IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Network Forensics

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cyberforensics, Security Forensics, Digital Forensics, Forensic Analysis, Forensics
DEFINITION: Network forensics is the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents. (The term, attributed to firewall expert Marcus Ranum, is borrowed from the legal and criminology fields where forensics pertains to the investigation of crimes.) According to Simson Garfinkel, author of several books on security, network forensics  … 
Definition continues below.
Network ForensicsReports
16 Matches
Networking Monitoring Best Practices: Setting A Network Performance Baseline
sponsored by Ixia
EGUIDE: Explore the necessities for a network performance baseline, potential challenges and how to overcome them with the tips and advice in this e-guide.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Ixia

IT Security Salary Index (UK)
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Are you being paid the right rate for the job ? Check out this IT Security salary index from Acumin.
Posted: 30 Jan 2014 | Published: 30 Jan 2014

ComputerWeekly.com

Dell OpenManage Network Manager Overview
sponsored by Dell, Inc.
WEBCAST: Network management is an important part of keeping your network running smooth and efficient. This brief video showcases how you can solve your network issues with asophisticated, yet simple software.
Posted: 25 Nov 2013 | Premiered: Jul 5, 2012

Dell, Inc.

Intervention areas for superfast broadband project Connecting Cumbria
sponsored by ComputerWeekly.com
DATA SHEET: UK broadband roll-out: Download this Excel spreadsheet detailing the intervention status of postcodes across Cumbria
Posted: 15 Oct 2013 | Published: 15 Oct 2013

ComputerWeekly.com

WAN Speak Musings – Volume I
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

Network Forensics in a 10G World
sponsored by WildPackets, Inc.
WHITE PAPER: This resource outlines the challenges inherent to 10G network forensics, explains why traditional network analysis is ineffective, and offers guidance on how to build and deploy effective forensics in a 10G world.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

WildPackets, Inc.

Network Evolution University: Network Security for the high-performance data center
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom discusses how to meet the business-critical network security needs of the high-performance data center with a new generation of devices to prevent attacks and breaches via wired and wireless access networks.
Posted: 17 Jun 2013 | Premiered: 24 Jun 2013

SearchNetworking.com

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky Lab
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky Lab

Computer Weekly – 19 March 2013: Delivering software development success
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.
Posted: 18 Mar 2013 | Published: 19 Mar 2013

ComputerWeekly.com

Tackling Today’s Networking Challenges
sponsored by HP and Intel
PRESENTATION TRANSCRIPT: This paper introduces the new concept of a multi-vendor network, the challenges surrounding this breed of network, trends within the industry, how to improve efficiency, and how to improve productivity when it comes to managing and infrastructure.
Posted: 09 Sep 2011 | Published: 07 Sep 2011

HP and Intel

E-Book: Technical Guide on Network Security Monitoring
sponsored by SearchMidMarketSecurity
EBOOK: SearchMidmarketSecurity.com presents a comprehensive guide to network security monitoring. Our experts cover all the angles with authoritative technical advice on: network security management; integrity monitoring; security device testing; intrusion prevention buying criteria; and how to prepare for your annual network audit.
Posted: 17 May 2010 | Published: 17 May 2010

SearchMidMarketSecurity

New Podcast: Adding Context to Security Alerts
sponsored by Solera Networks
PODCAST: In this podcast you’ll learn how network forensics can integrate with other security tools to provide context to any alert.
Posted: 16 Apr 2010 | Premiered: Apr 16, 2010

Solera Networks

Protecting and Securing Privacy Data and Sensitive Information in Today’s Healthcare Organization
sponsored by McAfee, Inc.
WHITE PAPER: This document takes a look at several aspects of data protection and HIPAA compliance and explains how a Data Loss Prevention (DLP) solution can help IT professionals discover sensitive data at rest, monitor traffic in real time, and capture events for after-the-fact investigations.
Posted: 08 Mar 2010 | Published: 08 Mar 2010

McAfee, Inc.

SEKE Podcast - Introduction to Solera DeepSee
sponsored by Solera Networks
PODCAST: In this podcast presented by James Hilliard, host of the "See Everything, Know Everything" podcast, and Matthew Wood, Solera Networks' Chief Scientist, you'll learn about the DeepSee tool, which provides administrators, users and C-level executives at a corporation a way to see what is happening on a network in real-time.
Posted: 04 Feb 2010 | Premiered: Feb 4, 2010

Solera Networks

Orion Network Performance Monitor
sponsored by SolarWinds, Inc.
TRIAL SOFTWARE: Traditional framework solutions are expensive and tough to implement; are difficult to use, maintain and customize; and often impractical for network engineers in mid- to large-sized organizations. Network engineers need affordable, scalable network management solutions that provide immediate visibility into performance of the entire network.
Posted: 14 Jul 2009 | Premiered: 14 Jul 2009

SolarWinds, Inc.

The Need for Effective Event Management
sponsored by GFI Software
PRODUCT LITERATURE: This paper examines various corporate needs and provides information on how GFI EventsManager can help corporations achieve important goals.
Posted: 22 Jun 2007 | Published: 01 Jun 2007

GFI Software
16 Matches
 
NETWORK FORENSICS DEFINITION (continued): …  systems can be one of two kinds:"Catch-it-as-you-can" systems, in which all packets passing through a certain traffic point are captured and written to storage with analysis being done subsequently in batch mode. This approach requires large amounts of storage, usually involving a RAID system."Stop, look and listen" systems, in which each packet is analyzed in a rudimentary way in memory and only certain information saved for future analysis. This approach requires less storage but may require a faster processor to keep up with incoming traffic.Both approaches require significant storage and … 
Network Forensics definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement