IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network SecurityWhite Papers (View All Report Types)
76 - 100 of 726 Matches Previous Page  | Next Page
Why threat intelligence is critical for next generation firewalls
sponsored by Dell Software
WHITE PAPER: A top-tier threat intelligence network is the foundation of an effective next-generation firewall (NGFW). This white paper examines three criteria for judging threat intelligence networks: completeness, accuracy and speed, and discusses how one such network works in practice.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

Overcoming exploits that use advanced evasion techniques and SSL encryption
sponsored by Dell Software
WHITE PAPER: To defend against today's advanced attacks, next-generation firewalls must be effective in overcoming obfuscation and advanced evasion techniques, as well as performing comprehensive SSL decryption and inspection.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

How SMBs can stop Malvertising
sponsored by Dell Software
WHITE PAPER: Computer users want to find a deal, read celebrity gossip or share personal details with friends. Cybercriminals know how to leverage it. This white paper explains malvertising, and offers five measures for blocking these threats.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

Beyond next gen firewalls
sponsored by Dell Software
WHITE PAPER: This ebook explains the differences in stateful firewalls and next generation firewalls, while giving you resources and other research to help you find the best defense against cyberattacks.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

2013 Threat Report
sponsored by Dell Software
WHITE PAPER: This report extensively details and categorizes recent global trends in network threats.
Posted: 19 Aug 2014 | Published: 23 Jan 2014

Dell Software

HP TippingPoint – A New Approach to Malware Defense
sponsored by Hewlett-Packard Company
WHITE PAPER: This brief highlights a solution that integrates next-generation firewalls with intrusion prevention to create a barrier against harmful malware.
Posted: 19 Aug 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

A Guide to Improving Your Network Security in 30 Days
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource highlights a NGFW solution combined with intrusion prevention to cure your network security issues.
Posted: 19 Aug 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

A Universal Log Management Solution
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, explore a universal log management solution that consolidates log data from security, compliance audit, IT operations, and application development teams to provide clear visibility to improve troubleshooting abilities.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett-Packard Company

Securing Your IT Infrastructure with SOC/NOC Collaboration
sponsored by Hewlett-Packard Company
WHITE PAPER: Get help seamlessly integrating log management into IT operations to effectively integrate SOC and NOC, empowering your organization to effectively manage your IT infrastructure while simultaneously ensuring its security.
Posted: 19 Aug 2014 | Published: 28 Sep 2012

Hewlett-Packard Company

Secure Mobile Access
sponsored by Dell Software
WHITE PAPER: Discover how to enhance mobile productivity among employees by using converged technology that combines the best of management and security capabilities.
Posted: 06 Aug 2014 | Published: 01 Mar 2014

Dell Software

The ABCs of Mobile Device Management
sponsored by IBM
WHITE PAPER: Securely managing mobile devices, apps and docs can be difficult without the right tools. However, with so many options employees have when a BYOD campaign is set in place, differences in operating systems and hardware create even more trouble.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

IBM

The Top 20 Critical Security Controls for Effective Cyber Defense
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper outlines how LogRhythm's Security Intelligence Platform maps directly to each of the 20 Critical Security Controls, developed by the SANS Institute to help prioritize the most effective methods and policies to safeguard assets, information, and infrastructure.
Posted: 31 Jul 2014 | Published: 31 Jan 2014

LogRhythm, Inc.

LogRhythm's Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm's Security Intelligence Platform, which combines enterprise-class SIEM, Log Management, File Integrity Monitoring, and Machine Analytics with Host and Network Forensics to provide profound visibility into threats and risks to which organizations are otherwise blind.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Identity Analytics: Exposing the "Who" in Anonymous Log and Machine Data
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper discusses LogRhythm's Identity Inference Engine™, which combines already-collected machine data with advanced analytics to automatically identify who is responsible for activities in your IT environment, a critical component of maintaining a secure network.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

LogRhythm Labs Embedded Expertise
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm Labs, an organization within LogRhythm that performs dedicated research to continually enhance the Security Intelligence Platform with embedded machine data intelligence, real-time threat detection, and automated compliance assurance.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

From BlackBerry to BYOD
sponsored by Citrix
WHITE PAPER: This white paper discusses mobile device management tools and other solutions for enterprises in the era of BYOD and mobile device diversity.
Posted: 30 Jul 2014 | Published: 31 Dec 2013

Citrix

How Managed Endpoint Security Can Help Expand Your Managed Services Business
sponsored by N-able Technologies
WHITE PAPER: In this white paper, learn how utilizing a single integrated management platform for malware protection can help Managed Service Providers (MSPs) streamline and standardize their security efforts, and the many benefits of implementing managed endpoint security for MSPs and their customers.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

N-able Technologies

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by LogRhythm, Inc.
WHITE PAPER: Check out this Magic Quadrant report for security information and event management to see how leading Continue on to this valuable whitepaper now for a complete analysis of the SIEM market, including the strengths and cautions of 15 leading vendors.
Posted: 29 Jul 2014 | Published: 25 Jun 2014

LogRhythm, Inc.

Data Center Trends and Network Security Impact
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper reviews the major data center trends that enterprises and service providers should be preparing for, as well as their anticipated impact on network security.
Posted: 29 Jul 2014 | Published: 31 Dec 2012

Fortinet, Inc.

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by IBM
WHITE PAPER: This highly informative white paper from Gartner objectively evaluates a variety of SIEM technologies on a number of critical dimensions, including market responsiveness, customer experience, and pricing.
Posted: 24 Jul 2014 | Published: 25 Jun 2014

IBM

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
WHITE PAPER: This white paper explores the growing world of mobile application development and highlights the benefits of providing security for mobile applications during the development and deployment stages.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

IBM

The Devices Are Coming! How the "Internet of Things" Will Affect IT
sponsored by Cox Communications, Inc.
WHITE PAPER: This informative report provides insight into what others are (or aren't) doing to prepare for the invasion of internet-connected devices in the workplace, as well as the changes that your enterprise should anticipate in the coming years.
Posted: 16 Jul 2014 | Published: 31 May 2014

Cox Communications, Inc.

Network Protection and UTM Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM
76 - 100 of 726 Matches Previous Page    2 3 4 5 6 7    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement