IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
1 - 25 of 1533 Matches Previous Page  |  Next Page
Go From Compromise to Containment - Fast
sponsored by Rapid 7
WEBCAST: According to the Verizon Data Breach Investigations Report, stolen credentials are the number one threat vector across all data breaches. Watch this webcast to uncover how you can detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing.
Posted: 20 Nov 2017 | Premiered: Nov 20, 2017

Rapid 7

LiveNX: Your Platform for Cisco SD-WAN Visibility and Assurance
sponsored by LiveAction
RESOURCE: In this resource, learn how to plan, deploy and operate a network strategy that supports and enhances every step of the network lifecycle, increase productivity and accelerate detection, troubleshooting, and resolution when problems do arise.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

LiveAction

Network Switches that Connect Businesses to More Efficiency and Control
sponsored by D-Link
RESOURCE: IT network pros strive to manage an end to end wireless infrastructure and protect sensitive data regularly. In this resource, discover the advantages of D-Link's switching tools to help your organization the basis for secure and reliable business networks.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

D-Link

What IT K-12 Managers Need to Know About IP Surveillance
sponsored by D-Link
WHITE PAPER: In this white paper, learn how the automation and scalability that comes with IP surveillance is expanding its range of video surveillance applications especially for IT K-12 decision makers. Then, uncover the top considerations when building the best IP surveillance solution for your organization.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

D-Link

Case Study: How ATS Automation Improved Network Performance and Management
sponsored by AppNeta
CASE STUDY: In this case study, learn how ATS Automation, a leader in the tool manufacturing industry partnered with AppNeta to improve network performance for end users and increase network-wide visibility to troubleshoot concerns faster.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

AppNeta

How to Secure your Network Smarter and Faster
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this resource, learn about Junos Space Security Director to help manage and automate workflows, allowing network administrators to monitor applications and users and remediate security threats faster across all firewalls.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Juniper Networks, Inc.

Hyland Ensures Growth with High-Performance, Intelligent Network Security
sponsored by Juniper Networks, Inc.
CASE STUDY: In this case study, discover how Hyland, a developer of enterprise content management solutions was empowered to build a stronger network security strategy that allowed employees to collaborate freely with each other, customers and partners with no impediments.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Juniper Networks, Inc.

All Together Now: Securing the Internet of Things
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this white paper, learn how deeper visibility into IoT device's network utilization and behavior can help improve both network management and network security. Then, uncover the tools and techniques IT pros can implement for stronger IoT security.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Juniper Networks, Inc.

IP Surveillance Solutions that Connect Businesses to More Peace of Mind
sponsored by D-Link
WHITE PAPER: In this solution brief, learn how to make the transition to IP surveillance and how network switches ease integration. Then, uncover the benefits of IP surveillance including improved quality and reliability.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

D-Link

10 Reasons Smart Power-Over-Ethernet Switches are the Wise Choice for Upgrading IP Surveillance Networks
sponsored by D-Link
WHITE PAPER: In this white paper, uncover the top 10 reasons to upgrade to Smart (managed) PoE Switches for IP surveillance networks.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

D-Link

Comprehensive Threat Prevention Security for AWS
sponsored by AWS - Check Point
WEBCAST: The average cost of a data breach is $6.53 million. How can you reduce your likelihood of falling victim to costly data breaches? Explore in-depth this webcast to learn about how AWS can help improve your network security by allowing you to define your cloud controls while AWS takes care of the security of your cloud.
Posted: 20 Nov 2017 | Premiered: Nov 20, 2017

AWS - Check Point

Case Study: Buyer's Remorse No More
sponsored by Rapid 7
WHITE PAPER: Explore this case study to discover how a finance company, after being hacked, was able to secure incredibly sensitive client information by implementing a testing framework alongside a vulnerability management platform.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Rapid 7

The Hunt for IoT
sponsored by F5 Networks
WHITE PAPER: 30.6 million IoT brute force attacks were launched from January 1 to June 30 2017. This white paper provides an analysis of data collected pertaining to the rise of thingbots in Europe, specifically focusing on the Mirai and Persirai bots containing destructive malware.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

F5 Networks

Automated, Unified Security for your Entire IT Environment
sponsored by AWS - Fortinet
EBOOK: In this e-book, gain a stronger understanding of how Fortinet Security Fabric can increase your organization's security and network performance across your cloud deployment with Amazon Web Services (AWS).
Posted: 17 Nov 2017 | Published: 17 Nov 2017

AWS - Fortinet

Computer Weekly – 21 November 2017: What can intent-based networking do for you?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, intent-based networking promises to optimise networks through automation and analytics, but can it deliver? Gartner says the CIO role continues to evolve and IT leaders need to champion digital change – we examine the issues. And we find out how security analytics can help deal with cyber threats. Read the issue now.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

ComputerWeekly.com

Amazon Web Services: Automatically Scale Cloud Security
sponsored by AWS - Fortinet
WHITE PAPER: This white paper explores how Fortinet helps deliver seamless integration with Amazon Elastic Compute Cloud and Amazon Virtual Private Cloud to minimize risk and mitigate security treats for workloads running on the cloud. Then, find out how your organization can deploy and automate cloud security with auto scaling.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

AWS - Fortinet

Case Study: Network Performance and Security Efforts Take Off at Pangborn Memorial Airport
sponsored by D-Link
CASE STUDY: This case study explores how Pangborn Memorial Airport leveraged D-Link's 7100 Cloud cameras to upgrade their network infrastructure to accommodate the growth and support of new IP-based technologies to achieve more network speed, security and uptime.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

D-Link

Case Study: Livingston ISD Overhauls Core Network and Supports New 1:1 Learning Initiative with D-Link
sponsored by D-Link
CASE STUDY: This case study explores how Livingston ISD (a school district in southeast Texas) leveraged D-Link's DXS-3600 10GB managed switches to accommodate a new 1:1 initiative and IP-based technologies to achieve more network speed, security and uptime across their campuses.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

D-Link

Bots Mean Business
sponsored by F5 Networks
WHITE PAPER: As bot technology, machine learning, and AI continue to evolve, so will the cyber threats they pose. This paper explores how bot innovation enables cybercrime and how you can optimize business intelligence while protecting your enterprise.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

Essential Guide: Securing hybrid IT infrastructure
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

ComputerWeekly.com

Top Cyber Threats to The Retail Sector
sponsored by Digital Shadows
WHITE PAPER: Given the frequent number of transactions taking place using payment cards, retail companies are frequently the target of financially-motivated threats. Explore this white paper to uncover the top 3 cyber threats to the retail sector to help you monitor and manage digital risks.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

SD-WAN: How it Works
sponsored by Comcast
WEBCAST: In this video, quickly learn about what is driving enterprises to enable an SD-WAN architecture and how SD-WAN has the potential to add business value to your organization.
Posted: 09 Nov 2017 | Premiered: Sep 13, 2017

Comcast

DNS Threats to Network Availability
sponsored by Men and Mice
WHITE PAPER: In this white paper, gain a clear understanding of how DNS redundancy can boost DNS availability to help improve the performance and reliability of your network.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

Men and Mice

Cloud Security in 2 Minutes
sponsored by AWS-Cisco
VIDEO: Instead of adding hardware to their network, many organizations are moving to the public cloud. The problem is that this can increase your attack surface and vulnerability. Take 2 minutes to learn how entity modeling helps monitor threats, data exfiltration, and more in public clouds, private networks, and hybrid environments.
Posted: 08 Nov 2017 | Premiered: 10 Oct 2017

AWS-Cisco

Managing BitLocker in the Enterprise with SecureDoc
sponsored by WinMagic
WHITE PAPER: Microsoft offers built-in encryption software known as BitLocker, and it is designed to protect data. But how do you simplify BitLocker management? Explore this technology brief to discover if the combination of SecureDoc and BitLocker is right for your encryption and data protection needs.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

WinMagic
1 - 25 of 1533 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement