IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
1 - 25 of 1414 Matches Previous Page  |  Next Page
Addressing Cyber Security Concerns of Data Center Remote Monitoring Platforms
sponsored by APC by Schneider Electric
WHITE PAPER: Digital remote monitoring has evolved to become cloud-based and involve multiple channels, but this opens you up to attack. Access this white paper for an overview of secure development lifecycle (SDL) and 8 key practices that will enable you to design and build your data center remote monitoring platform without putting your security at risk.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

APC by Schneider Electric

8 Ways to Protect Your Network Against Ransomware
sponsored by Dell SonicWALL
WHITE PAPER: This e-book provides eight ways you can protect your network against ransomware attacks and avoid giving your money to cybercriminals.
Posted: 24 Feb 2017 | Published: 30 Dec 2016

Dell SonicWALL

Optimizing the Software-Defined Wide-Area Network
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper explores the concept of software-defined WAN and how to optimize it. Uncover the answers to essential questions, like: What does the expansion of the initial usage of SDN mean to CIOS? What should they do to make the most of SD-WAN? Plus, learn about 5 key advantages and the main challenges of SD-WAN.
Posted: 22 Feb 2017 | Published: 22 Feb 2017

Riverbed Technology, Inc.

How to Cut Your Troubleshooting Time in Half
sponsored by ExtraHop
VIDEO: Join experts Nick Brackney and Jim Sullivan as they discuss the intricacies of how to approach modern IT Ops and why traditional network monitoring fails in the face of today's troubleshooting needs.
Posted: 21 Feb 2017 | Premiered: 14 Feb 2017

ExtraHop

11 ECM Vendors Researched, Analyzed, and Scored
sponsored by Box
WHITE PAPER: Before you pinpoint the ECM vendor that's best for you now and into the future, it's important to explore how ECM vendors have been trending over the last couple years. In this Forrester report from 2 years ago, 11 ECM software vendors were researched, analyzed, and scored. Discover who was leading the pack, and how the ECM landscape has evolved.
Posted: 21 Feb 2017 | Published: 28 Aug 2015

Box

Empowering the Mobile Workforce with MDM and EMM
sponsored by Snow Software
WHITE PAPER: This white paper examines a platform that provides both mobile device management (MDM) and enterprise mobile management (EMM) capabilities. Discover how to take your MDM and mobile app management to the next level by unlocking security features that allay IT concerns, creating transparency and insight into device and app use, and more.
Posted: 21 Feb 2017 | Published: 31 May 2016

Snow Software

Supercharge Your Networking Career
sponsored by VMware
WHITE PAPER: IT teams that rely on hardware-centric networks are struggling to keep up with the demands of today's business users. In this infographic, learn how you can supercharge your network and your career with network virtualization.
Posted: 21 Feb 2017 | Published: 29 Apr 2016

VMware

How To Eliminate Downtime With NGFWs
sponsored by Forcepoint
WHITE PAPER: Uninterrupted access to Internet-based apps, data, and servers are crucial to a successful business. But how do you eliminate downtime that can get in the way? In this white paper, learn how NDFW security technology can maintain network defenses and make downtime a distant memory.
Posted: 17 Feb 2017 | Published: 04 Mar 2016

Forcepoint

Key Features To Consider When Deciding On A NGFW Technology
sponsored by Forcepoint
WEBCAST: There are 3 main drivers to your NGFW technology deployment success: integration with security workflow, total cost of ownership, and security effectiveness. But which one will work best for your distributed enterprises? In this webcast, learn key features to consider when selecting your technology, and discover insights on the testing process.
Posted: 17 Feb 2017 | Premiered: Feb 17, 2017, 01:01 EST (06:01 GMT)

Forcepoint

How To Decrease Network Complexity & Help Your IT Staff
sponsored by Forcepoint
WHITE PAPER: According to Gartner, 80% of total IT costs occur after initial purchase. If you want to keep network security high and costs low, you need the right network management system. Inside, learn how you can decrease network complexity and help your IT staff do their jobs better and faster.
Posted: 17 Feb 2017 | Published: 14 Jan 2016

Forcepoint

Enterprise Mobile Device Management: SJ Case Study
sponsored by Snow Software
CASE STUDY: This case study explores how SJ, a large train operator, implemented a modern mobile device management platform to unlock the control and insight they needed to manage thousands of connected devices. Discover how they unlocked complete transparency and visibility, enabled remote app updates, boosted security, and more.
Posted: 17 Feb 2017 | Published: 31 Dec 2016

Snow Software

How to Manage Mobile Devices, Apps, and Content Simply and Securely
sponsored by IBM
RESOURCE: Discover how IBM MaaS360 empowers users to manage mobile apps for iOS, Android, Windows, and Blackberry devices simply and securely from an intuitive, user-friendly portal. Access this complimentary 30 day trial to leverage a platform that enables you to manage mobile devices, apps, content, and security.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

IBM

The Definitive Guide to Selecting the Right ADC for the Digital Transformation Era
sponsored by Citrix
EBOOK: Explore what considerations should drive app delivery controller (ADC) management to navigate the increasing complexities of planning for change and digital transformation. Discover how to boost your app delivery strategy and network management by harnessing the power of the cloud to adapt to hybrid environments and microservice architectures.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Citrix

EMM with Centralized, Secure Control: Garuda Indonesia Case Study
sponsored by IBM
CASE STUDY: This case study explores how Garuda Indonesia implemented a more comprehensive enterprise mobility management (EMM) strategy. Discover how they streamlined management of mobile devices, managed iPads, apps, and content centrally and securely, leveraged SaaS to reduce costs, and boosted productivity by up to 50%.
Posted: 15 Feb 2017 | Published: 31 Dec 2016

IBM

Cloud-Based Mobile Management: The Fundraising People (TFP) Case Study
sponsored by IBM
CASE STUDY: Explore how The Fundraising People replaced their legacy mobility management with a more comprehensive cloud-based platform that increases employees' access to apps and data without sacrificing security. Discover how they unlocked greater control and visibility of mobile devices, all while increasing staff productivity and enabling faster logins.
Posted: 15 Feb 2017 | Published: 31 Dec 2016

IBM

Multi-DNS Patterns: Deliver Better Performance, Security, and Reliability
sponsored by Dyn
WHITE PAPER: Improve the performance, security and reliability of your DNS infrastructure by adding a supplemental DNS service to your IT environment. Discover 3 approaches to multi-DNS that can help deliver consistent, high-quality user experiences and mitigate outage risks.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

Dyn

How to Eliminate Network Blind Spots in Visibility and Security
sponsored by Ixia
WHITE PAPER: Poor network and application performance monitoring tools and practices can lead to costly and tedious issues down the road. Is there a secret to attaining improved visibility, reliability AND substantial ROI?Zeus Kerravala weighs in.
Posted: 10 Feb 2017 | Published: 10 Feb 2017

Ixia

Ixia and Gigamon Go Head-to-Head in Processing Performance
sponsored by Ixia
WHITE PAPER: In this comparison see Ixia's Net Tool Optimizer (NTO) 5288 go up against Gigamon's GigaVUE-HC2 with One GigaSMART Module, comparing: processing performance, deduplication performance, packet loss, and security considerations.
Posted: 10 Feb 2017 | Published: 31 Jan 2016

Ixia

IDC Analyst Connection: Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: Networks have changed drastically since the first firewall was introduced, and as a result, networking pros can no longer assume traffic within the perimeter can be trusted. In this Q&A with IDC's Chris Christiansen, learn how internal segmentation firewalls can help you secure your expanding network.
Posted: 10 Feb 2017 | Published: 31 Jul 2015

Fortinet, Inc.

WP IFSW Global Network Survey results
sponsored by Fortinet, Inc.
WHITE PAPER: Fortinet conducted a survey of IT decision-makers from 10 countries around the world. They were asked specifically about the security challenges and decisions that they have to make and their areas of highest concern. Learn what security trends most concern top IT decision-makers
Posted: 09 Feb 2017 | Published: 22 Aug 2016

Fortinet, Inc.

Evaluating Inline Security Fabric: Key Considerations
sponsored by Ixia
WHITE PAPER: To address the issues with inline security monitoring, many organizations are deploying a resilient security fabric. Learn more about high-performing security fabrics that protect network availability and increase the inspection of traffic entering and leaving your network.
Posted: 09 Feb 2017 | Published: 30 Dec 2016

Ixia

Plan Your Firewall Migration to Increase Security Resilience
sponsored by Ixia
WHITE PAPER: This paper examines best practices for maximizing uptime and achieving high availability during a firewall migration.
Posted: 09 Feb 2017 | Published: 30 Dec 2016

Ixia

5 Ways to Maximize the Value of Security & Monitoring Tools
sponsored by Ixia
WHITE PAPER: ROI is an important factor for evaluating the value of your network security infrastructure. In this white paper, learn how you can start eliminating visibility and security blind spots and extend the life of your monitoring tools.
Posted: 08 Feb 2017 | Published: 30 Dec 2016

Ixia

Fast Breach Mitigation Without Network Disruption
sponsored by Ixia
WHITE PAPER: With network breaches unfolding with growing frequency, your ability to quickly mitigate a crisis begins with knowing where it occurred, and what data was compromised. Discover how to capture the critical data you need to respond more rapidly to emerging situations.
Posted: 08 Feb 2017 | Published: 30 Dec 2016

Ixia

Deploying a Multiā€Gigabit Web Filtering Architecture
sponsored by ContentKeeper
WHITE PAPER: This white paper explores how to redouble web filtering efforts in the face of growing bandwidth and processing requirements. Discover multiple approaches to cultivating a well-managed multi-gigabit architecture, exploring the pros and cons of each, plus uncover tips on how to keep up with one-to-one computing and SSL encrypted sites.
Posted: 08 Feb 2017 | Published: 31 Dec 2016

ContentKeeper
1 - 25 of 1414 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement