IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
51 - 75 of 836 Matches Previous Page  |  Next Page
Protecting Data in the Healthcare Industry
sponsored by Mimecast
WHITE PAPER: The healthcare industry finds itself under cyberattack from many vectors, including ransomware, malware and targeted attacks. Read this white paper to determine strategies to secure your data.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Mimecast

Ambushed By Data
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: This recent survey of 233 security professionals takes a look into the security gaps that still plague the market. Uncover the results to the questions posed to these professionals and an analysis of their relevance.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Arctic Wolf Networks, Inc.

Migrating to an Intelligent Hybrid Network? It's a Virtual Evolution.
sponsored by Verizon
WHITE PAPER: Learn how to take a hybrid networking approach that incorporates SD-WAN and virtualization to help you manage traffic and control access to the cloud without driving up costs or sacrificing app performance and security.
Posted: 17 Aug 2017 | Published: 31 Dec 2016

Verizon

Digital Advisory Services: Map out Your Software Defined Networking Journey
sponsored by Verizon
WHITE PAPER: With SD-WAN and virtualization, you can quickly scale your environment, centralize management, maintain security, and control costs better – but it can be hard to get started. Learn about a SD-WAN Awareness Workshop that's designed to help deepen your understanding of SD-WAN, its challenges, use cases, and beyond.
Posted: 17 Aug 2017 | Published: 31 Dec 2016

Verizon

Addressing Today's Endpoint Security Challenges
sponsored by Citrix
WHITE PAPER: Endpoint security has become a major issue for enterprise IT as business mobility and BYOD render traditional perimeter based protection ineffective. Read this white paper to uncover key strategies for mobile and endpoint security, including multilayered protection for apps, data, devices and networks.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Citrix

Insider Threats to Financial Services
sponsored by Recorded Future
WHITE PAPER: More companies than ever before are seeking insider threat detection and prevention processes and tools. Read this white paper to uncover benefits from insider threat detection as well as prevention processes and tools.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Recorded Future

How to Scale for IoT Connectivity
sponsored by Aeris
WHITE PAPER: Discover how to create a M2M and IoT connectivity strategy that suits not only the needs of today but scales for the demands of tomorrow. Read on to learn about 3 traits to look for in an IoT partner and 3 IoT connectivity case studies.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Aeris

14 Steps to Protect Your Organization from Ransomware
sponsored by Carbon Black
WHITE PAPER: Ransomware is on track to be a $1 billion crime in 2017, according to FBI data. That's a substantial increase from 2015, when ransomware was a "mere" $24 million crime. Uncover immediate steps you can take today to protect against ransomware like WannaCry and NotPetya.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Carbon Black

Ransomware: Defending Against 5 Major Types
sponsored by Commvault
WHITE PAPER: Not all ransomware is alike, so no one-size-fits-all strategy exists for defending against these attacks. Explore 5 major types of ransomware attacks and learn how to defend against them to bolster your network security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Commvault

Cisco Umbrella Shoots for Secure Internet, Anywhere
sponsored by Cisco Umbrella
WHITE PAPER: Discover how to mitigate risks and improve your security posture for the cloud by leveraging SaaS-based tools that enable advanced malware protection for your network, real-time threat intelligence, and increased DNS gateway security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Cisco Umbrella

The Need for Rapid Security Investigation
sponsored by Splunk
WHITE PAPER: Often when an issue or unsuspected attack occurs, IT teams find out too late. Explore an analytics-driven approach to security that enables organizations to respond to incidents as soon as possible.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Splunk

Protecting the Keys to Your Kingdom
sponsored by Thycotic
WHITE PAPER: In this white paper, take an in-depth dive into privileged account management in order to ensure that employees only have the permissions they need for the job – not ones that make you vulnerable.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

Thycotic

The Five Essential Capabilities of an Analytics-Driven SOC
sponsored by Splunk
WHITE PAPER: Organizations are now looking to analytics-driven security operations centers (SOCs) to close the gaps in their network defenses. In this white paper, uncover how a successful SOC should have 5 key attributes.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Splunk

The Road to a Secure, Compliant Cloud
sponsored by HyTrust
WHITE PAPER: Corporations must innovate to stay ahead of the competition, deliver new services to attract and keep new customers, and keep their costs low. Uncover how a well-designed virtualized cloud offers businesses a solution, by keeping their crucial data secure while providing agility and adaptability.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

HyTrust

Incident Response for Today's Top 3 Security Scenarios
sponsored by Exabeam
WHITE PAPER: This whitepaper looks at the top three security scenarios that are ripe with risk to the organization, and discusses steps to properly respond should these events occur.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Exabeam

The Challenges of Legacy SIEM Platforms
sponsored by Exabeam
WHITE PAPER: Explore 3 reasons why legacy SIEM tools no longer meet the needs of most organizations. Plus, uncover the benefits of a modern security intelligence [platform.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Exabeam

Securing Industrial IoT Technology: 4 Key Considerations
sponsored by Bayshore Networks
WHITE PAPER: Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Bayshore Networks

Extend Your Threat Protection Beyond the Network Perimeter
sponsored by Cisco Umbrella
WHITE PAPER: Many security appliances can protect your employee devices from threats on the corporate network, but fall short when it comes to protecting employees working off the network. Learn about a cloud-based security platform that can uncover current and emerging internet threats everywhere your employees work.
Posted: 31 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

Product at-a-Glance: Cisco Umbrella for Network Security
sponsored by Cisco Umbrella
WHITE PAPER: In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. But today, more and more is happening off-network. It's important to adapt your security to fully protect your enterprise. In this product overview, learn about Cisco Umbrella for network security.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

Cisco Umbrella

Certificate Management: The Ultimate Guide
sponsored by DigiCert
WHITE PAPER: This guide discusses what you should be thinking about for thorough certificate management. Learn how to take control of all areas of the certificate lifecycle, while leveraging APIs and optimizing your team.
Posted: 26 Jul 2017 | Published: 24 Jul 2017

DigiCert

Enable Visibility and Protection in the Cloud-Connected Enterprise
sponsored by Cisco Umbrella
WHITE PAPER: How can you close visibility gaps in the cloud? Explore two cloud security strategies that can provide the visibility to help you block threats earlier, extend threat protection, and more.
Posted: 26 Jul 2017 | Published: 31 Jul 2017

Cisco Umbrella

Don't Just Respond – Prevent Attacks before They Happen
sponsored by Cisco Umbrella
WHITE PAPER: Discover how to use cloud-delivered security services to prevent damaging attacks before they're launched. Learn how to create an advanced threat and malware detection strategy that can proactively identify attack infrastructure with statistical models and pre-emptively protect against most zero-day threats.
Posted: 25 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

Why Firewalls And Antivirus Alone Are Not Enough
sponsored by Cisco Umbrella
WHITE PAPER: Firewalls and antivirus defenses react to malicious code after attacks have launched – but it's becoming increasingly important to detect threats earlier and prevent attacks before they even reach fruition. Explore 4 attacks and uncover 7 common steps attackers take to achieve their objectives.
Posted: 25 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web
sponsored by Authentic8, Inc.
WHITE PAPER: Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.
Posted: 28 Jul 2017 | Published: 31 Dec 2016

Authentic8, Inc.

Why a Virtual Browser is Important For Enterprise Security
sponsored by Authentic8, Inc.
WHITE PAPER: More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Authentic8, Inc.
51 - 75 of 836 Matches Previous Page    1 2 3 4 5 6    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement