IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
101 - 125 of 1551 Matches Previous Page  |  Next Page
Micro-Segmentation Builds Security Into Your Data Center’s DNA
sponsored by VMware
WHITE PAPER: Micro-segmentation is an adaptive technology that narrows your data center security's focus to overcome threats faster than ever. Access this white paper to learn more about the security and protection micro-segmentation will provide your data center.
Posted: 06 May 2016 | Published: 27 Apr 2016

VMware

Cost of Data Breach – Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: This report examines two factors that affect the financial consequences of a data breach. The first is executive involvement security strategy and response to data breaches. The second is the purchase of cyber insurance to mitigate the cost of a data breach. Access now to learn how to best mitigate cyber breaches and protect reputation.
Posted: 06 May 2016 | Published: 01 May 2015

IBM

Deliver reliable, fast, and secure networks for improved APM
sponsored by Ixia
WHITE PAPER: How can an intelligent visibility framework provide smarter application performance monitoring and enhance security tools? Get an overview of the benefits of these tools and what's needed to create a fast, reliable and secure network for greater customer satisfaction.
Posted: 06 May 2016 | Published: 01 Mar 2016

Ixia

Think Like an Attacker: Six Steps Toward Better Security
sponsored by Intel Security
WHITE PAPER: Discover why piecemeal endpoint defenses are not sufficient to protect against today's threat vectors as we take you inside the mind of an attacker to help you bolster your defenses. Read on to learn six ways to think like a hacker and why new threats require more than strategies and tools to keep the bad guys at bay.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

Understanding Cyberthreat Motivations to Improve Defense
sponsored by Intel Security
WHITE PAPER: Find out why you must add cyber-criminal motivation to your threat taxonomy in order to understand what causes a threat agent to commit harmful acts. Read on to discover in detail the elements of this new parameter and how this crucial understating of the hacker's mind can help protect your entire infrastructure.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

Top Strategies to Automate Across Your Enterprise Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: The cloud is forcing IT decision-makers to re-evaluate how they deploy their networks to ensure the best security and efficiency. Attackers know the cloud is their next big target. Access this white paper to learn how to deal with the threat landscape and drive business forward while reducing operating costs.
Posted: 06 May 2016 | Published: 29 Apr 2016

Juniper Networks, Inc.

DDoS Attack Analysis
sponsored by Thousandeyes
WHITE PAPER: ThousandEyes highlights the impact of an ongoing DDoS attack, provides visibility into the effectiveness of the mitigation and provides insight into the strategies of DDoS mitigation vendors.
Posted: 06 May 2016 | Published: 06 May 2016

Thousandeyes

7 Trends Impacting Enterprise Campus Networks
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover in this exclusive white paper 7 prevalent issues in today's enterprise campus networks, and how to leverage a cloud-enabled network to seamlessly glue your network edge to the cloud and optimize your cloud applications.
Posted: 06 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Outsource IT Services While Maintaining Control and Transparency
sponsored by Juniper Networks, Inc.
EGUIDE: Find advice on how to choose the right service providers – and avoid the worst ones – for IT security and support in this expert e-guide.
Posted: 06 May 2016 | Published: 02 May 2016

Juniper Networks, Inc.

Fighting IP Telephony Fraud
sponsored by Oracle Corporation
CASE STUDY: Review common IP telephony scams and learn how new security measures can help network administrators combat service theft and mitigate risks.
Posted: 05 May 2016 | Published: 05 May 2016

Oracle Corporation

Enhance Productivity with Managed Mobile Office Apps
sponsored by TechData Corporation
WHITE PAPER: In 2017, 90 per cent of enterprises will have two or more mobile operating systems to support. IT teams are under immense pressure to manage these systems and the influx of mobile devices that the age of BYOD has wrought. Access this white paper now to learn how to manage identities, devices, apps, and data from a single solution.
Posted: 05 May 2016 | Published: 31 Dec 2015

TechData Corporation

The Evolution of Wireless Business Continuity
sponsored by Accelerated Concepts
WHITE PAPER: Discover in this white paper how to avoid expensive outages and downtime that drastically impact your reputation by formulating a business continuity plan with first-class connectivity. Learn how to take advantage of the expanding IoT to back up your business-critical data, devices, and more.
Posted: 05 May 2016 | Published: 31 Jan 2016

Accelerated Concepts

The top four cybercrime trends
sponsored by IBM
WHITE PAPER: This report highlights four key cybercrime trends that were observed throughout 2015, including an increase in "onion-layered" security incidents, ransomware attacks and insider threats. Access now to figure out how your organization can easily find the footprints attackers leave behind.
Posted: 05 May 2016 | Published: 31 Dec 2015

IBM

Extend Security and Control from the Data Center Edge to the Core
sponsored by VMware
EBOOK: The average total cost of a data breach for companies increased 23% on a year-over-year basis to a whopping $3.79 million in 2015. Micro-segmentation through network virtualization allows your security team to focus on the problem areas and minimize resource usage. Access this e-book to learn more about this strategy to better secure your data.
Posted: 05 May 2016 | Published: 29 Apr 2016

VMware

Discovering Security Analytics Use Cases
sponsored by Prelert
RESOURCE: In this resource, discover how to tailor your security analytics to detect certain behaviors associated with threats advancing on your organization. Select each threat indicator to examine its particular attack progression stages for data exfiltration activity, compromised endpoints, and more.
Posted: 05 May 2016 | Published: 05 May 2016

Prelert

Enterprise Campus Architectures—Transformed
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover in this resource the benefits of collapsing your entire enterprise network into a single platform—including guarantees of increased agility and improved user satisfaction. Read now to deploy cloud network architecture that accommodates your unending need for more bandwidth.
Posted: 05 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Discover the Best Ways to Manage Shadow IT
sponsored by Juniper Networks, Inc.
WHITE PAPER: Should you eliminate, coexist with, or embrace shadow IT? Access this guide to discover the current trends driving the rise of shadow IT, explore the drawbacks and benefits it offers, and learn how designing and building the right network is essential for your preferred shadow IT strategy.
Posted: 05 May 2016 | Published: 05 May 2016

Juniper Networks, Inc.

What to Look for in Secure Sockets Layer
sponsored by SearchSecurity.com
EBOOK: This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
Posted: 04 May 2016 | Published: 04 May 2016

SearchSecurity.com

Build a wiser WAN
sponsored by Verizon
WHITE PAPER: The need for efficient and reliable cloud and mobile technologies is creating a demand for better application performance. Read on to learn how software-defined wide area network (SD-WAN) overcomes the obstacles and demands of mobile technologies, and how it is just the first step in aligning your IT with your business.
Posted: 04 May 2016 | Published: 30 Sep 2015

Verizon

ZK Research Report on Network Management Issues
sponsored by Ixia
WHITE PAPER: ZK Research (a Zeus Kerravala company) conducted a network management survey and inside reviews the results, including the need for application strengthening and the market forces driving this need.
Posted: 04 May 2016 | Published: 01 Apr 2016

Ixia

Network Testing Types to Ensure Top Performance, ROI and Security
sponsored by Ixia
WHITE PAPER: Testing is a crucial part of the lifecycle of networks, products, and services across technology as change becomes more rapid and complexity increases. Testing not only helps project meet or exceed expectations, but also improves ROI and security. Learn about the 5 types of testing and where to focus against each area for maximum performance.
Posted: 04 May 2016 | Published: 01 Mar 2016

Ixia

Ensuring Document Security Across Any Device
sponsored by BlackBerry
WHITE PAPER: Mobile devices have become more common in the workplace and produced a goal of ensuring that sensitive documents can be shared and accessed securely from any device. Access this white paper to learn about a solution that circumvents device management and instead allows for management of the documents themselves.
Posted: 04 May 2016 | Published: 05 Apr 2016

BlackBerry

Top 3 Reasons Your Enterprise Network Matters More in the Cloud Era
sponsored by Juniper Networks, Inc.
WHITE PAPER: Explore the top 3 IT trends that will impact your cloud strategy, and learn how to build a network that's 100% cloud-ready. Read on to prepare your network for high bandwidth demands, high SLAs, increased scalability and security requirements, and more.
Posted: 04 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Top 3 Ways to Modernize Your Enterprise Campus Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Are you prepared to secure campus and branch networks in your cloud-enabled enterprise? Discover in this expert white paper how to modernize your enterprise campus network by utilizing 3 proven, cloud-driven strategies. Read on for guidance on simplifying your network, adopting an open framework, and more.
Posted: 04 May 2016 | Published: 04 May 2016

Juniper Networks, Inc.

Security From the Inside Out
sponsored by Fortinet, Inc.
EBOOK: This e-book discusses the failings of traditional perimeter-based security measures, and shows how specialized internal segmentation firewalls can help your network respond to modern threats.
Posted: 03 May 2016 | Published: 03 May 2016

Fortinet, Inc.
101 - 125 of 1551 Matches Previous Page    3 4 5 6 7 8    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement