IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
101 - 125 of 1546 Matches Previous Page  |  Next Page
SIEM Analyst Research Bundle
sponsored by AlienVault
WHITE PAPER: No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

AlienVault

Enterprise Endpoint Security Performance Benchmarks
sponsored by Symantec
WHITE PAPER: This white paper reveals an endpoint security report comparing 5 security products based on 17 benchmark performance metrics to assess product performance.
Posted: 18 Oct 2017 | Published: 10 Feb 2017

Symantec

Enterprise Cloud Applications & Services Adoption, Use, and Content and Threats
sponsored by Symantec
RESEARCH CONTENT: In this Symantec CloudSOC Shadow Data Report, uncover the key challenges that enterprises face when trying to ensure their sensitive data in cloud apps remains secure.
Posted: 16 Oct 2017 | Published: 16 Oct 2017

Symantec

The Role of SAM in Information Security
sponsored by Snow Software
WHITE PAPER: Software asset management (SAM) provides an organization not just with the resources it needs to generate audit and reconciliation reports, but also to support information security initiatives. Learn ways information security can be more effectively addressed with the aid of SAM.
Posted: 12 Oct 2017 | Published: 09 May 2016

Snow Software

6 Steps to Overcoming PCI DSS Compliance Challenges in Multi-Cloud and Hybrid Environments
sponsored by Alert Logic
EBOOK: In this e-book, uncover the challenges of achieving continuous PCI DSS compliance across complex multi-cloud landscapes and the 6 criteria to consider when evaluating compliance solutions.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

Alert Logic

Top 5 Security Challenges Brought on by Mobile and Cloud
sponsored by Entrust, Inc.
WEBCAST: ½ of CEOs expect their industries to be unrecognizably transformed by digital transformation, mobile and cloud. This webcast delves into the top 5 security challenges presented by the changing security perimeter, such as disruption as the new normal, network and business security imperatives, identity management evolution, and more.
Posted: 09 Oct 2017 | Premiered: Sep 27, 2017

Entrust, Inc.

Top 6 Considerations for Cloud and Network Performance
sponsored by LiveAction
EBRIEF: In this e-brief, uncover the 6 topic areas IT network professionals should consider when shifting to the cloud. Then, learn how to overcome SaaS challenges as traffic volume continues to increase.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

LiveAction

New Options to Enable Remote Access in the Network
sponsored by SearchNetworking.com
EBOOK: This handbook guides you through how to best enable remote access for your network as workloads go beyond the private data center. Then, learn how VPN evolution has changed remote access for more secure communication.
Posted: 04 Oct 2017 | Published: 30 Sep 2017

SearchNetworking.com

Cloud Security Certifications 101
sponsored by TechTarget
RESOURCE: Fill out our Network Security Survey to access our exclusive Cloud Security Certifications 101 guide. Experts Ed Tittel and Mary Kyle examine cloud security certifications, both vendor-neutral and vendor-specific, so that you can find one to demonstrate your skillset.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

TechTarget

How the Garrigan Lyman Group Managed Cloud Security
sponsored by Alert Logic
CASE STUDY: Learn how Garrigan Lyman Group (GLG) deployed Alert Logic technology to help prevent against network security attacks and increase customer satisfaction and trust.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Alert Logic

Your Guide to Security Certifications
sponsored by TechTarget
RESOURCE: We're here to help you decide which vendor-neutral and vendor-specific security certifications will best suit your educational or career needs. Take this survey and you'll receive a complimentary e-guide with tips enclosed on choosing the right certification for you.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

TechTarget

Confidence to Innovate
sponsored by Dell India
WHITE PAPER: What are the benefits of complete visibility and control over your security environment? This resource explains the importance of connecting the 4 foundational functions of IT security to enable organizations to adapt rapidly to changing threats, regulations and new technologies.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Dell India

Firewall Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Recent ransomware attacks like Wannacry and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. This white paper reveals best practices for configuring your firewall and network to protect against ransomware.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Sophos

Synchronized Security: Best-of-breed defense that's more coordinated than attacks
sponsored by Sophos
WHITE PAPER: Today's attacks are more sophisticated and coordinated than ever. According to ESG Group, 46% of organizations believe they have a problematic shortage of cybersecurity skills. Inside, learn how to protect against known and emerging threats.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Sophos

Cloud Technology History: Where Did the Cloud Come From?
sponsored by Vonage
RESOURCE: In this resource, learn how cloud technology has transformed over the years from virtualization to the "as-a-service" revolution.
Posted: 29 Sep 2017 | Published: 13 Sep 2017

Vonage

SD-WAN vs. SDN: The Differences are in the Details
sponsored by Windstream Communications
WHITE PAPER: While the concept of a Software Defined WAN is generally understood, it's often confused with its technology parent, Software Defined Networking (SDN). Take a closer look at this white paper to reveal the differences between SD-WAN and SDN.
Posted: 26 Sep 2017 | Published: 08 Jun 2017

Windstream Communications

How SD-WAN can take on Branch Office Security Challenges
sponsored by Windstream Communications
RESOURCE: In this resource, learn how to recognize and then overcome the common security challenges SD-WAN faces by leveraging SD-WAN's inherent virtual capabilities.
Posted: 25 Sep 2017 | Published: 31 May 2017

Windstream Communications

When it Comes to Optimizing Mid-Market Enterprise Networks, One Size Does Not Fit All
sponsored by Windstream Communications
RESOURCE: This resource stresses the key considerations to make when you are choosing a SD-WAN provider for your enterprise network.
Posted: 25 Sep 2017 | Published: 25 Aug 2017

Windstream Communications

Realizing the Promise of Scale in the Cloud
sponsored by West UC
WHITE PAPER: In this white paper, find out how healthcare organizations depend on UCaaS to provide up-to-date technology and deliver productivity benefits to improve customer satisfaction.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

West UC

Amazon Web Services: Overview of Security Processes
sponsored by Amazon Web Services
WHITE PAPER: You may be wondering, "how does AWS help ensure that my data is secure?" This document delivers the answer to this question and is intended to provide an overview of the security processes involved with Amazon Web Services.
Posted: 16 Oct 2017 | Published: 31 May 2017

Amazon Web Services

Introduction to AWS Security
sponsored by Amazon Web Services
WHITE PAPER: This document is intended to provide an introduction to AWS's approach to security, including the controls in the AWS environment and some of the products and features that AWS makes available to customers to meet your security objectives.
Posted: 10 Oct 2017 | Published: 31 Jul 2015

Amazon Web Services

What do Financial Service Customers want from a Contract Center
sponsored by Five9
WHITE PAPER: In this research report, 995 survey respondents reveal how contact center technology plays an important role in their experience and how they choose their financial institutions.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

Five9

9 Reasons to Make the Move to a Cloud Contact Center
sponsored by Five9
WHITE PAPER: Discover the 9 reasons to make the switch to a cloud contact center. Learn how the cloud allows you to reduce hardware costs, speed deployment, enable agents to work remotely, and more.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

Five9

Building the Agile Enterprise: Maintain Your Competitive Edge
sponsored by Verizon
WHITE PAPER: Enterprise leaders want a network that exceeds their customers' expectations. Explore this white paper to reveal how to collaborate better with employees and open up new business opportunities by virtualizing your network infrastructure.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Verizon

Building the Case for Virtual Network Services
sponsored by Verizon
WHITE PAPER: As the digital economy continues to take hold, organizations need to focus on their applications, and specifically how customers access the services within the business. Read this white paper to reveal benefits you can see from using network functions virtualization.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Verizon
101 - 125 of 1546 Matches Previous Page    3 4 5 6 7 8    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement