IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network SecurityWhite Papers (View All Report Types)
26 - 50 of 719 Matches Previous Page  | Next Page
Reconciling Cloud And Security
sponsored by Scalr
WHITE PAPER: This white paper addresses the challenge that IT executives face consistently, an overview of the cloud landscape in terms of security, and a strategy that enterprises can use to safely adopt the cloud.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Scalr

Mobile App Solutions
sponsored by IBM
WHITE PAPER: In this white paper, discover an infrastructure solution that provides the performance, control and flexibility you need for developing, deploying and maintaining successful applications.
Posted: 13 Oct 2014 | Published: 31 Dec 2013

IBM

Tiket.com Customer Story
sponsored by IBM
WHITE PAPER: This white paper highlights a solution that allowed one company in particular to leverage a high-performance network with exceptional uptime and provided a smooth end-user experience.
Posted: 13 Oct 2014 | Published: 31 Dec 2013

IBM

Retail Shopping Has Become More Personal, Relevant and Profitable
sponsored by Aerohive Networks
WHITE PAPER: This white paper reveals a strategy that defines a cloud-based approach to personalising the retail experience for every customer.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Aerohive Networks

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Digital Advertising Solutions
sponsored by IBM
WHITE PAPER: This white paper highlights a solution to tough infrastructure challenges, offering high performance and on-demand scalability that allows you to build the ideal environment you need for applications.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

How We Define a Network is About to Change, Again
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you'll learn how VMware NSX changes the way that you build, manage, and secure your network.
Posted: 06 Oct 2014 | Published: 25 Sep 2014

Global Knowledge

DLP’s Three Lock Box
sponsored by CDW Corporation
WHITE PAPER: This white paper examines what data loss prevention (DLP) solutions entail, how to select them, and what DLP can do for your organization.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CDW Corporation

SDN meets the real-world: implementation benefits and challenges
sponsored by Nuage Networks
WHITE PAPER: From little more than a research project a decade or so ago, SDN has become one of the biggest trends in the data center, and for good reason.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Nuage Networks

How to Protect Your Business From Today's Security Threats
sponsored by Optus Business
WHITE PAPER: This white paper highlights the importance of maintaining robust network security within your enterprise, especially with an evolving threat landscape.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Optus Business

The Hidden Costs of Self-Signed SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Security is not usually one of the first places companies look to trim expenses, but some IT professionals believe that they can easily lower costs by eliminating third-party Secure Sockets Layer (SSL) Certificate Authorities (CAs) from the budget equation. However, this kind of reasoning can backfire – badly.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

Cloud Adoption in Asia Pacific: Overcoming Security Concerns with SSL
sponsored by Symantec Corporation
WHITE PAPER: Cloud computing offers unprecedented opportunities for businesses to cut IT costs while improving their ability to respond to changing strategic demands. Concerns about security, however, are a barrier to adoption.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

Next-generation guest network access for GenMobile
sponsored by Aruba Networks
WHITE PAPER: Users today expect to connect from anywhere and giving them high-performance guest access is absolutely essential.  Weak security on the guest network can expose your business to external threats and could cause serious liablility issues.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Aruba Networks

Outsider Threat Protection: Building a Kill Chain Defense
sponsored by Digital Guardian
WHITE PAPER: This white paper reveals the story behind outsider threats and how to defend against these attacks that steal sensitive data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

DDos Survival Handbook
sponsored by Singlehop
WHITE PAPER: This handbook is the survival guide to fight off cyber attackers and mitigate the risk of DDoS attacks.
Posted: 29 Sep 2014 | Published: 31 Dec 2013

Singlehop

Managing SSL Certificates in Pan-Asia Pacific Enterprises
sponsored by Symantec Corporation
WHITE PAPER: Businesses around the world face an array of threats to information security.  Enterprised in Pan-Asia face the same threats while contending with region-specific challenges associated with trade across diverse cultures.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Symantec Corporation

Website Security Threat Report 2014
sponsored by Symantec Corporation
WHITE PAPER: In 2013, attention was focused on threats to privacy and acts of malicious insiders.  However, the end of the year provideded a painful remind that cybercime remains prevalent today.
Posted: 26 Sep 2014 | Published: 30 Jun 2014

Symantec Corporation

Avoiding BYO Policy and Security Pitfalls
sponsored by Citrix
WHITE PAPER: When employees use their own technology for business purposes, they gain mobility and productivity but pose a new threat for IT security, as well as other policy pitfalls.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Citrix

The Definitive Guide to Secure Enterprise Mobility
sponsored by Aruba Networks
WHITE PAPER: Enterprise organizations today are allowing a new generation of users - known as the mobile generation - to maximize productivity by relying on mobile devices for every aspect of work and personal communication.  However, networking security concerns are emerging.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Aruba Networks

5 Tips for Guest BYOD Use
sponsored by North Sydney IT and Cisco
WHITE PAPER: If your midsize company welcomes guests and their mobile devices, read this white paper. Get five tips for guest BYOD use.
Posted: 15 Sep 2014 | Published: 15 Sep 2014

North Sydney IT and Cisco

WAF or IPS - Why you need more than a Firewall and IPS to protect your applications
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains the importance of using more than just a firewall and IPS to protect your applications from malicious attacks.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Fortinet, Inc.

Security Concerns in the C-Suite and How Next-Generation Firewalls Can Help
sponsored by Fortinet, Inc.
WHITE PAPER: This resource highlights the danger behind APTs, leading to the need for heightened network security with the help of next-generation firewalls.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Fortinet, Inc.

Get the Network Protection You Need with Next Generation Firewalls
sponsored by CDW Corporation
WHITE PAPER: In this white paper, discover what a next-generation firewall can do for your organization in terms of network security.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CDW Corporation

A New Set of Network Security Challenges
sponsored by Icomm Technologies
WHITE PAPER: Today, workers demand access from devices beyond the firewall.  Smart phones, tablets, and laptops of all types.  However, the biggest challenge is finding a balance between productive and security.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Icomm Technologies
26 - 50 of 719 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement