IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
101 - 125 of 1503 Matches Previous Page  |  Next Page
Cloud Fax Can Shift your Business into Overdrive
sponsored by J2 Cloud Services
WHITE PAPER: Empower your employees to send and receive faxes by email, anywhere, anytime. Read this white paper to discover how to save your company money by outsourcing your business faxing to the cloud.
Posted: 11 Sep 2017 | Published: 14 Aug 2017

J2 Cloud Services

Why Traditional Fax Technology is Bad for Business
sponsored by J2 Cloud Services
WHITE PAPER: In this white paper, learn how cloud faxing is a safe, secure, and simple data transmission process that requires no expensive hardware or software updates.
Posted: 11 Sep 2017 | Published: 08 Sep 2017

J2 Cloud Services

The 90s Called... They want their Fax Server Back
sponsored by J2 Cloud Services
WHITE PAPER: Are your fax server costs becoming too difficult to maintain? Read this white paper to discover how to save your company time and money by implementing a cloud faxing platform.
Posted: 11 Sep 2017 | Published: 04 Apr 2017

J2 Cloud Services

The Total Economic Impact of the Advanced Collaboration with Mezzanine
sponsored by AVI-SPL
RESEARCH CONTENT: This report evaluates the potential financial impact of advanced collaboration with Mezzanine.
Posted: 11 Sep 2017 | Published: 28 Feb 2017

AVI-SPL

Zurich Insurance Group Case Study
sponsored by AVI-SPL
CASE STUDY: This case study explores how Zurich Insurance Group improved their work place to encourage a collaborative, creative space for employees to engage with.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

AVI-SPL

Budgets and Outlook: Top Vendor Providers for Cloud Information Security
sponsored by Alert Logic
RESEARCH CONTENT: This 451 Research report focuses on enterprise information security providers and top considerations among 500 leading organizations.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Alert Logic

Security for your Cloud-based Web Applications
sponsored by Alert Logic
WHITE PAPER: This Aberdeen Research paper explores the complexity and change in security of cloud-based Web applications and how a "stacked" security approach can prevent DDoS attacks.
Posted: 11 Sep 2017 | Published: 30 Apr 2017

Alert Logic

Case Study: How Six Flags Overcame the Challenges of Insufficient Bandwidth
sponsored by Akamai Technologies
CASE STUDY: In this case study, find out how Six Flags used a Content Delivery Network (CDN) to overcome the challenges of a wide area network to increase app downloads and customer satisfaction.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

Akamai Technologies

Solving API Performance, Reliability, and Security Challenges
sponsored by Akamai Technologies
WHITE PAPER: In this white paper, find out the top questions you should be asking when you review existing and future APIs.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Akamai Technologies

The New Economics of Cloud Security
sponsored by Alert Logic
WHITE PAPER: In this white paper, learn the 4 principles of a fully managed Security-as-a-Service (SECaaS) to help protect cloud applications without breaking the bank or compromising customer satisfaction.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

Alert Logic

IT Security Trends to Know
sponsored by Cisco Umbrella
EGUIDE: The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.
Posted: 06 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella

Anatomy of a Cyberattack
sponsored by Infocyte
WHITE PAPER: According to Ponemon, the cost of a data breach is significantly less if you contain it within 30 days. Check out this white paper to uncover the anatomy of cyberattacks to see where different "hunt tools" can be used for your protection to detect data breaches early.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Infocyte

Web Security: Now What?
sponsored by SearchSecurity.com
EZINE: In this handbook, experts dive into the ongoing issues related to TLS security and HTTPS inspection. Uncover more about the journey of computer worms and how they play a role in advanced persistent threats.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

SearchSecurity.com

Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway
sponsored by Cisco Umbrella
EGUIDE: Cisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic.
Posted: 01 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella

VoIP Adoption Leads to Free PCI Upgrades for Major Quick Service Restaurant
sponsored by Hughes Network Systems
WHITE PAPER: The case study uncovers how VoIP adoption and network service consolidation helped a popular restaurant chain address growing cybersecurity challenges and increase their bandwidth for the best network connection.
Posted: 01 Sep 2017 | Published: 30 Apr 2017

Hughes Network Systems

3 Keys to Unlocking the Bank of the Future
sponsored by Hughes Network Systems
EGUIDE: Discover the tools to meet digitally-savvy customers' expectations for reliable network connections and security.
Posted: 30 Aug 2017 | Published: 30 Apr 2017

Hughes Network Systems

What is a Network Packet Broker?
sponsored by Ixia
EGUIDE: Learn how to improve your ROI with specialized network security and monitoring tools with the help of Network Packet Broker's (NPBs).
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Ixia

Interroll Deploys a Broadband WAN with Unity EdgeConnect
sponsored by Silver Peak
WEBCAST: Learn how Interroll updated their WAN architecture with EdgeConnect to improve application performance, and uncover the top functional features SD-WAN creates for your company.
Posted: 30 Aug 2017 | Premiered: Aug 30, 2017

Silver Peak

Provide Quality of Service for UC Platforms
sponsored by Nectar Corp
WEBCAST: Watch this brief video to learn how to deliver quality of service (QoS) and positive user experiences for the key UC apps and devices that power your organization's collaboration.
Posted: 29 Aug 2017 | Premiered: Aug 29, 2017

Nectar Corp

How to Find the Best DDoS Attack Prevention and Detection Tools
sponsored by SearchSecurity.com
EBOOK: Explore this expert handbook on how to evaluate DDoS prevention tools and services to identify the best ones for you.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

SearchSecurity.com

2017 Network Security Report
sponsored by Ixia
WHITE PAPER: Read this network security report to gain some insight into how the landscape has changed over the past year, and learn some tips as to how you can better secure your network.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Ixia

Digital Transformation Obstacles and How to Overcome Them
sponsored by Verizon
RESEARCH CONTENT: This IDC white paper reveals networking obstacles to achieving digital success. Access the survey results inside to learn what network leaders are doing to overcome these challenges and support digital transformation.
Posted: 28 Aug 2017 | Published: 31 Jul 2016

Verizon

Increase Network Security Resilience
sponsored by Ixia
WHITE PAPER: Is your overall security architecture resilient enough to limit the risk of downtime to your network? Explore how you can build a more resilient IT security architecture to complement your firewall.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Ixia

Network Visibility for Dummies
sponsored by Ixia
EBOOK: You can't monitor what you can't see. When it comes to establishing strong security, visibility across all your network traffic is essential. This 77-page e-book, Network Visibility for Dummies, describes how you can achieve truly resilient and effective network security.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Ixia

Improve Endpoint Security with Advanced Tools and Techniques
sponsored by OPSWAT inc
EGUIDE: Better endpoint security protection is possible with NAC, DLP and other tools and techniques. Access this expert e-guide to learn how they fit together to improve enterprise endpoint protection.
Posted: 31 Aug 2017 | Published: 29 Aug 2017

101 - 125 of 1503 Matches Previous Page    3 4 5 6 7 8    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement