IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
76 - 100 of 776 Matches Previous Page  |  Next Page
SSL/TLS Visibility: Determining Your Network Security Blind Spot Cost
sponsored by Blue Coat Systems
WHITE PAPER: This white paper will assist you in calculating the cost of leaving the SSL/TLS network security blind spot open to hackers and presents strategies to mitigate risks.
Posted: 08 Jan 2016 | Published: 16 Dec 2015

Blue Coat Systems

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and describes how encrypted traffic management can help mitigate these risks.
Posted: 07 Jan 2016 | Published: 09 Dec 2013

Blue Coat Systems

Privileged Access Management: Why Sudo in Longer Enough
sponsored by FoxT
WHITE PAPER: This white paper presents Sudo's shortcomings for identity and access management of privileged accounts and what you can do to guarantee secure authentication for users. Read on to learn more.
Posted: 06 Jan 2016 | Published: 23 Dec 2015

FoxT

Taming the Beast- Controlling SSH for Security and Compliance
sponsored by FoxT
WHITE PAPER: Are SSH keys the saviors of identity management and access security for your organizations? With several different styles of keys, it's imperative you know the differences and guidelines to using them. Access this white paper to learn more about SSH keys and taking the next step to centralizing SSH session access control to boost security.
Posted: 05 Jan 2016 | Published: 11 Nov 2015

FoxT

Detect and Thwart Insider Threats
sponsored by Lancope
WHITE PAPER: This white paper discusses how you can stop insider threats with enhanced network visibility. Read on to learn how to keep your organization secure from the inside out.
Posted: 05 Jan 2016 | Published: 31 Dec 2015

Lancope

Combating the Insider Threat: Your Guide to Staying Secure
sponsored by Lancope
WHITE PAPER: This resource explores the danger of insider threats and provides suggestions on preventing them. Read on to learn why you need to focus your security inward and what practices will help you do so.
Posted: 05 Jan 2016 | Published: 31 Dec 2015

Lancope

Detect Network Anomalies with the Right Netflow Analysis Tool
sponsored by Lancope
WHITE PAPER: In this article, a security expert discusses how he found a security tool that met his netflow analysis needs. Read on and learn how you can obtain the deep network insights necessary for stopping advanced hacks in your organization.
Posted: 04 Jan 2016 | Published: 18 Nov 2014

Lancope

Case Study: School District Stops Breaches with Heightened Network Visbility
sponsored by Lancope
WHITE PAPER: Access this case study to discover how a large school district blocked breaches with network visibility, improved its incident response time, and more.
Posted: 30 Dec 2015 | Published: 30 Dec 2015

Lancope

Tenable's Continuous Network Monitoring and the Verizon DBIR
sponsored by Tenable Network Security
WHITE PAPER: This paper discusses how you can use Verizon's Data Breach Investigation Report and apply its findings easily to your own organization.
Posted: 29 Dec 2015 | Published: 29 Jun 2015

Tenable Network Security

Network Security Monitoring with Real-Time Visibility to Vulnerabilities and Threats
sponsored by Tenable Network Security
WHITE PAPER: This resource discusses the challenges of static security scanning tools and a way to implement a continuous scanning method that can improve your enterprise's resistance to numerous forms of attack.
Posted: 28 Dec 2015 | Published: 28 Jul 2014

Tenable Network Security

Managing Business Risk with Assurance Report Cards
sponsored by Tenable Network Security
WHITE PAPER: This whitepaper explains how you can implement a security product that provides assurance Report Cards and enables security leaders to continuously demonstrate security availability.
Posted: 28 Dec 2015 | Published: 28 Dec 2015

Tenable Network Security

Top 5 Reasons to Combine Network and Security Operations Centers
sponsored by AccelOps Inc.
WHITE PAPER: This white paper outlines the 5 most important reasons why you should combine network and security operations centers. Read on to learn how this new structure can help your organizations with compliance, threat management, automation, and more.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

AccelOps Inc.

The State of Security in Control Systems Today
sponsored by Tenable Network Security
WHITE PAPER: This report focuses on helping ICS professionals identify the challenges facing their peers and their own enterprises.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

Tenable Network Security

Creating a Security Program That Exceeds Any Compliance Standard
sponsored by Tenable Network Security
WHITE PAPER: This resource describes the PCI DSS, the standard technical and operational requirements to protect cardholder data.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

Tenable Network Security

A Secure Path to the Cloud
sponsored by Oracle Corporation
WHITE PAPER: In this white paper, learn how one cloud infrastructure provider has built cybersecurity into the hardware to go beyond basic network and data defenses to protect your organization's sensitive assets.
Posted: 22 Dec 2015 | Published: 09 Dec 2015

Oracle Corporation

Case Study: Government Institution Gains Deeper Security Insight
sponsored by ThreatConnect
WHITE PAPER: In this case study, discover how a government institution obtained greater insight into security threats by implementing predictive defenses, threat intelligence, and more.
Posted: 21 Dec 2015 | Published: 21 Dec 2015

ThreatConnect

Effective Vulnerability Management
sponsored by Tenable Network Security
WHITE PAPER: This white paper goes into detail about the ten distinct steps you need to take in order to ensure that you are protecting your network.
Posted: 16 Dec 2015 | Published: 16 Dec 2015

Tenable Network Security

Network Barometer Report
sponsored by Dimension Data
WHITE PAPER: This report gauges the readiness of today's networks to support business. Read on for recommendations about how to improve network services levels. And how to reduce support time.
Posted: 16 Dec 2015 | Published: 16 Dec 2015

Dimension Data

Threat Intelligence Platforms: Everything You’ve Ever Wanted to Know But Didn’t Know to Ask
sponsored by ThreatConnect
WHITE PAPER: This in-depth resource covers the ins and outs of threat intelligence, discussing everything from what threat intelligence is to how you can best utilize it.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

ThreatConnect

New Recommendations From FFIEC on Extortion Attacks
sponsored by Easy Solutions
WHITE PAPER: Recently, the Federal Financial Institutions Examinations Council (FFIEC) issued a statement warning financial institutions of the cyber-risks they face and suggesting steps for avoiding those risks. Access this article for a summary of the most important information and guidelines to come out of the FFIEC statement.
Posted: 15 Dec 2015 | Published: 17 Nov 2015

Easy Solutions

Proactive Incident Response: Prepare Now or Pay Later
sponsored by Blue Coat Systems
WHITE PAPER: This infographic features a proactive approach to incident response. Discover how to gain visibility and reduce response time by recording and analyzing all network traffic, earning you up to 55% in savings by reducing costs associated with data breaches.
Posted: 09 Dec 2015 | Published: 09 Dec 2015

Blue Coat Systems

Survey: The State of Wireless Security Today
sponsored by Fortinet, Inc.
WHITE PAPER: Learn more about what your peers are doing – or not doing – to secure the wireless infrastructure. Additional data points covered in this report include plans for cloud-managed WLANs and IT decision-maker confidence in relying on third-party hosted management.
Posted: 09 Dec 2015 | Published: 15 Oct 2015

Fortinet, Inc.

Rethinking Network Security and Access to Meet Today's Business Demands
sponsored by Fortinet, Inc.
WHITE PAPER: This paper outlines comprehensive Fortinet's Secure Access offering across 3 deployment modes, which provides the same comprehensive security in both controller-managed and cloud-managed environments. Read how this suite delivers flexibility and simplicity in both the wired and wireless network while ensuring that security is never compromised.
Posted: 09 Dec 2015 | Published: 09 Oct 2015

Fortinet, Inc.

How to Apply the Data and Network Maturity Model to Four Technology Pillars
sponsored by Carousel Industries
WHITE PAPER: This expert white paper shows how you can evaluate your approach to network and security against a proven maturity model, which will help you determine if you're adopting new technologies in the most efficient way. Read on to learn how you can apply this model to a variety of technologies
Posted: 08 Dec 2015 | Published: 08 Dec 2015

Carousel Industries

Case Study: Government Contractor Secures its Data with Enhanced Analytics
sponsored by Blue Coat Systems
WHITE PAPER: Access this case study to learn how a defense contractor cut down on security incidents and protected its sensitive assets by implementing an advanced security analytics platform.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

Blue Coat Systems
76 - 100 of 776 Matches Previous Page    2 3 4 5 6 7    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement