IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
1 - 25 of 1411 Matches Previous Page  |  Next Page
Optimizing the Software-Defined Wide-Area Network
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper explores the concept of software-defined WAN and how to optimize it. Uncover the answers to essential questions, like: What does the expansion of the initial usage of SDN mean to CIOS? What should they do to make the most of SD-WAN? Plus, learn about 5 key advantages and the main challenges of SD-WAN.
Posted: 22 Feb 2017 | Published: 22 Feb 2017

Riverbed Technology, Inc.

How to Cut Your Troubleshooting Time in Half
sponsored by ExtraHop
VIDEO: Join experts Nick Brackney and Jim Sullivan as they discuss the intricacies of how to approach modern IT Ops and why traditional network monitoring fails in the face of today's troubleshooting needs.
Posted: 21 Feb 2017 | Premiered: 14 Feb 2017

ExtraHop

11 ECM Vendors Researched, Analyzed, and Scored
sponsored by Box
WHITE PAPER: Before you pinpoint the ECM vendor that's best for you now and into the future, it's important to explore how ECM vendors have been trending over the last couple years. In this Forrester report from 2 years ago, 11 ECM software vendors were researched, analyzed, and scored. Discover who was leading the pack, and how the ECM landscape has evolved.
Posted: 21 Feb 2017 | Published: 28 Aug 2015

Box

Empowering the Mobile Workforce with MDM and EMM
sponsored by Snow Software
WHITE PAPER: This white paper examines a platform that provides both mobile device management (MDM) and enterprise mobile management (EMM) capabilities. Discover how to take your MDM and mobile app management to the next level by unlocking security features that allay IT concerns, creating transparency and insight into device and app use, and more.
Posted: 21 Feb 2017 | Published: 31 May 2016

Snow Software

Supercharge Your Networking Career
sponsored by VMware
WHITE PAPER: IT teams that rely on hardware-centric networks are struggling to keep up with the demands of today's business users. In this infographic, learn how you can supercharge your network and your career with network virtualization.
Posted: 21 Feb 2017 | Published: 29 Apr 2016

VMware

Enterprise Mobile Device Management: SJ Case Study
sponsored by Snow Software
CASE STUDY: This case study explores how SJ, a large train operator, implemented a modern mobile device management platform to unlock the control and insight they needed to manage thousands of connected devices. Discover how they unlocked complete transparency and visibility, enabled remote app updates, boosted security, and more.
Posted: 17 Feb 2017 | Published: 31 Dec 2016

Snow Software

How to Manage Mobile Devices, Apps, and Content Simply and Securely
sponsored by IBM
RESOURCE: Discover how IBM MaaS360 empowers users to manage mobile apps for iOS, Android, Windows, and Blackberry devices simply and securely from an intuitive, user-friendly portal. Access this complimentary 30 day trial to leverage a platform that enables you to manage mobile devices, apps, content, and security.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

IBM

The Definitive Guide to Selecting the Right ADC for the Digital Transformation Era
sponsored by Citrix
EBOOK: Explore what considerations should drive app delivery controller (ADC) management to navigate the increasing complexities of planning for change and digital transformation. Discover how to boost your app delivery strategy and network management by harnessing the power of the cloud to adapt to hybrid environments and microservice architectures.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Citrix

EMM with Centralized, Secure Control: Garuda Indonesia Case Study
sponsored by IBM
CASE STUDY: This case study explores how Garuda Indonesia implemented a more comprehensive enterprise mobility management (EMM) strategy. Discover how they streamlined management of mobile devices, managed iPads, apps, and content centrally and securely, leveraged SaaS to reduce costs, and boosted productivity by up to 50%.
Posted: 15 Feb 2017 | Published: 31 Dec 2016

IBM

Cloud-Based Mobile Management: The Fundraising People (TFP) Case Study
sponsored by IBM
CASE STUDY: Explore how The Fundraising People replaced their legacy mobility management with a more comprehensive cloud-based platform that increases employees' access to apps and data without sacrificing security. Discover how they unlocked greater control and visibility of mobile devices, all while increasing staff productivity and enabling faster logins.
Posted: 15 Feb 2017 | Published: 31 Dec 2016

IBM

Multi-DNS Patterns: Deliver Better Performance, Security, and Reliability
sponsored by Dyn
WHITE PAPER: Improve the performance, security and reliability of your DNS infrastructure by adding a supplemental DNS service to your IT environment. Discover 3 approaches to multi-DNS that can help deliver consistent, high-quality user experiences and mitigate outage risks.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

Dyn

How to Eliminate Network Blind Spots in Visibility and Security
sponsored by Ixia
WHITE PAPER: Poor network and application performance monitoring tools and practices can lead to costly and tedious issues down the road. Is there a secret to attaining improved visibility, reliability AND substantial ROI?Zeus Kerravala weighs in.
Posted: 10 Feb 2017 | Published: 10 Feb 2017

Ixia

Ixia and Gigamon Go Head-to-Head in Processing Performance
sponsored by Ixia
WHITE PAPER: In this comparison see Ixia's Net Tool Optimizer (NTO) 5288 go up against Gigamon's GigaVUE-HC2 with One GigaSMART Module, comparing: processing performance, deduplication performance, packet loss, and security considerations.
Posted: 10 Feb 2017 | Published: 31 Jan 2016

Ixia

IDC Analyst Connection: Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: Networks have changed drastically since the first firewall was introduced, and as a result, networking pros can no longer assume traffic within the perimeter can be trusted. In this Q&A with IDC's Chris Christiansen, learn how internal segmentation firewalls can help you secure your expanding network.
Posted: 10 Feb 2017 | Published: 31 Jul 2015

Fortinet, Inc.

WP IFSW Global Network Survey results
sponsored by Fortinet, Inc.
WHITE PAPER: Fortinet conducted a survey of IT decision-makers from 10 countries around the world. They were asked specifically about the security challenges and decisions that they have to make and their areas of highest concern. Learn what security trends most concern top IT decision-makers
Posted: 09 Feb 2017 | Published: 22 Aug 2016

Fortinet, Inc.

Evaluating Inline Security Fabric: Key Considerations
sponsored by Ixia
WHITE PAPER: To address the issues with inline security monitoring, many organizations are deploying a resilient security fabric. Learn more about high-performing security fabrics that protect network availability and increase the inspection of traffic entering and leaving your network.
Posted: 09 Feb 2017 | Published: 30 Dec 2016

Ixia

Plan Your Firewall Migration to Increase Security Resilience
sponsored by Ixia
WHITE PAPER: This paper examines best practices for maximizing uptime and achieving high availability during a firewall migration.
Posted: 09 Feb 2017 | Published: 30 Dec 2016

Ixia

5 Ways to Maximize the Value of Security & Monitoring Tools
sponsored by Ixia
WHITE PAPER: ROI is an important factor for evaluating the value of your network security infrastructure. In this white paper, learn how you can start eliminating visibility and security blind spots and extend the life of your monitoring tools.
Posted: 08 Feb 2017 | Published: 30 Dec 2016

Ixia

Fast Breach Mitigation Without Network Disruption
sponsored by Ixia
WHITE PAPER: With network breaches unfolding with growing frequency, your ability to quickly mitigate a crisis begins with knowing where it occurred, and what data was compromised. Discover how to capture the critical data you need to respond more rapidly to emerging situations.
Posted: 08 Feb 2017 | Published: 30 Dec 2016

Ixia

Deploying a Multi‐Gigabit Web Filtering Architecture
sponsored by ContentKeeper
WHITE PAPER: This white paper explores how to redouble web filtering efforts in the face of growing bandwidth and processing requirements. Discover multiple approaches to cultivating a well-managed multi-gigabit architecture, exploring the pros and cons of each, plus uncover tips on how to keep up with one-to-one computing and SSL encrypted sites.
Posted: 08 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

One‐to‐One Computing: A Roadmap to Success
sponsored by ContentKeeper
WHITE PAPER: Access this white paper to learn more about large-scale mobile device management strategies and uncover the 10 keys to one-to-one computing success.
Posted: 08 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

Use a web app firewall to halt app attacks
sponsored by SearchSecurity.com
EBOOK: Web application firewalls are more essential than ever when it comes to halting app attacks. Learn what features and functions you should look for when choosing a new WAF.
Posted: 07 Feb 2017 | Published: 05 Feb 2017

SearchSecurity.com

Streaming Malware Defense: High Speed Bridge-Based Anti‐Virus Gateway
sponsored by ContentKeeper
WHITE PAPER: This white paper explores how to implement better web security and web filtering strategies for both desktop and mobile devices. Discover how to keep up with high speed, bridge-based malware defense systems.
Posted: 07 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

How the Houston Astros Protected their Network from Internet Threats
sponsored by ContentKeeper
CASE STUDY: Explore how the Houston Astros implemented a multi-layered approach to web security to protect against malware, botnets, phishing scams and other online threats. Discover how they unlocked real-time monitoring and reporting of Internet activity for mobile users connecting to their VPN and gained more granular control of SSL encrypted web traffic.
Posted: 07 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

Do You Trust Your Network Security?
sponsored by Ixia
WHITE PAPER: Protecting your network requires a deeper strategy than simply buying security inspection tools, integrating them, and expecting them to comprehensively inspect all of your traffic. Learn how to test your network elements before you go live in order to provide your organization the confidence that your network can survive an attack.
Posted: 06 Feb 2017 | Published: 30 Dec 2016

Ixia
1 - 25 of 1411 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement