IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
101 - 125 of 1406 Matches Previous Page  |  Next Page
Webinar - Network security without compromise
sponsored by Aruba Networks
WEBCAST: In this webcast, you will learn how to enhance network security, enforcement and a better user experience.
Posted: 23 Mar 2016 | Premiered: Feb 1, 2016

Aruba Networks

Extend Security and Control from the Data Center Edge to the Core
sponsored by VMware, Inc.
EBOOK: This eBook presents solutions to three of today's common network security issues and how software-defined data centers are here to provide the tools that you will need moving forward.
Posted: 22 Mar 2016 | Published: 16 Mar 2016

VMware, Inc.

Architecting for Security Resilience
sponsored by Ixia
WHITE PAPER: Network architects understand that resilience starts at the foundation. Review the several strategies to create an inline security architecture and find out which is best for your organizations.
Posted: 22 Mar 2016 | Published: 25 Nov 2015

Ixia

100% Network Visibility is Easier than You Think
sponsored by Ixia
RESOURCE: This brief infographic presents the capabilities that you need to look for in NPBs and how to achieve 100% visibility into your network traffic. Uncover the negative effects of packet loss and how to avoid them.
Posted: 22 Mar 2016 | Published: 27 Jan 2016

Ixia

Refresh Cycle Still Relevant as the IT Landscape Evolves
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper describes ways to simplify and secure the hardware and software ecosystem for mobile computing in the enterprise. Uncover ways to support employee choice that result in optimized performance and cost.
Posted: 21 Mar 2016 | Published: 21 Mar 2016

Dell, Inc. and Intel®

CISO's Guide to the Top 7 IoT Risks
sponsored by ForeScout Technologies, Inc.
EGUIDE: As more devices connect to the internet, hackers raise their chances of successfully breaking into an organization. This e-guide gives CISOs defensive strategies to mitigate IoT driven attacks.
Posted: 21 Mar 2016 | Published: 09 Mar 2016

ForeScout Technologies, Inc.

Overcoming Virtual Blind Spots
sponsored by Ixia
WHITE PAPER: Visibility into your network is the only chance you have at mitigating advanced and hidden threats.To overcome east-west traffic blind spots, network security strategies must include virtual tapping into the production virtual network.
Posted: 21 Mar 2016 | Published: 24 Feb 2016

Ixia

How to Initiate Managed Network Security Services
sponsored by Level 3 Communications, Inc.
EGUIDE: In this e-guide, networking expert David Jacobs outlines how to initiate and maintain a successful managed network security relationship between provider and customer.
Posted: 21 Mar 2016 | Published: 18 Mar 2016

Level 3 Communications, Inc.

Five Key Indicators that You Need to Adopt EMM Now
sponsored by VMware, Inc.
WHITE PAPER: How do you know your organization is poised to make the move to EMM? Access this white paper to determine if now is the time to adopt EMM. Especially if your organization experiences considerable device expansion, an increased need for security and compliance, and more.
Posted: 21 Mar 2016 | Published: 21 Mar 2016

VMware, Inc.

The New Network Security Front Line
sponsored by Ixia
WEBCAST: In this brief video, learn how to decrease your network's attack surface to minimize the number of threats that can potentially breach your defenses.
Posted: 18 Mar 2016 | Premiered: Jan 6, 2016

Ixia

Has the Time for Wireless Enterprise Networks Arrived?
sponsored by Rogers Communications, Inc.
EGUIDE: The demands for anywhere-access and the rollout of higher-speed Wi-Fi standards have challenged enterprises to explore the feasibility of transitioning from a wired infrastructure to an all-wireless internal network. Discover the benefits of 802.11n and 802.11ac, and get advice on WLAN planning and fortifying the wired infrastructure.
Posted: 18 Mar 2016 | Published: 15 Mar 2016

Rogers Communications, Inc.

The Secure Mobile Enterprise: Enabling Mobility while Controlling Risk
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Building a secure mobile enterprise requires a broad, scalable and integrated approach that manages and secures every aspect of mobility usage. To learn more about four essential components of such an enterprise and how to bring them to yours, access this white paper.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

Dell, Inc. and Intel®

Forget Network Defense - Focus on Offense
sponsored by Ixia
WHITE PAPER: This white paper explains why your network security strategy needs to include testing and training to make sure a product or service is protected before launch. Read on to learn more about an offensive security strategy and what it needs to contain.
Posted: 18 Mar 2016 | Published: 02 Mar 2016

Ixia

The 2016 WLAN Buyer's Guide: Time for Wi-Fi to Delivery More Than Connectivity
sponsored by Aerohive Networks
WHITE PAPER: This guide will arm you with the knowledge and skills required to navigate through marketing hype and determine the appropriate WLAN solution for your organization through 2016 and beyond.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

Aerohive Networks

Internet Performance for Dummies
sponsored by Dyn
EBOOK: This handy e-book provides an overview of Internet performance and what you need to do to ensure your public websites and apps always perform at the level your global customers and your business require.
Posted: 16 Mar 2016 | Published: 31 Dec 2015

Dyn

Solving the Top 11 API Threats
sponsored by Axway
WHITE PAPER: This white paper explores how to learn from failure, improve pattern recognition of security quality and detect possible security vulnerabilities.
Posted: 16 Mar 2016 | Published: 01 Feb 2016

Axway

API Security Checklist
sponsored by Axway
WHITE PAPER: This infographic shares with you 11 ways to guard your enterprise entry points. Look it over and make the changes necessary to ensure a more secure API deployment for your business.
Posted: 16 Mar 2016 | Published: 31 Dec 2015

Axway

App and Threat Intelligence Defense Strategy Revealed
sponsored by Ixia
WHITE PAPER: In this white paper, delve deeper into app and threat intelligence defense strategies to mitigate hacker attempts to break through your vulnerabilities.
Posted: 15 Mar 2016 | Published: 25 Nov 2015

Ixia

Report: Modern Threat Intelligence
sponsored by IBM
WHITE PAPER: The complexities of doing business at scale, both strategic and technical, create barriers in preventing breaches. Uncover ways to focus on user education and systematic protocols for operating a strong risk assessment program, allowing you to overcome these barriers.
Posted: 15 Mar 2016 | Published: 29 Feb 2016

IBM

Network-based Security: Global Visibility is the Difference
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Point security solutions aren't enough to keep up with increasingly diverse and sophisticated cyberthreats. Access this brief resource to learn how a network-based security strategy can detect threats and stop them before they affect your business.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Own Your Defense: Network-Based Security
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Many of the same things that drive business forward today are often the primary points of entry or vectors of attack that can damage your organization. Every new connection among your systems, employees, partners and customers is a potential point of vulnerability. Learn how to keep your business safe as threats grow.
Posted: 15 Mar 2016 | Published: 01 Mar 2016

Level 3 Communications, Inc.

Attack Resiliency Challenges Industry Collaboration Ability
sponsored by OpenDNS
WHITE PAPER: Attackers are reaping millions in profit, and defenders are struggling to detect and combat cybersecurity threats. This infographic lays out the ways that next-generation attacks on the network are challenging today's security teams.
Posted: 14 Mar 2016 | Published: 31 Dec 2015

OpenDNS

Does SDN Negate ADCs? Not if Innovators in Virtualization Have Their Way
sponsored by Citrix
WHITE PAPER: This e-guide reveals the advent of virtual application delivery controllers (ADCs) in response to the growth of virtualized systems. Access now to learn about innovative features that enable virtual ADCs on a software-defined (SDN) network.
Posted: 23 Mar 2016 | Published: 18 Mar 2016

Citrix

Security trends in the manufacturing industry
sponsored by IBM
WHITE PAPER: This white paper shows you statistics about cyberattack in the manufacturing industry and how they resulted. Learn some manufacturing best practices and securements to better protect any exploitable weaknesses in your organization's infrastructure.
Posted: 16 Mar 2016 | Published: 29 Feb 2016

IBM

Security trends in the retail industry
sponsored by IBM
WHITE PAPER: In this white paper, you will learn about different methods hackers use to steal customer data as well as statistics showing what time of year attacks are most prevalent. Learn how to defend yourself against hackers and how to respond if a breach does take place in your network.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

IBM
101 - 125 of 1406 Matches Previous Page    3 4 5 6 7 8    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement