IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
51 - 75 of 797 Matches Previous Page  |  Next Page
SD-WAN: The Pathway to a Digitally Transformed Branch
sponsored by Windstream Communications
WHITE PAPER: This IDC white paper examines how digital transformation has necessitated a rethinking of WAN connectivity for distributed enterprises.
Posted: 14 Apr 2017 | Published: 28 Feb 2017

Windstream Communications

Passive Optical LAN: What you're missing out on
sponsored by Nokia
WHITE PAPER: In this resource, learn why many companies are letting their copper-based LANs corrode and upgrading to fiber-based LANs.
Posted: 13 Apr 2017 | Published: 31 Mar 2016

Nokia

Automation Isn't One-Size-Fits-All
sponsored by FireMon
WHITE PAPER: In this white paper, learn how intelligent policy automation can take the pressure off your firewall team by telling you which access to approve and which to deny, increasing speed and security of change management workflows.
Posted: 13 Apr 2017 | Published: 30 Dec 2016

FireMon

Prepping for the Oncoming Wave of SD-WANs
sponsored by Windstream Communications
WHITE PAPER: In this TechTarget white paper, learn what the experts are saying about the near future for SD-WANS.
Posted: 12 Apr 2017 | Published: 31 Jan 2017

Windstream Communications

What Changing Mobile Communications Mean for Your Business
sponsored by Mitel Networks Limited
WHITE PAPER: In this TechTarget white paper, learn how to prepare your business for mobile communications with a mobile-centric strategy that encompasses collaboration, customer experience and future technology like IoT and machine-to-machine communications.
Posted: 10 Apr 2017 | Published: 30 Dec 2016

Mitel Networks Limited

An Introduction to the Security Advantages of Mirco-Segmentation
sponsored by VMware
WHITE PAPER: Traditional data center works to defer threats from breaching your network's perimeter, so what do you do once it gets inside? Read this white paper to learn why we can't permanently resolve the perimeter-style network security problem and what micro-segmentation offers as a supplement to your existing network security.
Posted: 29 Mar 2017 | Published: 30 Nov 2016

VMware

Micro-segmentation: Security for Every Data Center
sponsored by VMware
WHITE PAPER: Firewalls are a security strategy that companies are discovering is wholly inadequate against today's sophisticated cyberattacks. To defend against cyberattacks, today's enterprises need a sophisticated approach to data center security. In this white paper, learn about a new approach to data center security designed for current threats.
Posted: 28 Mar 2017 | Published: 30 Sep 2016

VMware

Why Firewalls Alone Are No Longer Enough
sponsored by VMware
WHITE PAPER: What do you do when a threat makes it past the firewall and starts moving laterally inside the data center? To combat today's advanced cyberattacks, many organizations are moving past archaic firewall protection and empowering their security with network virtualization and micro-segmentation.
Posted: 28 Mar 2017 | Published: 30 Sep 2016

VMware

Modern Security for the Modern Data Center
sponsored by VMware
WHITE PAPER: Upgrading your data center security from an antiquated perimeter-based model is in your best interest if you don't want to end up dealing with the financial impact of a breach. Inside learn about a new, advanced data center security model that provides the protection your business needs for today and the future.
Posted: 27 Mar 2017 | Published: 30 Sep 2016

VMware

Modernizing Your Data Center's Security
sponsored by VMware
WHITE PAPER: The classic approach to data center security is to guard the perimeter and block threats from getting inside—but that's no longer adequate. Learn how micro-segmentation can provide your data center with the security it needs for today's advanced threats.
Posted: 27 Mar 2017 | Published: 30 Sep 2016

VMware

Eight Toxic Networking Vendor Selection Philosophies
sponsored by Extreme Networks
WHITE PAPER: This Forrester Research report reveals eight common statements that organizations use to rationalize their poor network choices. Discover each invalid justification for continuing to work with network vendors and infrastructure that just don't work for you.
Posted: 21 Mar 2017 | Published: 13 Jul 2016

Extreme Networks

How IT Leaders Combine Network Analytics with Automated Control and Management
sponsored by Extreme Networks
WHITE PAPER: Businesses that have issues with network performance and reliability often point to a lack of visibility into their network infrastructure as the root cause. But getting the visibility needed to rectify these issues isn't as difficult as it may seem. This white paper discusses the how you can overcome lackluster network visibility.
Posted: 16 Mar 2017 | Published: 29 Jul 2016

Extreme Networks

SD-WAN: A Simplified Network for Distributed Enterprises
sponsored by Citrix
WHITE PAPER: Discover how SD-WAN delivers to the demands of distributed enterprises, including bandwidth savings and architecture optimized for cloud. Download to learn how to integrate SD-WAN with your existing architecture, view 3 key factors to consider when evaluating deployment, SD-WAN vs. MPLS cost comparison, and more.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

Citrix

SD-WAN: From Zero Touch Provisioning to Secure Business Intent
sponsored by Silver Peak
WHITE PAPER: Essential requirements for software-defined WANs (SD-WANs) include granular visibility into both legacy and cloud applications, as well as centrally assigned business intent policies to secure and control all WAN traffic. In this white paper, learn about Silver Peak's SD-WAN solution that can help you provide this functionality and more.
Posted: 09 Mar 2017 | Published: 30 Dec 2016

Silver Peak

Wi-Fi: Secure Enough for The Federal Government?
sponsored by HPE and Intel®
WHITE PAPER: As Wi-Fi continues to evolve, so does its security functionality. But is it secure enough to protect the US Federal Government? In this white paper, get a detailed, technical explanation of how modern enterprise Wi-Fi networks are secured, and whether Wi-Fi has the ability to fully protect the federal government.
Posted: 02 Mar 2017 | Published: 30 Sep 2016

HPE and Intel®

Overview of the Secure Development Lifecycle
sponsored by APC by Schneider Electric
WHITE PAPER: Secure development lifecycle (SDL) is a process that keeps security in mind with every step of the app development process. Uncover an overview of SDL and 8 key practices that will enable your organization to design and build software securely.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

APC by Schneider Electric

Empowering the Mobile Workforce with MDM and EMM
sponsored by Snow Software
WHITE PAPER: This white paper examines a platform that provides both mobile device management (MDM) and enterprise mobile management (EMM) capabilities. Discover how to take your MDM and mobile app management to the next level by unlocking security features that allay IT concerns, creating transparency and insight into device and app use, and more.
Posted: 21 Feb 2017 | Published: 31 May 2016

Snow Software

Supercharge Your Networking Career
sponsored by VMware
WHITE PAPER: IT teams that rely on hardware-centric networks are struggling to keep up with the demands of today's business users. In this infographic, learn how you can supercharge your network and your career with network virtualization.
Posted: 21 Feb 2017 | Published: 29 Apr 2016

VMware

How To Eliminate Downtime With NGFWs
sponsored by Forcepoint
WHITE PAPER: The increased workload of security devices as they analyze traffic can strain computing resources. Learn how NGFW security technology can maintain network defenses and make downtime a distant memory.
Posted: 17 Feb 2017 | Published: 04 Mar 2016

Forcepoint

How To Decrease Network Complexity & Help Your IT Staff
sponsored by Forcepoint
WHITE PAPER: According to Gartner, 80% of total IT costs occur after initial purchase. If you want to keep network security high and costs low, you need the right network management system. Learn how you can decrease network complexity and help your IT staff do their jobs better and faster.
Posted: 17 Feb 2017 | Published: 14 Jan 2016

Forcepoint

Meeting the Network Requirements of Intelligent Transportation Systems
sponsored by TechData - Digi
WHITE PAPER: In this white paper, learn how to choose a router and vendor that can provide your organization with Global 3G/4G LTE options, centralized mass configuration, remote troubleshooting and more.
Posted: 10 Apr 2017 | Published: 29 Jan 2016

TechData - Digi

How to Eliminate Network Blind Spots in Visibility and Security
sponsored by Ixia
WHITE PAPER: Poor network and application performance monitoring tools and practices can lead to costly and tedious issues down the road. Is there a secret to attaining improved visibility, reliability AND substantial ROI?Zeus Kerravala weighs in.
Posted: 10 Feb 2017 | Published: 10 Feb 2017

Ixia

Ixia and Gigamon Go Head-to-Head in Processing Performance
sponsored by Ixia
WHITE PAPER: In this comparison see Ixia's Net Tool Optimizer (NTO) 5288 go up against Gigamon's GigaVUE-HC2 with One GigaSMART Module, comparing: processing performance, deduplication performance, packet loss, and security considerations.
Posted: 10 Feb 2017 | Published: 31 Jan 2016

Ixia

Evaluating Inline Security Fabric: Key Considerations
sponsored by Ixia
WHITE PAPER: To address the issues with inline security monitoring, many organizations are deploying a resilient security fabric. Learn more about high-performing security fabrics that protect network availability and increase the inspection of traffic entering and leaving your network.
Posted: 09 Feb 2017 | Published: 30 Dec 2016

Ixia

Plan Your Firewall Migration to Increase Security Resilience
sponsored by Ixia
WHITE PAPER: This paper examines best practices for maximizing uptime and achieving high availability during a firewall migration.
Posted: 09 Feb 2017 | Published: 30 Dec 2016

Ixia
51 - 75 of 797 Matches Previous Page    1 2 3 4 5 6    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement