IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
76 - 100 of 813 Matches Previous Page  |  Next Page
Networking Checklist: Follow the Steps of Industry Peers
sponsored by Spectrum Enterprise
WHITE PAPER: When networking technology challenges are daunting and you need a new strategy, some of the best guidance comes from those who've been there. Learn from industry peers on how to overcome technology challenges and enable business growth.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Spectrum Enterprise

Protecting Data in the Healthcare Industry
sponsored by Mimecast
WHITE PAPER: The healthcare industry finds itself under cyberattack from many vectors, including ransomware, malware and targeted attacks. Read this white paper to determine strategies to secure your data.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Mimecast

Ambushed By Data
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: This recent survey of 233 security professionals takes a look into the security gaps that still plague the market. Uncover the results to the questions posed to these professionals and an analysis of their relevance.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Arctic Wolf Networks, Inc.

Addressing Today's Endpoint Security Challenges
sponsored by Citrix
WHITE PAPER: Endpoint security has become a major issue for enterprise IT as business mobility and BYOD render traditional perimeter based protection ineffective. Read this white paper to uncover key strategies for mobile and endpoint security, including multilayered protection for apps, data, devices and networks.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Citrix

Passive Optical LAN for Hospitality, Communications, and Entertainment Services
sponsored by Nokia
WHITE PAPER: Learn how to support guest services with POL to improve hotel operations and guest experiences. Discover how POL and GPON outperform Ethernet LAN in a variety of areas to enhance network capacity, costs, security, energy use, and more.
Posted: 14 Aug 2017 | Published: 14 Aug 2017

Nokia

How to Scale for IoT Connectivity
sponsored by Aeris
WHITE PAPER: Discover how to create a M2M and IoT connectivity strategy that suits not only the needs of today but scales for the demands of tomorrow. Read on to learn about 3 traits to look for in an IoT partner and 3 IoT connectivity case studies.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Aeris

Ransomware: Defending Against 5 Major Types
sponsored by Commvault
WHITE PAPER: Not all ransomware is alike, so no one-size-fits-all strategy exists for defending against these attacks. Explore 5 major types of ransomware attacks and learn how to defend against them to bolster your network security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Commvault

Cisco Umbrella Shoots for Secure Internet, Anywhere
sponsored by Cisco Umbrella
WHITE PAPER: Discover how to mitigate risks and improve your security posture for the cloud by leveraging SaaS-based tools that enable advanced malware protection for your network, real-time threat intelligence, and increased DNS gateway security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Cisco Umbrella

Achieve GDPR Readiness with Secure App and Data Delivery
sponsored by Citrix
WHITE PAPER: A Ponemon Institute study finds that most organizations do not feel prepared for the requirements of the GDPR. Discover how you can meet GDPR compliance through application security, contextual access, and more.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Citrix

The Five Essential Capabilities of an Analytics-Driven SOC
sponsored by Splunk
WHITE PAPER: Organizations are now looking to analytics-driven security operations centers (SOCs) to close the gaps in their network defenses. In this white paper, uncover how a successful SOC should have 5 key attributes.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Splunk

The Road to a Secure, Compliant Cloud
sponsored by HyTrust
WHITE PAPER: Corporations must innovate to stay ahead of the competition, deliver new services to attract and keep new customers, and keep their costs low. Uncover how a well-designed virtualized cloud offers businesses a solution, by keeping their crucial data secure while providing agility and adaptability.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

HyTrust

Securing Industrial IoT Technology: 4 Key Considerations
sponsored by Bayshore Networks
WHITE PAPER: Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Bayshore Networks

5 Strategies to Improve Your Security Posture
sponsored by Citrix
WHITE PAPER: Reducing business security risk, protecting sensitive customer data, and ensuring compliance with regulations and standards are priorities for all organizations. Explore 5 ways you can overcome these security challenges.
Posted: 02 Aug 2017 | Published: 31 Dec 2016

Citrix

Don't Just Respond – Prevent Attacks before They Happen
sponsored by Cisco Umbrella
WHITE PAPER: Discover how to use cloud-delivered security services to prevent damaging attacks before they're launched. Learn how to create an advanced threat and malware detection strategy that can proactively identify attack infrastructure with statistical models and pre-emptively protect against most zero-day threats.
Posted: 25 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

Case Study: Simplifying Network Operations Across the Globe
sponsored by Indeni
WHITE PAPER: Learn how Travelex set up and monitored configurations for their widely spread devices to keep their networks running smoothly, and ended up significantly reducing downtime due to firewall issues, plus 5 other key benefits.
Posted: 20 Jul 2017 | Published: 20 Jul 2017


Simple AWS Networking with Application Defined SD-WAN
sponsored by AWS – Riverbed
WHITE PAPER: Many organizations that deploy the cloud are challenged with legacy network infrastructure and management tools. This white paper looks at how Riverbed SD-WAN can help organizations improve performance, agility, and security. Learn more about how to leverage your cloud-centric network.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

AWS – Riverbed

The $38 Billion Security Vulnerability Your Enterprise Can't Afford to Ignore: Phone and Video Hacking
sponsored by Vyopta
WHITE PAPER: An architecture firm was surprised by a $166,000 phone bill they accrued in 1 weekend, and found that hackers had placed premium-rate phone calls through their network. Telecom fraud is a multi-billion dollar threat you can't afford. Learn about the impact of this threat, as well as immediate tactics to prevent telecommunications hacking.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Vyopta

Advanced SD-WAN: Accelerating Digital Transformation and Powering the Cloud-Connected Enterprise
sponsored by Silver Peak
WHITE PAPER: With cloud becoming more of a factor in digital business transformation, many are now looking to SD-WAN to help connect their business. This IDC report discusses the current state of SD-WAN and why so many organizations are adopting it. Find out what benefits these organizations expect SD-WAN to deliver, several use cases, and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Silver Peak

Pervasive Visibility Platform – A New Approach to Network Monitoring
sponsored by Gigamon
WHITE PAPER: Learn how to use a 4-tiered visibility platform to update your network monitoring and management toolset for SDN and NFV, driven by actionable data for traffic intelligence, orchestration, network security, and more.
Posted: 20 Jun 2017 | Published: 31 Mar 2017

Gigamon

A Proactive Approach to Network Operations Management and Cost Reduction
sponsored by Indeni
WHITE PAPER: Explore how to create a real-time window into network health and stability, and reduce the amount of time spent on troubleshooting the seemingly never-ending stream of network issues. Learn how to navigate the myths of using automation in network monitoring and security.
Posted: 06 Jun 2017 | Published: 06 Jun 2017


Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network
sponsored by nCircle
WHITE PAPER: This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact.
Posted: 28 Aug 2017 | Published: 02 Aug 2010

nCircle

It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web
sponsored by Authentic8, Inc.
WHITE PAPER: Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.
Posted: 28 Jul 2017 | Published: 31 Dec 2016

Authentic8, Inc.

Why a Virtual Browser is Important For Enterprise Security
sponsored by Authentic8, Inc.
WHITE PAPER: More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Authentic8, Inc.

Certificate Management: The Ultimate Guide
sponsored by DigiCert
WHITE PAPER: This guide discusses what you should be thinking about for thorough certificate management. Learn how to take control of all areas of the certificate lifecycle, while leveraging APIs and optimizing your team.
Posted: 26 Jul 2017 | Published: 24 Jul 2017

DigiCert

Array Purpose-Built SSL VPN Overview
sponsored by Array Networks
WHITE PAPER: Learn about the issues with SSL VPN firewall integration and how to overcome them in this white paper.
Posted: 31 May 2017 | Published: 28 Feb 2017

Array Networks
76 - 100 of 813 Matches Previous Page    2 3 4 5 6 7    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement