IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
101 - 125 of 1365 Matches Previous Page  |  Next Page
Passive Optical LAN: What you're missing out on
sponsored by Nokia
WHITE PAPER: In this resource, learn why many companies are letting their copper-based LANs corrode and upgrading to fiber-based LANs.
Posted: 13 Apr 2017 | Published: 31 Mar 2016

Nokia

Automation Isn't One-Size-Fits-All
sponsored by FireMon
WHITE PAPER: In this white paper, learn how intelligent policy automation can take the pressure off your firewall team by telling you which access to approve and which to deny, increasing speed and security of change management workflows.
Posted: 13 Apr 2017 | Published: 30 Dec 2016

FireMon

Enhance Your Business Performance with Passive Optical LAN
sponsored by Nokia
VIDEO: Many companies are ditching their copper-based LAN for a passive optical LAN (POL) to meet today's networking requirements. In this short video, learn how POL outperforms archaic LAN tech.
Posted: 12 Apr 2017 | Premiered: 07 Dec 2016

Nokia

Prepping for the Oncoming Wave of SD-WANs
sponsored by Windstream Communications
WHITE PAPER: In this TechTarget white paper, learn what the experts are saying about the near future for SD-WANS.
Posted: 12 Apr 2017 | Published: 31 Jan 2017

Windstream Communications

Array Networks Secure Access Gateway Datasheet (SSL VPN)
sponsored by Array Networks
RESOURCE: In this resource, learn about Array Network's AG Series secure access gateways and see how they match up against the competition.
Posted: 12 Apr 2017 | Published: 31 Mar 2017

Array Networks

How to Find the Best DDoS Attack Prevention and Detection Tools
sponsored by SearchSecurity.com
EBOOK: In this handbook, one expert reveals how to select tools that will best strengthen your defense against DDoS attacks. Uncover 4 key questions to ask as you begin your DDoS defense strategy.
Posted: 10 Apr 2017 | Published: 05 Apr 2017

SearchSecurity.com

Network Security Trends - Understanding the State of Network Security Today
sponsored by Gigamon
RESEARCH CONTENT: Read this ESG research paper and learn how network security infrastructure, practice, and performance has changed during 2016
Posted: 07 Apr 2017 | Published: 31 Jan 2017

Gigamon

SSL/TLS Decryption: How to Avoid Blind-Spots and Camouflaged Attackers
sponsored by Gigamon
RESEARCH CONTENT: Use this ESG research content to explore why building a strategic approach to SSL/TLS encryption is the best way to work past visibility and vulnerability issues in your network. Then, discover a vendor that might be able to grant you this network access.
Posted: 07 Apr 2017 | Published: 29 Feb 2016

Gigamon

Security Insights Magazine: 3 Accelerating Cybersecurity Trends
sponsored by DynTek
RESOURCE: In this resource, Intel's VP and CTO, Brett Kelsey, gives an in-depth interview on today's must-know cybersecurity trends. Additionally you'll learn how to forge a risk-based security strategy and where you cybersecurity gaps are.
Posted: 03 Apr 2017 | Published: 30 Dec 2016

DynTek

An Introduction to the Security Advantages of Mirco-Segmentation
sponsored by VMware
WHITE PAPER: Traditional data center works to defer threats from breaching your network's perimeter, so what do you do once it gets inside? Read this white paper to learn why we can't permanently resolve the perimeter-style network security problem and what micro-segmentation offers as a supplement to your existing network security.
Posted: 29 Mar 2017 | Published: 30 Nov 2016

VMware

Micro-segmentation: Security for Every Data Center
sponsored by VMware
WHITE PAPER: Firewalls are a security strategy that companies are discovering is wholly inadequate against today's sophisticated cyberattacks. To defend against cyberattacks, today's enterprises need a sophisticated approach to data center security. In this white paper, learn about a new approach to data center security designed for current threats.
Posted: 28 Mar 2017 | Published: 30 Sep 2016

VMware

Why Firewalls Alone Are No Longer Enough
sponsored by VMware
WHITE PAPER: What do you do when a threat makes it past the firewall and starts moving laterally inside the data center? To combat today's advanced cyberattacks, many organizations are moving past archaic firewall protection and empowering their security with network virtualization and micro-segmentation.
Posted: 28 Mar 2017 | Published: 30 Sep 2016

VMware

Modern Security for the Modern Data Center
sponsored by VMware
WHITE PAPER: Upgrading your data center security from an antiquated perimeter-based model is in your best interest if you don't want to end up dealing with the financial impact of a breach. Inside learn about a new, advanced data center security model that provides the protection your business needs for today and the future.
Posted: 27 Mar 2017 | Published: 30 Sep 2016

VMware

Modernizing Your Data Center's Security
sponsored by VMware
WHITE PAPER: The classic approach to data center security is to guard the perimeter and block threats from getting inside—but that's no longer adequate. Learn how micro-segmentation can provide your data center with the security it needs for today's advanced threats.
Posted: 27 Mar 2017 | Published: 30 Sep 2016

VMware

Eight Toxic Networking Vendor Selection Philosophies
sponsored by Extreme Networks
WHITE PAPER: This Forrester Research report reveals eight common statements that organizations use to rationalize their poor network choices. Discover each invalid justification for continuing to work with network vendors and infrastructure that just don't work for you.
Posted: 21 Mar 2017 | Published: 13 Jul 2016

Extreme Networks

How IT Leaders Combine Network Analytics with Automated Control and Management
sponsored by Extreme Networks
WHITE PAPER: Businesses that have issues with network performance and reliability often point to a lack of visibility into their network infrastructure as the root cause. But getting the visibility needed to rectify these issues isn't as difficult as it may seem. This white paper discusses the how you can overcome lackluster network visibility.
Posted: 16 Mar 2017 | Published: 29 Jul 2016

Extreme Networks

SD-WAN: A Simplified Network for Distributed Enterprises
sponsored by Citrix
WHITE PAPER: Discover how SD-WAN delivers to the demands of distributed enterprises, including bandwidth savings and architecture optimized for cloud. Download to learn how to integrate SD-WAN with your existing architecture, view 3 key factors to consider when evaluating deployment, SD-WAN vs. MPLS cost comparison, and more.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

Citrix

SD-WAN: From Zero Touch Provisioning to Secure Business Intent
sponsored by Silver Peak
WHITE PAPER: Essential requirements for software-defined WANs (SD-WANs) include granular visibility into both legacy and cloud applications, as well as centrally assigned business intent policies to secure and control all WAN traffic. In this white paper, learn about Silver Peak's SD-WAN solution that can help you provide this functionality and more.
Posted: 09 Mar 2017 | Published: 30 Dec 2016

Silver Peak

Wi-Fi: Secure Enough for The Federal Government?
sponsored by HPE and Intel® Xeon
WHITE PAPER: As Wi-Fi continues to evolve, so does its security functionality. But is it secure enough to protect the US Federal Government? In this white paper, get a detailed, technical explanation of how modern enterprise Wi-Fi networks are secured, and whether Wi-Fi has the ability to fully protect the federal government.
Posted: 02 Mar 2017 | Published: 30 Sep 2016

HPE and Intel® Xeon

2017 IT Priorities in the Nordics
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Benchmark your IT spending plans with our in-depth study of IT spending priorities in the Nordics.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

ComputerWeekly.com

Overview of the Secure Development Lifecycle
sponsored by APC by Schneider Electric
WHITE PAPER: Secure development lifecycle (SDL) is a process that keeps security in mind with every step of the app development process. Uncover an overview of SDL and 8 key practices that will enable your organization to design and build software securely.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

APC by Schneider Electric

Empowering the Mobile Workforce with MDM and EMM
sponsored by Snow Software
WHITE PAPER: This white paper examines a platform that provides both mobile device management (MDM) and enterprise mobile management (EMM) capabilities. Discover how to take your MDM and mobile app management to the next level by unlocking security features that allay IT concerns, creating transparency and insight into device and app use, and more.
Posted: 21 Feb 2017 | Published: 31 May 2016

Snow Software

Supercharge Your Networking Career
sponsored by VMware
WHITE PAPER: IT teams that rely on hardware-centric networks are struggling to keep up with the demands of today's business users. In this infographic, learn how you can supercharge your network and your career with network virtualization.
Posted: 21 Feb 2017 | Published: 29 Apr 2016

VMware

Meeting the Network Requirements of Intelligent Transportation Systems
sponsored by TechData - Digi
WHITE PAPER: In this white paper, learn how to choose a router and vendor that can provide your organization with Global 3G/4G LTE options, centralized mass configuration, remote troubleshooting and more.
Posted: 10 Apr 2017 | Published: 29 Jan 2016

TechData - Digi

Creating Your Connected Digital Ecosystem with Better Communication Infrastructure
sponsored by TechData - Digi
RESOURCE: This concise resource highlights communication infrastructure technology designed to help you expand into areas previously too difficult to access, making your systems more productive, more responsive and more secure.
Posted: 10 Apr 2017 | Published: 30 Dec 2016

TechData - Digi
101 - 125 of 1365 Matches Previous Page    3 4 5 6 7 8    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement