IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
51 - 75 of 902 Matches Previous Page  |  Next Page
Vendor Comparison for Web Application Firewalls
sponsored by Dimension Data
WHITE PAPER: Imperva, a leading provider of cyber security solutions is once again the only leader in Gartner's Magic Quadrant for Web Application Firewall—the only company positioned in the leader's quadrant by Gartner in each of the two years this report has been published.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Dimension Data

Top 10 Database Security Threats
sponsored by Dimension Data
WHITE PAPER: Read this paper to understand the top 10 database threats and how you can protect your most valuable assets.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Dimension Data

HBR paper: The Danger from Within
sponsored by Dimension Data
WHITE PAPER: The biggest threat to enterprise security is the people organizations hire and fire. Read this article from the Harvard Business Review, "Danger from Within" to learn why the number of insider cyberattacks is growing and what are 5 ways to tackle the problem.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Dimension Data

Mobile First Healthcare
sponsored by MobileIron
WHITE PAPER: It isn't news that the healthcare industry has stringent privacy regulations. Don't let these regulations hold you back from taking adavantage of all that mobility has to offer. Read on to learn about a solution that provides mobile security so healthcare professionals can do their jobs without having to worry about privacy breaches.
Posted: 01 Jun 2016 | Published: 25 May 2016

MobileIron

Case Study: How Brussels Airport Upgrades to a Multi-OS BYOD Solution
sponsored by MobileIron
WHITE PAPER: Read this case study to learn about how Brussels Airport was able to implement a multi-OS BYOD solution to serve everyone that passes through.
Posted: 31 May 2016 | Published: 25 May 2016

MobileIron

Get Help Tracking Down the Leak
sponsored by Exabeam
WHITE PAPER: Learn how to best utilize UBA and threat hunting in your security intelligence platform to proactively catch unwanted activity across your network.
Posted: 31 May 2016 | Published: 01 Apr 2016

Exabeam

Addressing the Threat Within: Rethinking Network Security Deployment
sponsored by Gigamon
WHITE PAPER: A structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. Discover how the Security Delivery Platform is becoming a building block to deploying security solutions.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

Application Session Filtering
sponsored by Gigamon
WHITE PAPER: Bringing intelligent application-aware traffic visibility and filtering relevant applications to these security tools will help them work at their most optimum while uncovering malicious communication patterns.
Posted: 27 May 2016 | Published: 31 Dec 2015

Gigamon

Five Reasons to Adopt an MSSP
sponsored by MASERGY
WHITE PAPER: Security breaches cost an average of $3.4 million per incident. This cost, coupled with the number of breaches that occurring in the past few years, is reason enough to seriously invest in managed security service providers (MSSPs). Discover the top five reasons why an MSSP is right for your business.
Posted: 27 May 2016 | Published: 11 May 2016

MASERGY

The Top Ten Things CIOs Ask About Enterprise Mobility
sponsored by MobileIron
WHITE PAPER: Looking to develop and strong mobile strategy? With consumer choice now the driving force behind mobile enterprise decisions, CIOs must be prepared. Here are the top 10 questions CIOs commonly ask about enterprise mobility.
Posted: 26 May 2016 | Published: 26 May 2016

MobileIron

Application Session Filtering Cookbook
sponsored by Gigamon
WHITE PAPER: This guide presents a number of examples on how to use ASF in step-by-step recipes. It provides a methodology for identifying string patterns and regular expressions.
Posted: 24 May 2016 | Published: 31 Dec 2015

Gigamon

Help Your Security Team Sleep at Night
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Every day there are new reports of application exploits, organized campaigns to impact network operations, and internal malicious behavior. Get a glimpse into an effective security architecture, and find out how built-in reporting and monitoring workflows can be directly leveraged to enhance your business' security strategy.
Posted: 23 May 2016 | Published: 23 May 2016

Riverbed Technology, Inc.

Addressing NIST and DOD Requirements for Mobile Device Management (MDM)
sponsored by IBM MaaS360
WHITE PAPER: Mobile device management (MDM) is critical as these devices can create vulnerabilities in network security. Two major technology institutions are determining MDM requirements for government agencies. Read on for a breakdown of the best MDM practices.
Posted: 20 May 2016 | Published: 30 Dec 2015

IBM MaaS360

When App is the Business, the Business is the App Vol. 3
sponsored by IBM MaaS360
WHITE PAPER: IT needs to support each step in planning and developing apps to help ensure security throughout the app lifecycle. Learn the key security dangers of mobile apps in the enterprise and find out how to eliminate them in your app-driven business.
Posted: 20 May 2016 | Published: 01 Apr 2016

IBM MaaS360

When Business is the App, The App is the Business - Vol 1
sponsored by IBM MaaS360
WHITE PAPER: Businesses need to be much more mindful about safe productivity. Learn how to safely distribute and manage mobile apps, on both BYOD and COPE devices that are critical to employee productivity and smooth business operations.
Posted: 20 May 2016 | Published: 01 Apr 2016

IBM MaaS360

Workplace Mobility, Consumerization, and Cloud Drive End-user Computing Transformation
sponsored by VMware
WHITE PAPER: To combat the rising complexity of desktop environments, you need to think about implementing hybrid consumption models. Read this white paper that details how the next generation of desktop architectures is taking mobility into account and how IT strategies are shifting from managing devices to managing users.
Posted: 20 May 2016 | Published: 29 Jan 2016

VMware

A Powerful Platform for Cloud Security Analytics
sponsored by Exabeam
WHITE PAPER: Security architects and SOC managers need a solution for integrating activity across all deployments and making sense of behavior in an open, cloud-based architecture. Discover how you can analyze account lockouts, detect unusual access patterns, and prevent data loss while allowing your organizations to continue growing with the cloud.
Posted: 20 May 2016 | Published: 31 Dec 2015

Exabeam

Top ten reasons you don’t need Mobile Device Management (MDM)
sponsored by IBM MaaS360
WHITE PAPER: Mobile device management (MDM) is a dying trend. Like the frosted tip hairstyles and low-rise jeans of the 90's, smartphones are just another fad that'll be replaced soon enough. Read on for ten reasons why you don't need to bother with this MDM nonsense.
Posted: 20 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Detect Compromised Credentials with Behavioral Analytics
sponsored by Exabeam
WHITE PAPER: User behavior intelligence and security session assembly can help enterprises root out attackers that impersonate employees. Discover how the right solution can help you give more complex tasks to junior security analysts while speeding up data analysis.
Posted: 20 May 2016 | Published: 31 Dec 2014

Exabeam

Detect, Prioritize, and Respond to Modern Cyber Attacks
sponsored by Exabeam
WHITE PAPER: They need the ability to automatically analyze user behavior to respond effectively. Learn how to leverage existing log data to detect modern attacks and prioritize incidents efficiently. Used correctly, user behavior analytics adds a powerful analytics layer over existing security technologies, guiding a more effective response to attacks.
Posted: 20 May 2016 | Published: 31 Dec 2015

Exabeam

Beyond CLM and MDM: Why your Organization needs Unified Endpoint Management (UEM)
sponsored by Matrix42
WHITE PAPER: Unified endpoint management (UEM) combines mobile device management with client lifecycle management to create a new central management environment. Read on to learn more about how UEM works and its benefits for businesses, IT and users.
Posted: 19 May 2016 | Published: 30 Dec 2015

Matrix42

Surfing the Windows 10 Wave with UEM
sponsored by Matrix42
WHITE PAPER: Mobile devices are going largely unmanaged in the workplace. Windows 10 looms large on the horizon. Chaos seems inevitable. Read on to uncover a unified endpoint management solution that will manage all devices across various operating systems and help prepare for the Windows 10 rollout.
Posted: 19 May 2016 | Published: 31 Dec 2015

Matrix42

Tackling Workplace Mobility
sponsored by VMware
WHITE PAPER: 84% of employees use a mobile device during their work day and as mobility takes over the workplace, problems with security, compliance, and cost begin to pop up. Learn more about the mobile takeover and find a solution that tackles these challenges.
Posted: 18 May 2016 | Published: 29 Apr 2016

VMware

Mobile is the New Playground for Thieves
sponsored by IBM MaaS360
WHITE PAPER: You need to modernize your security with a robust way to proactively detect, analyze and remediate new mobile threats. Learn the true cost of a data breach and how to best implement your own BYOD policy.
Posted: 18 May 2016 | Published: 31 Dec 2015

IBM MaaS360

Ten rules for Bring Your Own Device (BYOD)
sponsored by IBM MaaS360
WHITE PAPER: Bring your own device (BYOD) is the facet of mobility that is leaving many organizations feeling vulnerable. Here are ten rules, each broken down, to keep you on the right track to taking full advantage of all that mobility has to offer.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360
51 - 75 of 902 Matches Previous Page    1 2 3 4 5 6    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement