IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
51 - 75 of 820 Matches Previous Page  |  Next Page
Realizing the Promise of Scale in the Cloud
sponsored by West UC
WHITE PAPER: In this white paper, find out how healthcare organizations depend on UCaaS to provide up-to-date technology and deliver productivity benefits to improve customer satisfaction.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

West UC

The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure
sponsored by Google Cloud
WHITE PAPER: Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Google Cloud

Secure Cloud Faxing for Highly Regulated Industries
sponsored by J2 Cloud Services
WHITE PAPER: In this white paper, learn how you can seamlessly implement a cloud fax model without impacting functionality and security – all while gaining a better understanding of the traits to consider when selecting a cloud fax vendor.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

J2 Cloud Services

Leaving the Traditional Network WANosaurus Behind with SD-WAN
sponsored by Windstream Communications
WHITE PAPER: The biggest challenge for current WAN networks is the cloud. Explore this white paper to learn how SD-WAN technology provides its users with the flexibility to add/change bandwidth in near real-time, while enhancing security and user experience.
Posted: 22 Sep 2017 | Published: 01 Aug 2017

Windstream Communications

Why Fax over VoIP & SIP is Unreliable and How the Cloud can Help
sponsored by J2 Cloud Services
WHITE PAPER: In this white paper, learn the fundamentals of traditional telecommunications and how enterprises are making the switch to VoIP, SIP, and FoIP protocols and find out the immediate benefits of a cloud-faxing model.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

J2 Cloud Services

Remote Access Redefined: Managing the Rise of Third-Party Users
sponsored by Akamai Technologies
WHITE PAPER: This white paper discusses the need for new access models that establish next-generation firewalls (NGFW) to manage the rise of third-party users while meeting security and usability demands.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

Akamai Technologies

Integrate Cloud Faxing with your Multi-function Printers
sponsored by J2 Cloud Services
WHITE PAPER: This white paper discusses the immediate benefits of a cloud faxing model with the integration of a multi-function printer (MFP).
Posted: 21 Sep 2017 | Published: 21 Sep 2017

J2 Cloud Services

IHS Technology: Network Monitoring Equipment
sponsored by Gigamon
WHITE PAPER: In this report, gain a stronger understanding of the top tools on the network monitoring market to help improve overall security and reliability.
Posted: 20 Sep 2017 | Published: 19 May 2017

Gigamon

Disrupt the Machine-to-Human Fight with a New Defender Lifecycle Model in Security Operations
sponsored by Gigamon
WHITE PAPER: In this white paper, learn how Gigamon's security delivery platform combats breaches and cyberattacks by integrating machine learning, artificial intelligence (AI) and security workflow automation.
Posted: 20 Sep 2017 | Published: 31 Jul 2017

Gigamon

Digital Documents, Compliance, and the Cloud
sponsored by J2 Cloud Services
WHITE PAPER: This white paper highlights the challenges associated with managing sensitive e-documents that possibly contain intellectual property. Learn best practices for tracking, reporting, and sharing e-documents in the cloud.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

J2 Cloud Services

eFax Corporate: Helping SAP Managers Find the best Cloud-based Fax Provider
sponsored by J2 Cloud Services
WHITE PAPER: In this white paper, eFax Corporate offers insight on finding the right cloud-hosted fax provider while learning the key advantages of moving legacy SAP fax processes into the cloud.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

J2 Cloud Services

Global Interconnection Index
sponsored by Equinix
WHITE PAPER: Evolving business models are placing more importance on real-time engagement, requiring you to scale your digital platforms or risk failing. Access this white paper to learn about a network infrastructure that gives your the power to transfer the entire printed content in the U.S. Library of Congress three times over in one second.
Posted: 18 Sep 2017 | Published: 31 Aug 2017

Equinix

How to Build a SOC with Limited Resources
sponsored by LogRhythm, Inc.
WHITE PAPER: Read this white paper to discover the knowledge needed to successfully build your own security operations center (SOC).
Posted: 15 Sep 2017 | Published: 15 Sep 2017

LogRhythm, Inc.

Why the Automotive Finance Industry is Upgrading to Cloud Faxing
sponsored by J2 Cloud Services
WHITE PAPER: On this website, learn how new compliance regulations influenced automotive finance businesses are now outsourcing their entire process to a trusted cloud fax provider.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

J2 Cloud Services

9 Considerations for Securing Web Apps in the Cloud
sponsored by Alert Logic
WHITE PAPER: Organizations need to re-think their IT security strategies to meet the growing demand for web applications. In this white paper, learn the 9 key considerations for securing web apps in the cloud to prevent data breaches and application-layer attacks.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Alert Logic

Security Threats to the Real Estate Industry
sponsored by J2 Cloud Services
WHITE PAPER: Firms that fail to improve the security and regulatory compliance of their operations will likely face legal and industry consequences. Read this white paper to uncover security benefits of cloud faxing in order to prevent such consequences.
Posted: 11 Sep 2017 | Published: 02 Dec 2016

J2 Cloud Services

Cloud Fax Can Shift your Business into Overdrive
sponsored by J2 Cloud Services
WHITE PAPER: Empower your employees to send and receive faxes by email, anywhere, anytime. Read this white paper to discover how to save your company money by outsourcing your business faxing to the cloud.
Posted: 11 Sep 2017 | Published: 14 Aug 2017

J2 Cloud Services

Why Traditional Fax Technology is Bad for Business
sponsored by J2 Cloud Services
WHITE PAPER: In this white paper, learn how cloud faxing is a safe, secure, and simple data transmission process that requires no expensive hardware or software updates.
Posted: 11 Sep 2017 | Published: 08 Sep 2017

J2 Cloud Services

The 90s Called... They want their Fax Server Back
sponsored by J2 Cloud Services
WHITE PAPER: Are your fax server costs becoming too difficult to maintain? Read this white paper to discover how to save your company time and money by implementing a cloud faxing platform.
Posted: 11 Sep 2017 | Published: 04 Apr 2017

J2 Cloud Services

Security for your Cloud-based Web Applications
sponsored by Alert Logic
WHITE PAPER: This Aberdeen Research paper explores the complexity and change in security of cloud-based Web applications and how a "stacked" security approach can prevent DDoS attacks.
Posted: 11 Sep 2017 | Published: 30 Apr 2017

Alert Logic

The Case Against ISP DNS
sponsored by Oracle + Dyn
WHITE PAPER: In this white paper, understand the challenges that can occur with Internet Service Provider (ISP)-based DNS and how to better prevent outages and DDoS attacks.
Posted: 11 Sep 2017 | Published: 08 Sep 2017

Oracle + Dyn

Solving API Performance, Reliability, and Security Challenges
sponsored by Akamai Technologies
WHITE PAPER: In this white paper, find out the top questions you should be asking when you review existing and future APIs.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Akamai Technologies

The New Economics of Cloud Security
sponsored by Alert Logic
WHITE PAPER: In this white paper, learn the 4 principles of a fully managed Security-as-a-Service (SECaaS) to help protect cloud applications without breaking the bank or compromising customer satisfaction.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

Alert Logic

Building the Agile Enterprise: Maintain Your Competitive Edge
sponsored by Verizon
WHITE PAPER: Enterprise leaders want a network that exceeds their customers' expectations. Explore this white paper to reveal how to collaborate better with employees and open up new business opportunities by virtualizing your network infrastructure.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Verizon

Building the Case for Virtual Network Services
sponsored by Verizon
WHITE PAPER: As the digital economy continues to take hold, organizations need to focus on their applications, and specifically how customers access the services within the business. Read this white paper to reveal benefits you can see from using network functions virtualization.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Verizon
51 - 75 of 820 Matches Previous Page    1 2 3 4 5 6    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement