IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
1 - 25 of 1518 Matches Previous Page  |  Next Page
Top 6 Reasons to Choose DNA
sponsored by Cisco Systems, Inc.
RESOURCE: In this resource, learn the top 6 ways Cisco Digital Network Architecture helps deliver protection over security breaches.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Cisco Systems, Inc.

What's on Your Network?
sponsored by Aruba Networks
RESOURCE: In this resource, find out how the closed-loop approach to network security allows IT professionals to deploy and retain control of IoT and BTOD devices to protect against security breaches.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Aruba Networks

Security Analytics: Putting Together an Effective Incident Response Plan
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, learn how to create and implement an effective incident response plan to detect security breaches before damage occurs.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Cisco Systems, Inc.

Modernize your Network to Digitize your Business
sponsored by Aruba Networks
RESOURCE CENTER: In this article, learn how the changing network infrastructure and increase of IoT devices motivates organizations to implement new network strategies, like automation to leverage capacity, reliability, and security.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Aruba Networks

Case Study: How Regional Bank Maintained Information Security with the Cloud
sponsored by J2 Cloud Services
CASE STUDY: In this case study, learn how Regional Bank established the cloud faxing model that features redundancy and survivability to help prevent security breaches.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

J2 Cloud Services

Best Practices for Privileged Access Management
sponsored by Centrify Corporation
RESEARCH CONTENT: In this research report, gain a better understanding of the best practices when deploying privileged access management (PAM) tools to achieve regular compliance and prevent security breaches.
Posted: 20 Sep 2017 | Published: 12 Sep 2017

Centrify Corporation

IHS Technology: Network Monitoring Equipment
sponsored by Gigamon
WHITE PAPER: In this report, gain a stronger understanding of the network monitoring equipment market to help improve overall security and reliability.
Posted: 20 Sep 2017 | Published: 19 May 2017

Gigamon

Encrypted Traffic Analytics
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to learn about the state of encryption technology, predictions, and how you can leverage it to turn your network into an advanced security sensor, capable of detecting threats in encrypted traffic.
Posted: 20 Sep 2017 | Published: 30 Jun 2017

Cisco Systems, Inc.

Disrupt the Machine-to-Human Fight with a New Defender Lifecycle Model in Security Operations
sponsored by Gigamon
WHITE PAPER: In this white paper, learn how a security delivery platform combats breaches and cyberattacks by integrating machine learning, artificial intelligence (AI) and security workflow automation.
Posted: 20 Sep 2017 | Published: 31 Jul 2017

Gigamon

Guide to Early Application Testing and Understanding Dev and Ops Responsibilities
sponsored by IBM
EGUIDE: Explore the importance of early application security testing. Learn from Owen Garrett, Head of Products for NGINX Inc., while he explains the security risks with containers and developing microservices.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

How to Think like a Hacker to Stop Application Security Threats
sponsored by IBM
EGUIDE: Find out how applying the hacker mindset when setting application security standards can help uncover flaws that vulnerability scanners might not recognize.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

How to Secure Mobile Applications in a Private Cloud
sponsored by IBM
EGUIDE: In this expert e-guide, uncover the benefits and challenges of creating a private app store to control and monitor the delivery of properly secured mobile applications.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

How to Boost Mobile Application Security
sponsored by IBM
EGUIDE: In this expert e-guide, discover ways to boost mobile application security by performing regular assessments to help eliminate an enterprise's vulnerability to data breaches and attacks.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

How to Build an Enterprise Application Security Program
sponsored by IBM
EGUIDE: In this e-guide, learn the key steps to building an enterprise application security program to decrease exposure to potential attackers through statics and dynamic application testing.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

IBM

Discover True Advanced Threat Detection
sponsored by Microsoft
RESOURCE: In this infographic, explore a service that enables you to detect, investigate and respond to complex targeted attacks on your networks.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Microsoft

Aruba Clearpass Network Access Control
sponsored by Aruba Networks
WHITE PAPER: This white paper learn how mobility and IoT are changing how organizations approach network access control (NAC) and switching to security tools like, Aruba Clearpass can help detect threats before damage occurs.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

Aruba Asset Tracking
sponsored by Aruba Networks
RESOURCE: In this resource, uncover the benefits of using real-time location systems (RTLS) to locate your assets to improve productivity in the workplace.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

Digital Documents, Compliance, and the Cloud
sponsored by J2 Cloud Services
WHITE PAPER: This white paper highlights the challenges associated with managing sensitive documents on the cloud while sharing security best practices to reduce transmission managements and retention costs associated with e-documents.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

J2 Cloud Services

eFax Corporate: Helping SAP Managers Find the best Cloud-based Fax Provider
sponsored by J2 Cloud Services
WHITE PAPER: In this white paper, eFax Corporate offers insight on finding the right cloud-hosted fax provider while learning the key advantages of moving legacy SAP fax processes into the cloud.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

J2 Cloud Services

Global Interconnection Index
sponsored by Equinix
WHITE PAPER: Evolving business models are placing more importance on real-time engagement, requiring you to scale your digital platforms or risk failing. Access this white paper to learn about a network infrastructure that gives your the power to transfer the entire printed content in the U.S. Library of Congress three times over in one second.
Posted: 18 Sep 2017 | Published: 31 Aug 2017

Equinix

Aruba Campus Switching: The Foundation for the Modern Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: In this white paper, learn the key benefits of different types of campus switching tools to prepare your network infrastructure for the increase of doing business on mobile.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

Improve End-to-end Security with Aruba Clearpass
sponsored by Aruba Networks
RESOURCE: In this resource, learn how to protect all devices corporate, IoT, BYOD- wired and wirelessly to tighten up end-to-end security from unauthorized users.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

The Total Economic Impact Of xMatters
sponsored by xMatters, Inc.
RESEARCH CONTENT: In this research report, Forrester Consulting shares the ROI from organizations that used xMatters as their communications and notifications platform.
Posted: 15 Sep 2017 | Published: 31 Jan 2017

xMatters, Inc.

The Total Economic Impactâ„¢ Of Microsoft Windows Defender Advanced Threat Protection
sponsored by Microsoft
RESEARCH CONTENT: This Forrester Consulting report examines the ROI for organizations that used Windows Defender ATP to detect and respond to data breaches on their networks.
Posted: 15 Sep 2017 | Published: 31 Jul 2017

Microsoft

Five Risk Points To Avoid In Enterprise Security
sponsored by Microsoft
WHITE PAPER: Hackers have found sophisticated methods to breach the network undetected.In this white paper, guide yourself through the 5-step course to detect and prevent advance cyberattacks.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Microsoft
1 - 25 of 1518 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement