IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network Security Reports
1 - 25 of 1268 Matches Previous Page  |  Next Page
Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization
sponsored by Mimecast
WHITE PAPER: This white paper presents the timeline of a spear-phishing attack and the common security strategies used that ultimately fail to protect the organization.
Posted: 26 May 2015 | Published: 22 Apr 2015

Mimecast

Re-Assessing APT and Network Security
sponsored by Threat Track Security
WHITE PAPER: In this white paper, take an in-depth look at how advanced attack campaigns are constructed and why traditional security approaches are failing to detect and mitigate them. View now to learn how to re-assess your security strategy.
Posted: 26 May 2015 | Published: 13 May 2015

Threat Track Security

15 SIEM Systems Evaluated for 3 Use Cases
sponsored by IBM
WHITE PAPER: This Gartner report evaluates fifteen SIEM systems according to three different use cases and reveals the specialized capabilities of each.
Posted: 26 May 2015 | Published: 25 Jun 2014

IBM

How 15 Different SIEM Systems Performed
sponsored by IBM
WHITE PAPER: This report presents the results of an in-depth review of fifteen different SIEM products.
Posted: 26 May 2015 | Published: 01 Jul 2014

IBM

Top Cyberthreat Attacks and Defenses for 2015
sponsored by Threat Track Security
WHITE PAPER: This exclusive in-depth white paper examines the top threats and attack layers that cybercriminals are targeting today.
Posted: 26 May 2015 | Published: 06 May 2015

Threat Track Security

Rethinking Software Defined Networks
sponsored by F5 Networks
WHITE PAPER: In this white paper, you'll learn how to "operationalize" the network to simplify operations and trouble shooting, creating less downtime and faster deployment of new services.
Posted: 26 May 2015 | Published: 26 May 2015

F5 Networks

Special Report: Detailed Reviews of 7 IPS Platforms
sponsored by IBM
WHITE PAPER: This report presents detailed reviews of seven IPS platforms to help you decide which one meets your specific needs.
Posted: 26 May 2015 | Published: 29 Dec 2014

IBM

The Value of Cloud and Data Security
sponsored by Trend Micro
WHITE PAPER: In this white paper, you'll learn about a simple, comprehensive approach to server security that proves serious economic value for any company.
Posted: 22 May 2015 | Published: 22 May 2015

Trend Micro

Uncover Advanced Attacks and Detect Hidden Breaches
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, discover how you can gain greater visibility into the state of both active and live threats hidden within your network.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

VMware NSX The Platform for Network Virtualization
sponsored by VMware
DATA SHEET: Current network and security solutions are rigid, complex and often vendor-specific. Consult this white paper to find out more on how VMware NSX can bring your data center and networking strategies to the next level.
Posted: 22 May 2015 | Published: 22 May 2015

VMware

Why InfoSec Needs Guarantees
sponsored by White Hat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 22 May 2015 | Premiered: May 12, 2015

White Hat Security

Achieving Enterprise Agility in the Cloud
sponsored by F5 Networks
WHITE PAPER: Download and discover how a combination of solutions can give you the best of both worlds – simplified cloud agility with all of the security, visibility and control that you need.
Posted: 22 May 2015 | Published: 22 May 2015

F5 Networks

Don’t Let Your DDoS Defense Fall Behind
sponsored by Neustar®
WHITE PAPER: This white paper examines the pros and cons of several different DDoS mitigation approaches. Access now to learn how to evaluate and choose the ideal strategy based on your risk assessment.
Posted: 21 May 2015 | Published: 13 May 2015

Neustar®

Security, Storage, and Collaboration Gains from Cloud Solutions
sponsored by Box
WHITE PAPER: Access this white paper to learn how Avago Technologies implemented a new cloud file sync and share service, yielding greater business agility, infrastructure cost-savings and simplified management for greater security.
Posted: 21 May 2015 | Published: 31 Jul 2014

Box

Best Practices for Dealing with Phishing and Next-Generation Malware
sponsored by Threat Track Security
WHITE PAPER: This white paper focuses on the state of phishing and malware attacks and how hackers are evolving. Continue reading to learn mitigation strategies and best practices for educating employees to avoid attacks.
Posted: 21 May 2015 | Published: 29 Apr 2015

Threat Track Security

Securing the Payment Card Industry in Physical, Virtual and Cloud Environments
sponsored by Trend Micro
WHITE PAPER: Access this white paper for an in-depth look at how you can enjoy all of the benefits of a virtual PCI data center without having to worry about PCI Data Security Standard 3.0 compliance.
Posted: 20 May 2015 | Published: 24 Apr 2015

Trend Micro

4 Security Must-Haves For DDoS Protection
sponsored by Neustar®
WHITE PAPER: This white paper acts as a DDoS platform buyer's guide and presents the 4 key components to have to ensure protection. View now and examine why each of the 4 pieces is imperative to have in your next DDoS security solution.
Posted: 20 May 2015 | Published: 29 Apr 2015

Neustar®

DNS Hijacking and Phishing - Easy Exploits
sponsored by Neustar®
WHITE PAPER: This white paper explores several steps you can take you reduce the number of human and technical vulnerabilities to mitigate the risks of phising and DNS hijacking attacks. Continue reading to learn how to better protect your network.
Posted: 20 May 2015 | Published: 06 May 2015

Neustar®

Security and Unlocking the Value of the Mobile Workforce
sponsored by EE
WHITE PAPER: In this white paper, explore the benefits and challenges of mobile computing and why MDM needs to transition to enterprise mobility management (EMM) to secure apps and content. Continue reading to learn more.
Posted: 19 May 2015 | Published: 18 Mar 2015

EE

How to Secure the Enterprise With Threat Intelligence and Protection Software
sponsored by AVG Technologies
EGUIDE: This expert guide can help you stay secure in today's threat landscape by helping you build a strong, layered security system that includes threat intelligence and multiple forms of endpoint protection.
Posted: 19 May 2015 | Published: 19 May 2015

AVG Technologies

How to Securely Sync, Share, Collaborate, and Manage Business Content
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper examines one Software as a Service (SaaS) strategy and how it enables mobile content access and secure file sharing outside of the firewall. View now to see how other organizations have used this approach to protect data and files as they are accessed and shared and if it is right for your organization.
Posted: 18 May 2015 | Published: 16 Dec 2014

IntraLinks, Inc

An Overview of DNS-Based DDoS Attacks
sponsored by Nominum, Inc.
WHITE PAPER: This white paper covers the recent changes in DNS DDoS tactics and offers remediation strategies to improve network security for customers. Inside, discover how to stop malicious traffic at ingress to DNS resolvers and the steps to take to mitigate evolving DDoS attacks.
Posted: 15 May 2015 | Published: 06 May 2015

Nominum, Inc.

6 New Best Practices for DNS
sponsored by Nominum, Inc.
WHITE PAPER: This white paper outlines 6 new DNS security best practices for service providers.  View now to learn more about mitigating DNS-based DDoS attacks.
Posted: 15 May 2015 | Published: 22 Apr 2015

Nominum, Inc.

DNS Software Drives Network Economics
sponsored by Nominum, Inc.
WHITE PAPER: Access this white paper to learn the benefits of updating DNS for service providers. Continue reading and uncover best practices for choosing and operating DNS software.
Posted: 15 May 2015 | Published: 25 Feb 2015

Nominum, Inc.

Case Study: Large ISP Gains Visibility & Control During DDoS Attack
sponsored by Nominum, Inc.
CASE STUDY: The following case study details how with the help of Nominum, the large South American ISP was able to hinder and overcome the DDoS attack. Access now and learn how Nominum had kept the provider informed of DNS DDoS developments for several months and was immediately prepared to help, keeping harm down and morals up.
Posted: 14 May 2015 | Published: 14 May 2015

Nominum, Inc.
1 - 25 of 1268 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement