IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
76 - 100 of 781 Matches Previous Page  |  Next Page
Key Considerations in Deploying an SSL Solution
sponsored by F5 Networks
WHITE PAPER: In this white paper, learn what you need to know about Secure Sockets Layer (SSL) and how to construct your security strategy.
Posted: 21 Apr 2017 | Published: 30 Dec 2016

F5 Networks

Intelligent Security Management Ends Costly Network Breaches
sponsored by FireMon
WHITE PAPER: In this white paper, learn more about the challenges network breaches present and what technology can provide you with the functionality to prevent them.
Posted: 14 Apr 2017 | Published: 30 Dec 2016

FireMon

SD-WAN: The Pathway to a Digitally Transformed Branch
sponsored by Windstream Communications
WHITE PAPER: This IDC white paper examines how digital transformation has necessitated a rethinking of WAN connectivity for distributed enterprises.
Posted: 14 Apr 2017 | Published: 28 Feb 2017

Windstream Communications

Automation Isn't One-Size-Fits-All
sponsored by FireMon
WHITE PAPER: In this white paper, learn how intelligent policy automation can take the pressure off your firewall team by telling you which access to approve and which to deny, increasing speed and security of change management workflows.
Posted: 13 Apr 2017 | Published: 30 Dec 2016

FireMon

Prepping for the Oncoming Wave of SD-WANs
sponsored by Windstream Communications
WHITE PAPER: In this TechTarget white paper, learn what the experts are saying about the near future for SD-WANS.
Posted: 12 Apr 2017 | Published: 31 Jan 2017

Windstream Communications

Eight Toxic Networking Vendor Selection Philosophies
sponsored by Extreme Networks
WHITE PAPER: This Forrester Research report reveals eight common statements that organizations use to rationalize their poor network choices. Discover each invalid justification for continuing to work with network vendors and infrastructure that just don't work for you.
Posted: 21 Mar 2017 | Published: 13 Jul 2016

Extreme Networks

How IT Leaders Combine Network Analytics with Automated Control and Management
sponsored by Extreme Networks
WHITE PAPER: Businesses that have issues with network performance and reliability often point to a lack of visibility into their network infrastructure as the root cause. But getting the visibility needed to rectify these issues isn't as difficult as it may seem. This white paper discusses the how you can overcome lackluster network visibility.
Posted: 16 Mar 2017 | Published: 29 Jul 2016

Extreme Networks

SD-WAN: A Simplified Network for Distributed Enterprises
sponsored by Citrix
WHITE PAPER: Discover how SD-WAN delivers to the demands of distributed enterprises, including bandwidth savings and architecture optimized for cloud. Download to learn how to integrate SD-WAN with your existing architecture, view 3 key factors to consider when evaluating deployment, SD-WAN vs. MPLS cost comparison, and more.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

Citrix

SD-WAN: From Zero Touch Provisioning to Secure Business Intent
sponsored by Silver Peak
WHITE PAPER: Essential requirements for software-defined WANs (SD-WANs) include granular visibility into both legacy and cloud applications, as well as centrally assigned business intent policies to secure and control all WAN traffic. In this white paper, learn about Silver Peak's SD-WAN solution that can help you provide this functionality and more.
Posted: 09 Mar 2017 | Published: 30 Dec 2016

Silver Peak

Wi-Fi: Secure Enough for The Federal Government?
sponsored by HPE and IntelĀ® Xeon
WHITE PAPER: As Wi-Fi continues to evolve, so does its security functionality. But is it secure enough to protect the US Federal Government? In this white paper, get a detailed, technical explanation of how modern enterprise Wi-Fi networks are secured, and whether Wi-Fi has the ability to fully protect the federal government.
Posted: 02 Mar 2017 | Published: 30 Sep 2016

HPE and IntelĀ® Xeon

Overview of the Secure Development Lifecycle
sponsored by APC by Schneider Electric
WHITE PAPER: Secure development lifecycle (SDL) is a process that keeps security in mind with every step of the app development process. Uncover an overview of SDL and 8 key practices that will enable your organization to design and build software securely.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

APC by Schneider Electric

Empowering the Mobile Workforce with MDM and EMM
sponsored by Snow Software
WHITE PAPER: This white paper examines a platform that provides both mobile device management (MDM) and enterprise mobile management (EMM) capabilities. Discover how to take your MDM and mobile app management to the next level by unlocking security features that allay IT concerns, creating transparency and insight into device and app use, and more.
Posted: 21 Feb 2017 | Published: 31 May 2016

Snow Software

10 Things Your Next Firewall Must Do
sponsored by Palo Alto Networks
WHITE PAPER: Uncover the 10 things your next firewall must do in order to strike the balance between blocking attacks and allowing mission-critical apps to run when and where you need them.
Posted: 03 Feb 2017 | Published: 31 Dec 2016

Palo Alto Networks

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Meeting the Network Requirements of Intelligent Transportation Systems
sponsored by TechData - Digi
WHITE PAPER: In this white paper, learn how to choose a router and vendor that can provide your organization with Global 3G/4G LTE options, centralized mass configuration, remote troubleshooting and more.
Posted: 10 Apr 2017 | Published: 29 Jan 2016

TechData - Digi

What Changing Mobile Communications Mean for Your Business
sponsored by Mitel Networks Limited
WHITE PAPER: In this TechTarget white paper, learn how to prepare your business for mobile communications with a mobile-centric strategy that encompasses collaboration, customer experience and future technology like IoT and machine-to-machine communications.
Posted: 10 Apr 2017 | Published: 30 Dec 2016

Mitel Networks Limited

Supercharge Your Networking Career
sponsored by VMware
WHITE PAPER: IT teams that rely on hardware-centric networks are struggling to keep up with the demands of today's business users. In this infographic, learn how you can supercharge your network and your career with network virtualization.
Posted: 21 Feb 2017 | Published: 29 Apr 2016

VMware

How to Eliminate Network Blind Spots in Visibility and Security
sponsored by Ixia
WHITE PAPER: Poor network and application performance monitoring tools and practices can lead to costly and tedious issues down the road. Is there a secret to attaining improved visibility, reliability AND substantial ROI?Zeus Kerravala weighs in.
Posted: 10 Feb 2017 | Published: 10 Feb 2017

Ixia

Ixia and Gigamon Go Head-to-Head in Processing Performance
sponsored by Ixia
WHITE PAPER: In this comparison see Ixia's Net Tool Optimizer (NTO) 5288 go up against Gigamon's GigaVUE-HC2 with One GigaSMART Module, comparing: processing performance, deduplication performance, packet loss, and security considerations.
Posted: 10 Feb 2017 | Published: 31 Jan 2016

Ixia

Evaluating Inline Security Fabric: Key Considerations
sponsored by Ixia
WHITE PAPER: To address the issues with inline security monitoring, many organizations are deploying a resilient security fabric. Learn more about high-performing security fabrics that protect network availability and increase the inspection of traffic entering and leaving your network.
Posted: 09 Feb 2017 | Published: 30 Dec 2016

Ixia

Plan Your Firewall Migration to Increase Security Resilience
sponsored by Ixia
WHITE PAPER: This paper examines best practices for maximizing uptime and achieving high availability during a firewall migration.
Posted: 09 Feb 2017 | Published: 30 Dec 2016

Ixia

5 Ways to Maximize the Value of Security & Monitoring Tools
sponsored by Ixia
WHITE PAPER: ROI is an important factor for evaluating the value of your network security infrastructure. In this white paper, learn how you can start eliminating visibility and security blind spots and extend the life of your monitoring tools.
Posted: 08 Feb 2017 | Published: 30 Dec 2016

Ixia

Fast Breach Mitigation Without Network Disruption
sponsored by Ixia
WHITE PAPER: With network breaches unfolding with growing frequency, your ability to quickly mitigate a crisis begins with knowing where it occurred, and what data was compromised. Discover how to capture the critical data you need to respond more rapidly to emerging situations.
Posted: 08 Feb 2017 | Published: 30 Dec 2016

Ixia

Do You Trust Your Network Security?
sponsored by Ixia
WHITE PAPER: Protecting your network requires a deeper strategy than simply buying security inspection tools, integrating them, and expecting them to comprehensively inspect all of your traffic. Learn how to test your network elements before you go live in order to provide your organization the confidence that your network can survive an attack.
Posted: 06 Feb 2017 | Published: 30 Dec 2016

Ixia

Security Everywhere: A Growth Engine for the Digital Economy
sponsored by Cisco
WHITE PAPER: Learn how security can become an enabler for businesses to take full and secure advantage of opportunities presented by new digital business models and the growing pervasiveness of the IoE.
Posted: 19 Jan 2017 | Published: 19 Jan 2017

Cisco
76 - 100 of 781 Matches Previous Page    2 3 4 5 6 7    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement