IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
1 - 25 of 1375 Matches Previous Page  |  Next Page
The 2017 State of the Firewall
sponsored by FireMon
WHITE PAPER: This state of the firewall report is based on 437 survey responses collected between November 16, 2016 and December 6, 2016. Access now to learn what you need to know about the state of the firewall in 2017.
Posted: 28 Apr 2017 | Published: 31 Jan 2017

FireMon

Demystifying The Threat Landscape: 10 Ways Network Security Pros Can Step Up Game
sponsored by F5 Networks
WHITE PAPER: In this eBook, you'll learn more about the changing network security landscape, where your business is most vulnerable today, and 10 areas you can step up your security game.
Posted: 24 Apr 2017 | Published: 30 Dec 2016

F5 Networks

DDoS Recommended Practices
sponsored by F5 Networks
WHITE PAPER: In this white paper, learn recommended network and application practices for successful DDoS attack protection.
Posted: 24 Apr 2017 | Published: 30 Dec 2016

F5 Networks

Focus: Network security
sponsored by ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

ComputerWeekly.com

The Mobile Enterprise: 2017 Unified Communications Report
sponsored by Avaya
RESEARCH CONTENT: To assess the impact of increasing mobility and BYOD initiatives, Canam Research conducted a survey to gauge the current behaviors and opinions surrounding unified communications (UC). Uncover the survey's key findings to learn how to approach mobility as a mission-critical business enabler.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

Avaya

Debunking the Top Four Myths About DDOS Attacks
sponsored by F5 Networks
WHITE PAPER: If you think you're ready for a DDoS attack—or that you don't need to worry about one—make sure you're not buying into some of these popular myths.
Posted: 21 Apr 2017 | Published: 30 Dec 2016

F5 Networks

Key Considerations in Deploying an SSL Solution
sponsored by F5 Networks
WHITE PAPER: In this white paper, learn what you need to know about Secure Sockets Layer (SSL) and how to construct your security strategy.
Posted: 21 Apr 2017 | Published: 30 Dec 2016

F5 Networks

Stairway to Cloud Networking Nirvana
sponsored by AWS – Riverbed
EBOOK: Migrating to the AWS Cloud enables organizations to realize greater business agility and lower operational expenditures. However, using legacy network management solutions can leave you with poor agility. Learn how Riverbed and AWS can fundamentally change the way you manage networks and get the most out of your AWS environment.
Posted: 18 Apr 2017 | Published: 30 Dec 2016

AWS – Riverbed

Intelligent Security Management Ends Costly Network Breaches
sponsored by FireMon
WHITE PAPER: In this white paper, learn more about the challenges network breaches present and what technology can provide you with the functionality to prevent them.
Posted: 14 Apr 2017 | Published: 30 Dec 2016

FireMon

POL Makes for a More Advanced Enterprise Network
sponsored by Nokia
WHITE PAPER: This paper outlines the key elements of an enterprise passive optical LAN and explains why it is a great enterprise network option for tomorrow's digital enterprise.
Posted: 14 Apr 2017 | Published: 30 Dec 2016

Nokia

Passive Optical LAN vs. Copper-based Ethernet LAN
sponsored by Nokia
WHITE PAPER: This paper presents the value of an enterprise passive optical LAN based on a Bell Labs economic analysis, and compares the benefits of an optical network compared to traditional copper-based Ethernet architectures.
Posted: 14 Apr 2017 | Published: 30 Dec 2016

Nokia

SD-WAN: The Pathway to a Digitally Transformed Branch
sponsored by Windstream Communications
WHITE PAPER: This IDC white paper examines how digital transformation has necessitated a rethinking of WAN connectivity for distributed enterprises.
Posted: 14 Apr 2017 | Published: 28 Feb 2017

Windstream Communications

Ransomware Detection and Prevention Tools You Need Now
sponsored by SearchSecurity.com
EBOOK: Fighting today's malware threats requires a range of ransomware prevention tools. Learn how to tweak the tools you have and identify what new tools you need.
Posted: 13 Apr 2017 | Published: 05 Mar 2017

SearchSecurity.com

Passive Optical LAN: What you're missing out on
sponsored by Nokia
WHITE PAPER: In this resource, learn why many companies are letting their copper-based LANs corrode and upgrading to fiber-based LANs.
Posted: 13 Apr 2017 | Published: 31 Mar 2016

Nokia

Automation Isn't One-Size-Fits-All
sponsored by FireMon
WHITE PAPER: In this white paper, learn how intelligent policy automation can take the pressure off your firewall team by telling you which access to approve and which to deny, increasing speed and security of change management workflows.
Posted: 13 Apr 2017 | Published: 30 Dec 2016

FireMon

Enhance Your Business Performance with Passive Optical LAN
sponsored by Nokia
VIDEO: Many companies are ditching their copper-based LAN for a passive optical LAN (POL) to meet today's networking requirements. In this short video, learn how POL outperforms archaic LAN tech.
Posted: 12 Apr 2017 | Premiered: 07 Dec 2016

Nokia

Prepping for the Oncoming Wave of SD-WANs
sponsored by Windstream Communications
WHITE PAPER: In this TechTarget white paper, learn what the experts are saying about the near future for SD-WANS.
Posted: 12 Apr 2017 | Published: 31 Jan 2017

Windstream Communications

Live Webinar: Simplify Networking with Riverbed SD-WAN & Amazon Web Services
sponsored by AWS – Riverbed
WEBCAST: It's simple enough to set up your cloud-based resources with AWS, but are you sure that you have the security, high-capacity, and high-performance connectivity you need between AWS cloud instances? Register now for this upcoming webinar to learn about a new approach to cloud networking.
Posted: 12 Apr 2017 | Premieres: May 16, 2017

AWS – Riverbed

Array Networks Secure Access Gateway Datasheet (SSL VPN)
sponsored by Array Networks
RESOURCE: In this resource, learn about Array Network's AG Series secure access gateways and see how they match up against the competition.
Posted: 12 Apr 2017 | Published: 31 Mar 2017

Array Networks

Meeting the Network Requirements of Intelligent Transportation Systems
sponsored by TechData - Digi
WHITE PAPER: In this white paper, learn how to choose a router and vendor that can provide your organization with Global 3G/4G LTE options, centralized mass configuration, remote troubleshooting and more.
Posted: 10 Apr 2017 | Published: 29 Jan 2016

TechData - Digi

How to Find the Best DDoS Attack Prevention and Detection Tools
sponsored by SearchSecurity.com
EBOOK: In this handbook, one expert reveals how to select tools that will best strengthen your defense against DDoS attacks. Uncover 4 key questions to ask as you begin your DDoS defense strategy.
Posted: 10 Apr 2017 | Published: 05 Apr 2017

SearchSecurity.com

What Changing Mobile Communications Mean for Your Business
sponsored by Mitel Networks Limited
WHITE PAPER: In this TechTarget white paper, learn how to prepare your business for mobile communications with a mobile-centric strategy that encompasses collaboration, customer experience and future technology like IoT and machine-to-machine communications.
Posted: 10 Apr 2017 | Published: 30 Dec 2016

Mitel Networks Limited

Webcast Transcript: Intelligent Threat Response and Risk Reduction for Today's Mobile Workplace
sponsored by Hewlett Packard Enterprise
TRANSCRIPT: In this webcast transcript, security veteran and writer of Hacking For Dummies, Kevin Beaver, along with experts from Aruba and Intel, discusses the technical and operational security concerns of modern networks.
Posted: 10 Apr 2017 | Published: 01 Mar 2017

Hewlett Packard Enterprise

Creating Your Connected Digital Ecosystem with Better Communication Infrastructure
sponsored by TechData - Digi
RESOURCE: This concise resource highlights communication infrastructure technology designed to help you expand into areas previously too difficult to access, making your systems more productive, more responsive and more secure.
Posted: 10 Apr 2017 | Published: 30 Dec 2016

TechData - Digi

Network Security Trends - Understanding the State of Network Security Today
sponsored by Gigamon
RESEARCH CONTENT: Read this ESG research paper and learn how network security infrastructure, practice, and performance has changed during 2016
Posted: 07 Apr 2017 | Published: 31 Jan 2017

Gigamon
1 - 25 of 1375 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement