IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network Security Reports
101 - 125 of 1249 Matches Previous Page  |  Next Page
Machine Learning Anomaly Detection for IT Ops
sponsored by Prelert
VIDEO: Watch this brief video to discover how you can monitor all your data and discover why a problem occurs before it can harm your network.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

Security Analytics:Anomaly Detection for IT Security
sponsored by Prelert
VIDEO: Watch this video to learn how anomaly detection systems use advanced analytics to uncover even the subtlest cybercriminals.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

Overcoming Evolving Cyberthreats and Next-Gen Firewalls
sponsored by Juniper Networks, Inc.
WEBCAST: In this webcast, learn how to deal with new threats as they evolve and design dynamic security into cloud environments.
Posted: 24 Mar 2015 | Premiered: Dec 4, 2014

Juniper Networks, Inc.

Everbridge Case Study: Optimizing Network Security Management
sponsored by F5 Networks
WHITE PAPER: Read more to learn how you can boost your network security and efficiency while also cutting costs.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

F5 Networks

Deploying a Next-Generation IPS Infrastructure
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper explains how deploying an IPS behind and application delivery controller (ADC) can optimize IPS performance, simplify IPS management, increase business agility, and improve overall network security. Read more to learn how you can boost your network security and efficiency with one simple solution.
Posted: 23 Mar 2015 | Published: 19 Dec 2014

F5 Networks

Top 5 IT security trends to watch in 2015
sponsored by Dimension Data
WHITE PAPER: Download this brief white paper to discover the five major changes to expect in 2015 and what these changes could mean for you.
Posted: 23 Mar 2015 | Published: 30 Nov 2014

Dimension Data

7 Ways to Find Rogue Users
sponsored by Prelert
WHITE PAPER: This article gives you seven foolproof steps towards setting up insider security with less disruption and better accuracy.
Posted: 23 Mar 2015 | Published: 03 Apr 2014

Prelert

Case Study: Catching Virtual Thieves
sponsored by Prelert
WHITE PAPER: In this brief case study, discover a crime on intellectual property that came very close to slipping through the cracks.
Posted: 23 Mar 2015 | Published: 16 Jan 2015

Prelert

Mobile Network Operator Enables Secure Access for Consultants
sponsored by Dell, Inc.
CASE STUDY: Inside this brief case study, find out how a mobile network operator adopted a solution that manages, secures, and provisions virtual desktop environments and also broker's connections. Discover how this enabled employees to use their own laptops without exposing the company to risks like viruses and the copying of proprietary information.
Posted: 23 Mar 2015 | Published: 31 Dec 2014

Dell, Inc.

Find the Anomalies in Your Unstructured Data
sponsored by Prelert
WHITE PAPER: This article introduces an anomaly detection program aimed to aid with the analysis of unstructured data.
Posted: 23 Mar 2015 | Published: 27 Feb 2015

Prelert

The Secret To Reducing False Alerts
sponsored by Prelert
WHITE PAPER: Take a look at this brief article to discover how anomaly detection can lower your rate of false positives.
Posted: 23 Mar 2015 | Published: 22 May 2014

Prelert

Deployment best practices and guidelines to deliver any app to mobile users
sponsored by Citrix
WHITE PAPER: This white paper provides 6 different ways to provide enterprise application access on mobile devices. Read more to learn how your company can empower employees and reap the mobility benefits.
Posted: 20 Mar 2015 | Published: 30 May 2014

Citrix

Encrypted Traffic Management for Dummies
sponsored by Blue Coat Systems
EBOOK: This exclusive e-book will teach you everything you need to know about the new world of encrypted traffic management. Don't let your enterprise security fall behind the SSL-using cybercriminals. Read more for a beginner's guide to protecting your network in today's world of cyber-threats.
Posted: 20 Mar 2015 | Published: 06 Mar 2015

Blue Coat Systems

Buyer'€™s Criteria for Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper gives you a detailed understanding of what controls need to be in place to stop the strongest attacks.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

How to Future Proof Application Delivery
sponsored by F5 Networks
WHITE PAPER: To learn more about the 4 key categories to consider when choosing an ADC platform that will stand the test of time, access this exhaustive white paper. Read now to learn how you can use this information to choose the ADC that's right for your organization.
Posted: 18 Mar 2015 | Published: 31 Dec 2014

F5 Networks

A Guide to a Multifaceted Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: This white paper can help you develop an innovative approach for catching even the most advanced malware.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Dell SecureWorks

Unified Communications Security Measures: Ensuring Peace of Mind
sponsored by ThinkingPhones
WHITE PAPER: This white paper discusses the essential security features all unified communications should have.
Posted: 17 Mar 2015 | Published: 01 Jan 2015

ThinkingPhones

Are you regularly monitoring log data?
sponsored by Alert Logic
WHITE PAPER: In this quick infographic, you will learn the 13 collections and alerts that help support the infrastructure security of an automated log management system.
Posted: 17 Mar 2015 | Published: 04 Feb 2015

Alert Logic

Selecting a Next-Generation Firewall: Top 10 Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to uncover how a next-gen firewall closes network gaps and explore the top 10 considerations for platform evaluation.
Posted: 17 Mar 2015 | Published: 12 Feb 2014

Cisco Systems, Inc.

ROI Analysis: How to reduce security risks and labor related costs
sponsored by Alert Logic
WHITE PAPER: This economic impact report analyzes one effective risk management solution to give you an accurate assessment of that product's ROI.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

Alert Logic

Log Management Fundamentals
sponsored by Alert Logic
WHITE PAPER: This brief guide gives you a quick and clear outline of the fundamentals of log management and the log collection sources you need to have.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Alert Logic

Going Wireless—The Key to Enhancing Patient Care
sponsored by Hewlett-Packard Limited
CASE STUDY: Access this case study to learn how one healthcare facility implemented a wireless network to help improve accessibility for electronic patient records.
Posted: 13 Mar 2015 | Published: 01 Dec 2014

Hewlett-Packard Limited

Better Manage Your BYOD Program
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper provides indispensible advice on how to select device specifications for BYOD, how to streamline management, and more.
Posted: 11 Mar 2015 | Published: 31 Oct 2014

Dell, Inc. and Intel®

Enhancing employee flexibility while reducing IT complexity
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Read this exclusive case study to find out what solutions Dell took to embrace BYOD, streamline IT, and manage their security at the same time.
Posted: 11 Mar 2015 | Published: 31 Aug 2014

Dell, Inc. and Intel®

What to look for in secure file transfer
sponsored by SearchSecurity.com
EBOOK: This guide provides essential knowledge for enterprise InfoSec pros acquiring tools and products to transfer files efficiently and securely.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

SearchSecurity.com
101 - 125 of 1249 Matches Previous Page    3 4 5 6 7 8    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement