IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
1 - 25 of 1285 Matches Previous Page  |  Next Page
Beyond Malware: Detecting the Undetectable
sponsored by CrowdStrike
WHITE PAPER: This report details how successful attacks targeting high-profile government and corporate entities are able to easily bypass traditional defenses.
Posted: 27 Jul 2015 | Published: 27 Jul 2015

CrowdStrike

Defend Web Properties from Modern Threats with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about the challenges of defending modern web app properties from modern threats, and discover how you can benefit from deploying an application delivery controller (ADC).
Posted: 27 Jul 2015 | Published: 30 Jan 2015

Citrix

Case Study: KAS Bank Secures High-value Transactions with Strong Authentication
sponsored by HID
CASE STUDY: This case study examines security challenges for a European bank with the shift to on line transactions. Read on to find out how they implemented a strategy that delivered the highest level of security with a reusable infrastructure.
Posted: 23 Jul 2015 | Published: 25 Mar 2013

HID

9 Steps to a Secure Printer
sponsored by Nuance
WHITE PAPER: This white paper discusses just how much danger your printer poses to your organization and gives you nine tips for mitigating that danger.
Posted: 21 Jul 2015 | Published: 31 May 2015

Nuance

Implementing an Intelligent Security Architecture
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, you'll learn about Cisco's intelligent security architecture that spans endpoints, networks, security analytics, malware protection, and threat intelligence. Read on and discover how you can benefit from a more intelligent security system.
Posted: 20 Jul 2015 | Published: 27 Feb 2015

Cisco Systems, Inc.

Next Generation Firewall Comparative Analysis
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to learn the relative security effectiveness of 12 leading firewall solutions so that you can make a more informed decision when trying to secure your software-defined data center.
Posted: 20 Jul 2015 | Published: 26 Dec 2014

Cisco Systems, Inc.

How Always-On SSL Boosts Your Google Ranking
sponsored by GeoTrust, Inc.
RESOURCE: This infographic explores how to improve SEO ranking and be found by more customers through always-on SSL.
Posted: 20 Jul 2015 | Published: 17 Jun 2015

GeoTrust, Inc.

Rank Higher on Google with Always-On SSL
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper explores how to improve SEO ranking and be found by more customers through always-on SSL.
Posted: 20 Jul 2015 | Published: 17 Jun 2015

GeoTrust, Inc.

How to Choose A Certificate Authority For Safer Web Security
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper looks at the role of CAs in web security, including what measures a CA can take to promote trust in its certificates and the criteria to consider when choosing the best CA for the job.
Posted: 17 Jul 2015 | Published: 11 Nov 2013

GeoTrust, Inc.

Increase E-commerce Conversion Rates with Extended Validation SSl Certificates
sponsored by GeoTrust, Inc.
WHITE PAPER: Learn how deploying an EV certificate on your eCommerce website can protect against threats, while showing your customers that they can transact with confidence, helping increase your sites conversion rates.
Posted: 17 Jul 2015 | Published: 11 Nov 2014

GeoTrust, Inc.

Network Study Session: School Supports iPad Initiative for 1600+ Students
sponsored by Extreme Networks
CASE STUDY: This case study examines how one Australian school overcame outdated network challenges to support MDM integration, HTML video streaming, and device tracking.
Posted: 17 Jul 2015 | Published: 01 Jul 2015

Extreme Networks

Understanding Valdation: Understanding the Art and Science of SSL Certificate Validation
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper acts as a buyer's guide to choosing the right level of SSL certificate validation for your organization.
Posted: 16 Jul 2015 | Published: 15 Jan 2014

GeoTrust, Inc.

Why Always-on SSL is Critical for Company Websites Today
sponsored by GeoTrust, Inc.
WHITE PAPER: This paper discusses how always-on SSL offers enhanced security to protect against these attacks, while delivering several additional business benefits.
Posted: 16 Jul 2015 | Published: 01 Jul 2015

GeoTrust, Inc.

Reaping the Benefits of Strong, Smarter User Authentication
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses what the changes in enterprise IT mean for implementing smart authentication practices.
Posted: 16 Jul 2015 | Published: 31 Oct 2013

Symantec Corporation

Defending Against Cloud Security Threats
sponsored by Data#3
WHITE PAPER: This white paper is a comprehensive guide to securing your cloud and virtual infrastructure using Microsoft Azure.
Posted: 16 Jul 2015 | Published: 28 Feb 2015

Data#3

The Problem with the Padlock
sponsored by SearchSecurity.com
EBOOK: TLS/SSL is no longer a Web security cornerstone. While the industry responds to its vulnerabilities, with TLS 1.3, learn what else you must do to keep your connections secure.
Posted: 16 Jul 2015 | Published: 16 Jul 2015

SearchSecurity.com

One Secure Wireless Network for All Global Delivery Centers
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to learn how Mindtree implemented a new wireless network solution to connect more employees and devices, comply with stringent security requirements, and management network access from a single interface.
Posted: 16 Jul 2015 | Published: 31 Mar 2015

Cisco Systems, Inc.

4 Components of a Solid Mobile App Security Strategy
sponsored by IBM
WHITE PAPER: This white paper explains how to design a business-driven app strategy that advances business goals without putting enterprise data and your network at risk.
Posted: 15 Jul 2015 | Published: 08 Jul 2015

IBM

Geek Guide: Apache Web Servers and SSL Authentication
sponsored by GeoTrust, Inc.
WHITE PAPER: This guide walks through what SSL/TLS is (and isn't), how you can create or buy a certificate, how to install that certificate into an Apache server and then how to configure Apache such that a subset of URLs on your system are covered by SSL.
Posted: 15 Jul 2015 | Published: 01 Jul 2015

GeoTrust, Inc.

Managing Security Threats in Today's Mobile Enterprise
sponsored by BlackBerry
WEBCAST: This video tackles the issue of mobile security and discusses how, despite the multitude of threats facing mobile devices, you can make sure your enterprise remains secure.
Posted: 14 Jul 2015 | Premiered: Jul 14, 2015

BlackBerry

Cyber Risk Intelligence Tailored For Your Business
sponsored by SurfWatch Labs
VIDEO: This brief video explains how cyber intelligence can help your organization gain a stronger understanding of the cyber risks it faces.
Posted: 13 Jul 2015 | Premiered: 12 Sep 2014

SurfWatch Labs

5 Key Areas To Consider For Remodeling Your Infrastructure
sponsored by IBM
EBOOK: This informative resource can help you take advantage of the biggest business opportunities and the technology required for success.
Posted: 08 Jul 2015 | Published: 01 Dec 2014

IBM

Cybersecurity: The New Agenda
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: In this white paper, recognized security expert Jim Anderson discusses how organizations need to change in order to protect themselves in the new threat landscape.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

BAE Systems Applied Intelligence (formerly SilverSky)

Complexity and Data Growth Driving Environments Toward a New Generation of Data Protection
sponsored by Acronis
WHITE PAPER: Access this research report to discover the key challenges that IT infrastructure professionals are faced with, and learn how backup and DR solutions are evolving as a result.
Posted: 07 Jul 2015 | Published: 30 Jun 2014

Acronis

The Innovation Index: Is Your Organization Equipped for Growth?
sponsored by Verizon
RESEARCH CONTENT: This quick survey identifies seven areas to review as potential strengths or weaknesses in your network.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

Verizon
1 - 25 of 1285 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement