IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security White Papers (View All Report Types)
76 - 100 of 847 Matches Previous Page  |  Next Page
Solving the Top 11 API Threats
sponsored by Axway
WHITE PAPER: This white paper explores how to learn from failure, improve pattern recognition of security quality and detect possible security vulnerabilities.
Posted: 16 Mar 2016 | Published: 01 Feb 2016

Axway

API Security Checklist
sponsored by Axway
WHITE PAPER: This infographic shares with you 11 ways to guard your enterprise entry points. Look it over and make the changes necessary to ensure a more secure API deployment for your business.
Posted: 16 Mar 2016 | Published: 31 Dec 2015

Axway

App and Threat Intelligence Defense Strategy Revealed
sponsored by Ixia
WHITE PAPER: In this white paper, delve deeper into app and threat intelligence defense strategies to mitigate hacker attempts to break through your vulnerabilities.
Posted: 15 Mar 2016 | Published: 25 Nov 2015

Ixia

Report: Modern Threat Intelligence
sponsored by IBM
WHITE PAPER: The complexities of doing business at scale, both strategic and technical, create barriers in preventing breaches. Uncover ways to focus on user education and systematic protocols for operating a strong risk assessment program, allowing you to overcome these barriers.
Posted: 15 Mar 2016 | Published: 29 Feb 2016

IBM

Network-based Security: Global Visibility is the Difference
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Point security solutions aren't enough to keep up with increasingly diverse and sophisticated cyberthreats. Access this brief resource to learn how a network-based security strategy can detect threats and stop them before they affect your business.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Own Your Defense: Network-Based Security
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Many of the same things that drive business forward today are often the primary points of entry or vectors of attack that can damage your organization. Every new connection among your systems, employees, partners and customers is a potential point of vulnerability. Learn how to keep your business safe as threats grow.
Posted: 15 Mar 2016 | Published: 01 Mar 2016

Level 3 Communications, Inc.

Attack Resiliency Challenges Industry Collaboration Ability
sponsored by OpenDNS
WHITE PAPER: Attackers are reaping millions in profit, and defenders are struggling to detect and combat cybersecurity threats. This infographic lays out the ways that next-generation attacks on the network are challenging today's security teams.
Posted: 14 Mar 2016 | Published: 31 Dec 2015

OpenDNS

Network Security Models: How to Discover Attacks Before They Happen
sponsored by OpenDNS
WHITE PAPER: This infographic explores network security models, and how data scientists are able to use these models to discover malicious attacks before they happen.
Posted: 14 Mar 2016 | Published: 31 Dec 2015

OpenDNS

2016 Cyberthreat Defense Report
sponsored by Imperva
WHITE PAPER: You will learn how your spend compares to that of other organizations, what defense measures your peers have in place to defend against internal and external threats, and why weaknesses in your strategy could make your organization a "low hanging fruit".
Posted: 14 Mar 2016 | Published: 24 Feb 2016

Imperva

Financial Services Industry: 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This report offers a high-level overview of the major threats trending across businesses worldwide over the past year. Access now for insight into the current threat landscape for the financial services industry and offers solutions that can help you better protect your organization overall.
Posted: 14 Mar 2016 | Published: 31 Dec 2015

IBM

Plugging the Security Gaps of Cloud File Sharing Services
sponsored by Imperva
WHITE PAPER: This paper examines seven items to consider when it comes to security and compliance of cloud file sharing services and how you can mitigate the risks with a Cloud Access Security Broker (CASB) solution.
Posted: 14 Mar 2016 | Published: 17 Feb 2016

Imperva

Building, Installing, and Configuring a RADIUS Server
sponsored by Global Knowledge
WHITE PAPER: A RADIUS server can provide you with heightened security with user access monitoring, reporting and tracking functions, and personalized restrictions. This white paper walks you through each of the steps, settings, configurations, and the equipment needed to set up a RADIUS server.
Posted: 14 Mar 2016 | Published: 24 Feb 2016

Global Knowledge

Overcome WAN Challenges with Visibility and Assurance
sponsored by LiveAction
WHITE PAPER: This white paper examines a SD-WAN solution that can address WAN networking challenges and meet the infrastructure requirements of today's enterprises. You'll learn about the visibility and management layer which empowers IT organizations to easily engineer and operationalize these new networks.
Posted: 14 Mar 2016 | Published: 30 Sep 2015

LiveAction

Uncovering the Risk of SAP Cyber Breaches
sponsored by Onapsis
WHITE PAPER: Access this SAP research paper to understand the threat of an SAP cyber breach and how organizations are managing the risk of information threat, modification of data and disruption of business processes. Learn from businesses that have been breached an average of two times in the past 24 months.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Onapsis

Four top cyber crime trends
sponsored by IBM
WHITE PAPER: This report provides insight into the security issues of today's IT environment. While incidents around the globe are diverse, most of them share certain characteristics and fit recurring patterns.
Posted: 11 Mar 2016 | Published: 31 Dec 2015

IBM

Real-Time, Unified Endpoint Protection: A New Era in Incident Response
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper teaches you about the only endpoint protection platform that natively integrates prediction, prevention, detection and response. Save considerable time, money and energy while simultaneously improving your overall security posture.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

Understanding and Mitigating DDoS
sponsored by Dyn
WHITE PAPER: DoS/DDoS attacks aren't going anywhere and they're only getting harder to detect and remedy. You need a highly resilient DNS infrastructure to mitigate today's sophisticated attacks.This white paper reviews DNS Denial of Service attack concepts and mitigation strategies.
Posted: 11 Mar 2016 | Published: 24 Feb 2016

Dyn

How to Handle a Ransomware Hijacking
sponsored by ESET
WHITE PAPER: This white paper reinforces the important precautions of secure mobile management in the enterprise. Uncover the global state of ransomware attacks, preventative measures you can take, and what to do if your organization gets infected.
Posted: 09 Mar 2016 | Published: 09 Mar 2016

ESET

Breaking Bad: The Risk of UnsecureFile Sharing
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores the link between organizational and individual behavior when using increasingly popular file sync-and-share solutions.
Posted: 09 Mar 2016 | Published: 31 Oct 2014

IntraLinks, Inc

Report: (In)Security Everywhere in 2016
sponsored by ESET
WHITE PAPER: In this report, you'll uncover ways to plow through 2016 with a proactive attitude of security awareness. Read on to learn about the current state of security (or lack thereof), and what you can do to rise above emerging threats such as ransomware, targeted attacks, crimeware, haxposure, and more.
Posted: 08 Mar 2016 | Published: 08 Mar 2016

ESET

Security Architecture Review: Reducing Detection and Response Times
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper showcases how to provide greater visibility across the ever-expanding attack surface and apply big data analytics to detect patterns of concerning behavior faster.
Posted: 08 Mar 2016 | Published: 16 Dec 2015

LogRhythm, Inc.

Windows Security Management: What's New in Windows 10
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper, you'll explore how new auditing and logging capabilities in Windows 10 give IT visibility into potential threats. Uncover ways to thwart threat actors by scoping user privileges, logging on with additional credentials, and more.
Posted: 07 Mar 2016 | Published: 29 Jan 2016

LogRhythm, Inc.

Security trends in the manufacturing industry
sponsored by IBM
WHITE PAPER: This white paper shows you statistics about cyberattack in the manufacturing industry and how they resulted. Learn some manufacturing best practices and securements to better protect any exploitable weaknesses in your organization's infrastructure.
Posted: 16 Mar 2016 | Published: 29 Feb 2016

IBM

Security trends in the retail industry
sponsored by IBM
WHITE PAPER: In this white paper, you will learn about different methods hackers use to steal customer data as well as statistics showing what time of year attacks are most prevalent. Learn how to defend yourself against hackers and how to respond if a breach does take place in your network.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

IBM

The price of loyalty programs
sponsored by IBM
WHITE PAPER: This white paper shows you how to implement a loyal program for your customers and minimize the chance of account breaches. Learn how to diligently monitor your network and how to detect signs of attacks.
Posted: 14 Mar 2016 | Published: 30 Nov 2015

IBM
76 - 100 of 847 Matches Previous Page    2 3 4 5 6 7    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement