IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
1 - 25 of 1438 Matches Previous Page  |  Next Page
Security Everywhere: A Growth Engine for the Digital Economy
sponsored by Cisco
WHITE PAPER: Learn how security can become an enabler for businesses to take full and secure advantage of opportunities presented by new digital business models and the growing pervasiveness of the IoE.
Posted: 19 Jan 2017 | Published: 19 Jan 2017

Cisco

Managed DNS Evaluation Guide: Understanding What Matters Most When Selecting Managed DNS
sponsored by Dyn
WHITE PAPER: This guide explains how a cloud-based DNS service can help you improve business results and provides guidelines for choosing a managed DNS service provider.
Posted: 17 Jan 2017 | Published: 30 Nov 2016

Dyn

Wi-Fi is Easy, Secure Wi-Fi is the Challenge.
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this eBook, learn about the increasing demand for Wi-Fi, and more importantly, how to secure your wireless network.
Posted: 13 Jan 2017 | Published: 10 Oct 2016

WatchGuard Technologies, Inc.

Navigating Market Complexity to Fulfill Network Security Requirements
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper explores how to take a strategic approach to selecting the right tools for modern network security. Discover how SMBs can tackle the challenge of navigating the market to make sure they're putting pragmatic, streamlined, and effective security measures in place.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

WatchGuard Technologies, Inc.

Improve Network Security Speed and Performance
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this data sheet, you'll learn about security technology that upholds performance even as more security functions and features get added. Learn about these features, including agile firewall throughput, comprehensive network security services, and more.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

WatchGuard Technologies, Inc.

Gain Complete Control of Your Digital Ecosystem with PKI
sponsored by Entrust, Inc.
WHITE PAPER: Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.
Posted: 11 Jan 2017 | Published: 14 Sep 2016

Entrust, Inc.

School District Ensures Data Protection with Network Security Appliance
sponsored by WatchGuard Technologies, Inc.
CASE STUDY: One school district, with over 1,200 students and 400 staff members, needed to protect confidential data, remain compliant with CIPA (Children's Internet Protection Act) and improve visibility and control over web applications. In this case study, learn how the school was able to meet their needs with one advanced, network security appliance.
Posted: 10 Jan 2017 | Published: 03 Mar 2016

WatchGuard Technologies, Inc.

IoT Strategy: 8 Key Questions to Ask
sponsored by Cisco Systems, Inc.
WHITE PAPER: IoT introduces tremendous risk if the connected products and services are not designed, deployed and supported properly. The 8 questions presented in this white paper provide a step-by-step approach for turning an IoT vision into reality.
Posted: 29 Dec 2016 | Published: 30 Nov 2016

Cisco Systems, Inc.

Capitalizing on The Internet of Things
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how transform a product business into a service business, the core benefits and challenges of IoT, as well as 5 fundamentals to consider when evaluating how your company can best leverage the internet of things.
Posted: 29 Dec 2016 | Published: 29 Dec 2016

Cisco Systems, Inc.

Achieving End-to-End Security in the Internet of Things
sponsored by Cisco Systems, Inc.
WHITE PAPER: Minimize risk and optimize operations for mission-critical connected devices using cellular IoT for secure connections. Learn how you can capitalize on the IoT's endless possibilities without becoming tomorrow's headline
Posted: 27 Dec 2016 | Published: 30 Jun 2016

Cisco Systems, Inc.

Innovative Monetization Approaches for Home Security and Automation Organizations
sponsored by Cisco Systems, Inc.
WHITE PAPER: Take an in-depth look at four innovative IoT approaches home security organizations are using to expand their services and grow their bottom line.
Posted: 27 Dec 2016 | Published: 30 Apr 2016

Cisco Systems, Inc.

Best Practices for Implementing Global IoT Initiatives
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how to successfully launch, secure and maintain your IoT service. Discover six best practices for managing IoT complexity and six crucial areas you must be prepared to address.
Posted: 23 Dec 2016 | Published: 31 Mar 2016

Cisco Systems, Inc.

Improving Patient Care With Secure Mobile Software
sponsored by BlackBerry
CASE STUDY: Learn how UHB used mobile technology to improve patient care while ensuring security and empowering staff. For example, UHB deployed applications which serve as on-call systems providing physicians with real-time assistance.
Posted: 21 Dec 2016 | Published: 21 Dec 2016

BlackBerry

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Manage Risk by Protecting the Apps and Data that Drive Business Productivity
sponsored by Citrix
WHITE PAPER: Traditional perimeter-based security has been rendered ineffective by mobility and the cloud. In this infographic, learn how to successfully navigate the increasingly volatile IT business environment and take a new approach to information security.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Overcome Cloud Challenges with Open Networking and Flexible Tools
sponsored by Dell EMC and Intel®
WHITE PAPER: Discover how to integrate different cloud offerings with a combined SDN infrastructure and hybrid cloud strategy. Read on to learn how to situate your cloud infrastructure as to take advantage of SDN's real-time intelligence, deep app integration, and high levels of automation.
Posted: 21 Dec 2016 | Published: 21 Dec 2016

Dell EMC and Intel®

The Power of Virtual Security
sponsored by Microsoft
EGUIDE: Learn how easy it is to inadequately secure your virtual environment and leave your network exposed as a result of BYOD and scattered management. You'll see why you need a single management policy for security, with layered safeguards ensuring consistent protection.
Posted: 20 Dec 2016 | Published: 20 Dec 2016

Microsoft

Building A Scalable Remote Access Environment in AWS
sponsored by Palo Alto Networks
WHITE PAPER: Learn about a scalable remote access tool available to AWS users. Inside, you will see how you can protect your mobile workforce, as well as the network as a whole, from threats originating on the web. At the same time, you can minimize your administrative costs associated with remote access and mobile security.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

Palo Alto Networks

Securing Your Microsoft Environment
sponsored by Palo Alto Networks
WHITE PAPER: The challenge your organization faces is how to best protect your infrastructure from cyberattacks. Discover ways to adopt a prevention-first security posture that protects the network and digital assets.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

Palo Alto Networks

UEM is the Next Step in the Evolution of Device Management
sponsored by vmware airwatch
WHITE PAPER: Read this white paper to uncover AirWatch's leading unified endpoint management (UEM) approach. Find out how it enables organizations to take a consistent approach to endpoint security and management across a plethora of devices, apps, and deployments.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

vmware airwatch

Ruggedized and Secure Mobile for Business Outcome–Focused Enterprise Retail Applications
sponsored by vmware airwatch
RESEARCH CONTENT: Explore this IDC white paper to find out why retailers are investing in the deployment of secure, ruggedized mobile devices as well as how paradigms like MDM play into their enterprise mobile strategies.
Posted: 16 Dec 2016 | Published: 30 Sep 2016

vmware airwatch

5 Trends in Windows 10 Adoption
sponsored by vmware airwatch
WHITE PAPER: This flipbook reveals the five key trends in Windows 10 adoption and migration. Give your customers the ability to unify desktop and mobile management under one model.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

vmware airwatch

Firewall Buyer's Guide: Evaluating Enterprise Network Firewalls
sponsored by Palo Alto Networks
WHITE PAPER: Learn to navigate your way through the firewall market, and choose a program that will allow your administrators to easily define which applications are and are not allowed on your business' network. Discover 10 essential characteristics of the modern firewall, tips for constructing a RFP, how to physically evaluate your firewall, and more.
Posted: 15 Dec 2016 | Published: 15 Dec 2016

Palo Alto Networks

Seeing Through the Clouds: Cloud Visibility Improves Network Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper explains why network telemetry is the key to better cloud security. Learn how network telemetry can expand advanced visibility, threat detection, and security analytics capabilities to the cloud for more comprehensive network protection.
Posted: 15 Dec 2016 | Published: 30 Sep 2016

Cisco Systems, Inc.

5 Ways to Prevent a Ransomware Infection through Network Security
sponsored by Fortinet, Inc.
EGUIDE: What can you do to protect yourself from initial ransomware infection? And if ransomware gets into one system, how can you stop it from spreading to others? This expert e-guide details 5 ways to prevent a ransomware infection through network security.
Posted: 14 Dec 2016 | Published: 12 Dec 2016

Fortinet, Inc.
1 - 25 of 1438 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement