforce by unifying these channels, and providing remote access to data while maintaining compliance.
Posted: 18 Nov 2016 | Published: 18 Nov 2016

Arkadin + BlueJeans

Merit and Juniper Deliver Michigan's First Statewide, High-Speed Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Merit Network needed to build a high-performance infrastructure for nonprofits in the 10th most populated US state. Learn who they partnered with for all of their routing and communication requirements, allowing them to create a statewide network for schools, connect institutions to advanced network services, provide security, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Juniper Networks, Inc.

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed
sponsored by Absolute
WHITE PAPER: Learn about each type of insider threat and discover strategies to mitigate their impact on your organization. Visibility through routine scans to discover sensitive data in cloud-sync folders can help IT move from paranoia or a false sense of security to peace of mind.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Absolute

Protecting the Distributed Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to secure your wide area network behind a distributed enterprise firewall without sacrificing performance or usability. Learn 5 key requirements to keep all of your dispersed sites secure and keep maintenance costs low.
Posted: 01 Nov 2016 | Published: 31 Oct 2016

Fortinet, Inc.

Transforming Your Security: A New Era in Enterprise Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to increase security effectiveness and reduce complexity by consolidating network security across the entire threat surface. Take a holistic approach, with central visibility and control of the borderless enterprise managed through a single pane of glass.
Posted: 31 Oct 2016 | Published: 30 Sep 2016

Fortinet, Inc.

Bot Defense Insights for Thwarting Automated Threats
sponsored by Distil Networks
WHITE PAPER: Learn not only what bots are but why they are a significant threat, why bad bots are created, and how to tackle the threat they represent to your enterprise. Access now to discover how to keep your organization safe from this very real menace.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Distil Networks

High Availability DNS Reduces Downtime Risk and Improves End-User Experience
sponsored by Dyn
WHITE PAPER: This white paper reviews the business advantages of implementing a high availability DNS architecture. You'll learn the critical role DNS plays in the user experience, the risks of relying on a single DNS solution, and the added performance benefits of a high availability DNS architecture.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Dyn

7 Ways to Make Yourself Harder to Hack
sponsored by Solarwinds MSP
WHITE PAPER: Whether you call it layered security or defense in depth, layers of control buys you time to respond effectively. Access now to learn more about integrated tools that cover security and network management for MSPs.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

Solarwinds MSP

Block Threats with Multiple Cybersecurity Layers
sponsored by Armor
WHITE PAPER: Discover how to keep your sensitive data safe and your business up and running without interruptions. Ensure your organization, customers and sensitive data are protected by leveraging a defense-in-depth strategy that is designed with integrated security from the ground up.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

Armor

Find Out how LogMeIn Rescue Stacks Up To The Competition
sponsored by LogMeIn, Inc.
WHITE PAPER: In this one-page resource to discover how LogMeIn rescue compares to one of its top competitors in 6 key categories, and find out what customers are saying about their experience with the program.
Posted: 19 Oct 2016 | Published: 19 Oct 2016

LogMeIn, Inc.

Best-of-Breed Next-Generation Security For the Mid-Market
sponsored by Barracuda Networks
WHITE PAPER: Discover a security framework that integrates purpose-built, highly scalable security solutions to protect users, networks, and data center applications. Learn how to secure your network against intrusions and protect against email and web threats.
Posted: 18 Oct 2016 | Published: 30 Sep 2016

Barracuda Networks

Masergy's Unified Enterprise Security Solution
sponsored by MASERGY
WHITE PAPER: This white paper explores how Masergy's Unified Enterprise Security Solution provides an integrated approach to security, combining predictive data sharing with an agile analytics and correlation program. Learn how Masergy can help you build an affordable, multi-layered security infrastructure that causes no additional network latency.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

MASERGY

Why NGFWs Are Becoming the New Standard in Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: The next-generation firewall (NGFW) is quickly becoming the new standard approach for enterprise security. Discover how your organization can add a high performance, highly effective NGFW without slowing down daily business operations. Learn how you can achieve unparalleled protection, ease of use and ultrafast performance with your NGFW.
Posted: 12 Oct 2016 | Published: 30 Sep 2016

Fortinet, Inc.

The Three Essential Elements of Next-Generation Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: With an overabundance of security solutions being touted as "next gen," how do you know what really is an innovative endpoint protection product? Discover an explanation of the essential elements of next-gen endpoint protection, a list of the top questions to ask potential vendors, and more.
Posted: 07 Oct 2016 | Published: 07 Oct 2016

CrowdStrike

Cybersecurity Frameworks to Consider for Organization-wide Integration
sponsored by Global Knowledge
WHITE PAPER: Learn about common security frameworks such as NIST and COBIT implementation action plans, resources for additional information and the government's influence on cybersecurity. Evaluate other enterprises' security frameworks to best choose one for your organization.
Posted: 06 Oct 2016 | Published: 30 Sep 2016

Global Knowledge

Cybersecurity During a Merger: CrowdStrike on Key Risks and Due Diligence
sponsored by CrowdStrike
WHITE PAPER: In this interview with CrowdStrike's Steve Chabinsky, learn key risk factors such as cybersecurity that organizations encounter during the merger and acquisition due diligence process and how to avoid them.
Posted: 06 Oct 2016 | Published: 06 Oct 2016

CrowdStrike

The Last Line of Defense Against the “Mega Breach”
sponsored by CrowdStrike
WHITE PAPER: The frequency of "mega breaches" continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. Learn how breaches could be prevented by deploying endpoint protection technology.
Posted: 05 Oct 2016 | Published: 30 Sep 2016

CrowdStrike

Mitigate Security Risks with Hyperconverged Infrastructure
sponsored by SimpliVity
WHITE PAPER: Improve your security posture and best mitigate risks by implementing comprehensive security measures across your entire enterprise - from the network perimeter to the application layer. Discover how a hyperconverged infrastructure limits potential points of attack and consolidates security controls.
Posted: 18 Nov 2016 | Published: 31 Dec 2015

SimpliVity

Effectively Protect your Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how you can stay one step ahead of attacker with this infographic. Achieve a high level security posture with tools like web filtering, sandboxing and next generation firewall.
Posted: 31 Oct 2016 | Published: 30 Sep 2016

Fortinet, Inc.

Top 5 Pitfalls to Avoid in Your Data Protection Strategy
sponsored by HDS and Veritas
WHITE PAPER: Discover five critical pitfalls to avoid when building a successful data protection strategy for your organization. Learn how to best navigate the various data protection solutions from digital to physical and private to public clouds while ensuring enterprise scalability.
Posted: 14 Oct 2016 | Published: 30 Sep 2016

HDS and Veritas
26 - 50 of 811 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement