IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network SecurityWhite Papers (View All Report Types)
51 - 75 of 728 Matches Previous Page  | Next Page
Bringing DLP Inside the Organization
sponsored by Clearswift
WHITE PAPER: This white paper delves into the subject of data loss prevention (DLP) inside the organization, examining the way that critical information is shared within a business and discussing the pros and cons of implementing DLP solutions at different points.
Posted: 15 Oct 2014 | Published: 31 Dec 2013

Clearswift

Three Kinds of Chaos: Establishing collaboration and control in a chaotic world
sponsored by Clearswift
WHITE PAPER: This white paper reveals why collaboration and control are both equally important, especially with evolving security threats.
Posted: 15 Oct 2014 | Published: 01 Mar 2014

Clearswift

Reconciling Cloud And Security
sponsored by Scalr
WHITE PAPER: This white paper addresses the challenge that IT executives face consistently, an overview of the cloud landscape in terms of security, and a strategy that enterprises can use to safely adopt the cloud.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Scalr

Mobile App Solutions
sponsored by IBM
WHITE PAPER: In this white paper, discover an infrastructure solution that provides the performance, control and flexibility you need for developing, deploying and maintaining successful applications.
Posted: 13 Oct 2014 | Published: 31 Dec 2013

IBM

Tiket.com Customer Story
sponsored by IBM
WHITE PAPER: This white paper highlights a solution that allowed one company in particular to leverage a high-performance network with exceptional uptime and provided a smooth end-user experience.
Posted: 13 Oct 2014 | Published: 31 Dec 2013

IBM

Retail Shopping Has Become More Personal, Relevant and Profitable
sponsored by Aerohive Networks
WHITE PAPER: This white paper reveals a strategy that defines a cloud-based approach to personalising the retail experience for every customer.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Aerohive Networks

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Digital Advertising Solutions
sponsored by IBM
WHITE PAPER: This white paper highlights a solution to tough infrastructure challenges, offering high performance and on-demand scalability that allows you to build the ideal environment you need for applications.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

DLP’s Three Lock Box
sponsored by CDW Corporation
WHITE PAPER: This white paper examines what data loss prevention (DLP) solutions entail, how to select them, and what DLP can do for your organization.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CDW Corporation

SDN meets the real-world: implementation benefits and challenges
sponsored by Nuage Networks
WHITE PAPER: From little more than a research project a decade or so ago, SDN has become one of the biggest trends in the data center, and for good reason.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Nuage Networks

How to Protect Your Business From Today's Security Threats
sponsored by Optus Business
WHITE PAPER: This white paper highlights the importance of maintaining robust network security within your enterprise, especially with an evolving threat landscape.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Optus Business

Next-generation guest network access for GenMobile
sponsored by Aruba Networks
WHITE PAPER: Users today expect to connect from anywhere and giving them high-performance guest access is absolutely essential.  Weak security on the guest network can expose your business to external threats and could cause serious liablility issues.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Aruba Networks

Outsider Threat Protection: Building a Kill Chain Defense
sponsored by Digital Guardian
WHITE PAPER: This white paper reveals the story behind outsider threats and how to defend against these attacks that steal sensitive data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

Networking Evolution: Building the Infrastructure to Enable the Changing Face of IT
sponsored by Citrix
WHITE PAPER: This expert resource explores the top trends and challenges facing networks today. Topics include hybrid software-defined networking, context-aware security, unified communications, and more.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Citrix

Build the Infrastructure to Enable the Changing Face of IT
sponsored by Citrix
WHITE PAPER: Check out this expert resource to learn about the top trends and challenges facing your network today. Topics include hybrid software-defined networking, context-aware security, unified communications, and more.
Posted: 10 Sep 2014 | Published: 29 Aug 2014

Citrix

DDoS Report: The Escalating Threat of DDoS Attacks
sponsored by A10 Networks
WHITE PAPER: If you are concerned about the possibility of major service outages due to DDoS attacks, you should ensure that your vendor can scale to mitigate the largest multi-vendor attacks at your network's edge. So where can you turn? Check out the following report to learn where now.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

A10 Networks

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: Learn how identity and access management solutions from IBM Security can help organizations protect critical assets.
Posted: 04 Sep 2014 | Published: 01 Apr 2014

IBM

Deliver Simple and Secure Access to Behind-the-Firewall Business Resources
sponsored by IBM
WHITE PAPER: Learn the ins-and-outs of a solution capable of delivering simple and secure access to behind-the-firewall business resources such as Windows File Share content and intranet sites without requiring changes to your network, firewall security configuration or device VPN.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

IBM

The Ten Principals of BYOD
sponsored by IBM
WHITE PAPER: Uncover the top ten Bring Your Own Device (BYOD) considerations to keep in mind when composing a BYOD policy to ensure a productive and secure environment which allows your employees to use their consumer-based devices to complete day to day tasks.
Posted: 03 Sep 2014 | Published: 28 May 2014

IBM

IBM Mobile First
sponsored by IBM
WHITE PAPER: Learn how to develop, test, run and manage hybrid and native multiplatform, mobile apps in a security-rich environment.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

IBM

Guarding Against a Data Breach
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, discover how modern enterprises should respond to growing security threats while balancing economic and organizational concerns.
Posted: 22 Aug 2014 | Published: 31 Jan 2012

Hewlett-Packard Company

Promise Healthcare case study
sponsored by Dell Software
WHITE PAPER: Promise Healthcare improved security, achieve HIPAA compliance, and gained visibility into and control over network utilization by replacing its outdated firewalls with Dell SonicWALL NSA 6600 firewalls.
Posted: 20 Aug 2014 | Published: 01 Apr 2014

Dell Software

Get the Network Protection You Need with Next Generation Firewalls
sponsored by CDW Corporation
WHITE PAPER: In this white paper, discover what a next-generation firewall can do for your organization in terms of network security.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CDW Corporation

A New Set of Network Security Challenges
sponsored by Icomm Technologies
WHITE PAPER: Today, workers demand access from devices beyond the firewall.  Smart phones, tablets, and laptops of all types.  However, the biggest challenge is finding a balance between productive and security.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Icomm Technologies
51 - 75 of 728 Matches Previous Page    1 2 3 4 5 6    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement