IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
1 - 25 of 1284 Matches Previous Page  |  Next Page
Industry Best DNS-Based DDoS Protections
sponsored by Nominum, Inc.
WHITE PAPER: In this white paper, you'll learn why better DNS defenses are needed to mitigate advanced and evolving bot-based malware and DDoS attacks.
Posted: 28 Aug 2015 | Published: 19 Aug 2015

Nominum, Inc.

An Introduction to VMware NSX
sponsored by VMware
VIDEO: This video explains the benefits of a network virtualization and security platform for the software-defined data center.
Posted: 27 Aug 2015 | Premiered: 27 Sep 2013

VMware

Addressing the Threat Within: Rethinking Network Security Deployment
sponsored by Gigamon
WHITE PAPER: This white paper outlines the 6-point anatomy of APTs and how they evade traditional cybersecurity architectures.
Posted: 24 Aug 2015 | Published: 29 Jul 2015

Gigamon

Predictive Security - Using Big Data to Unmask Mobile Threats
sponsored by Lookout
WHITE PAPER: This paper explains how predictive security leverages big data to add the layer of data and machine intelligence needed to pre-empt mobile threats before they can do harm. See examples of how predictive security was able to thwart two destructive mobile apps: MalApp.D and BadNews.
Posted: 24 Aug 2015 | Published: 05 Aug 2015

Lookout

Case Study: A SIEM Effective Enough for a Government Contractor
sponsored by Splunk
WHITE PAPER: This white paper describes how a technology integration business found a SEIM solution strong enough to protect the sensitive government information it manages.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Splunk

Threats Will Get In: What Will You Do About Them?
sponsored by Splunk
VIDEO: This brief video explains the necessity of adjusting your security strategy to focus more on detecting and mitigating threats.
Posted: 21 Aug 2015 | Premiered: 02 Jul 2014

Splunk

Why Your Layered Security is Filled with Holes – And What You Can Do About It
sponsored by Malwarebytes Corporation
TRANSCRIPT: In this webinar transcript, security experts discuss why your layered security may not be as effective as you think, and what you can do instead.
Posted: 21 Aug 2015 | Published: 21 Aug 2015


Strong Authentication for Secure Employee Access
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper describes how to enable two-factor authentication to all users and resources using a single automated backend—either from the cloud or on-premises. Download now to see how your organization could benefit from strong authentication.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

Strong Authentication: Securing Identities and Enabling Productivity
sponsored by SafeNet, Inc.
WHITE PAPER: Access this informative white paper to learn how strong authentication methods like USB tokens and smart cards are helping organizations to stay ahead of the security curve.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

Ensuring Security and Compliance in Today's Threat Landscape
sponsored by Splunk
VIDEO: In this video, an expert in security technology discusses what makes a piece of security software effective in today's threat landscape.
Posted: 20 Aug 2015 | Premiered: 19 Jan 2014

Splunk

A Faster, More Effective Way to Manage Authentication Deployments
sponsored by SafeNet, Inc.
WHITE PAPER: Next generation authentication services can make accessing virtualized and cloud-based services less of a struggle. Read on to see more of what a next generation authentication service can do for your organization.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

Why Layered Security May Not Be Enough
sponsored by Malwarebytes Corporation
PODCAST: This podcast explores why the typical layered security approach is full of holes and outlines steps you can take fill these holes.
Posted: 20 Aug 2015 | Premiered: Jul 27, 2015


Holistic Security for the Modern Threat
sponsored by Splunk
VIDEO: This video discusses the capabilities of a security platform that incorporates big data analytics, security investigating, and reporting, all of which can give you a holistic view of your network security.
Posted: 19 Aug 2015 | Premiered: 24 Jan 2014

Splunk

Your Layered Security Defenses are Riddled with Holes… Here's what to do instead
sponsored by Malwarebytes Corporation
WEBCAST: In this webcast, security experts discuss the holes in the typical layered security approach and outline steps you can take to make your security program truly successful.
Posted: 19 Aug 2015 | Premiered: Jul 27, 2015


Walk Through a Network Virtualization Platform
sponsored by VMware
VIDEO: This series of videos walks you through a network virtualization platform that features network and security services attached to VMs, all with a policy-driven approach.
Posted: 19 Aug 2015 | Premiered: 19 Aug 2015

VMware

Safeguarding Access in the Distributed Network
sponsored by HID
WHITE PAPER: This white paper introduces a method of identity management that will safeguard any access point, even mobile and virtual ones.
Posted: 18 Aug 2015 | Published: 12 Feb 2013

HID

Protecting Data on the Go
sponsored by SearchSecurity.com
EBOOK: This guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

SearchSecurity.com

Hyper-connected enterprise infrastructure
sponsored by Hewlett-Packard Limited and Intel ®
WHITE PAPER: In this white paper, you'll learn about a mobile-first IT infrastructure approach that enables employees to use powerful apps on any device.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Hewlett-Packard Limited and Intel ®

Transforming the Status Quo of Traditional Networking
sponsored by VMware
WHITE PAPER: This white paper outlines a new approach to software-defined networking that delivers the agility, flexibility, and security you need to succeed in today's business world.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

VMware

A Simple Guide to Successful Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This white paper discusses the importance of penetration testing and presents six steps to doing it effectively.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Core Security Technologies

Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
WEBCAST: This webcast discusses specific ways to address zero-day risks and fight exploit attempts.
Posted: 17 Aug 2015 | Premiered: Jul 31, 2015


Is Network Your Security More Like Eggshells or Diamonds?
sponsored by VMware
RESOURCE: This handy resource compares two popular network security approaches and outlines why focusing on perimeter defenses alone will end in a data breach. View now to learn how to protect your network from the perimeter to the data center.
Posted: 14 Aug 2015 | Published: 29 Jul 2015

VMware

Adapt Your Security to Today's Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper discusses why changes in security strategies are necessary and how you can make these changes.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian

A Zero-Day Agnostic Approach to Defending Against Advanced Threats
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript discusses how information security products have changed and why these changes are essential for tackling advanced threats.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian

Achieving Data-Drive Security Intelligence
sponsored by Splunk
WHITE PAPER: This white paper discusses how you can obtain the kind of data-driven security that's needed for combatting today's advanced threats.
Posted: 14 Aug 2015 | Published: 31 Dec 2014

Splunk
1 - 25 of 1284 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement