IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network SecurityReports
126 - 150 of 1202 Matches Previous Page  | Next Page
Advanced Persistent Threats: Defending from the Inside Out
sponsored by CA Technologies.
WHITE PAPER: This white paper explains why reinvigorating your privileged identity management solutions, paired with data intelligence-driven content-awareness, can improve outsider and insider threat prevention.
Posted: 20 Jun 2014 | Published: 31 Jul 2012

CA Technologies.

HP TippingPoint Provides Next-Generation Network Security
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Hewlett-Packard Company

Network Project of the Year 2014
sponsored by Talari Networks
CASE STUDY: This exclusive resource details how a leading railcar manufacturer utilized a networking tool to maximize availability and prevent costly network downtime. Read on to find out more.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Talari Networks

F5 DDoS Protection: Recommended Practices
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper provides strategies used to combat DDoS attacks, particularly defense mechanisms.
Posted: 19 Jun 2014 | Published: 31 Dec 2012

F5 Networks

Who Achieves 100% on NSS Data Center Firewall Security Testing
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive resource analyzes a firewall solution that has passed all stability, reliability, and firewall policy enforcement tests to ensure that your environment is as safe as it can be.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

Fortinet, Inc.

Overcoming 3 Pitfalls of Ineffective Monitoring Solutions
sponsored by CA Technologies.
WHITE PAPER: This resource reviews the three major pitfalls that enterprises are likely to encounter in the absence of effective monitoring capabilities.
Posted: 18 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Talari Case Study: American Railcar Industries
sponsored by Talari Networks
CASE STUDY: This exclusive case study examines how an American manufacturer was able to utilize a network solution to prevent downtime, eliminate off-hour crises, and maximize efficiencies.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Talari Networks

Product Report Card: NSS Labs Evaluates FortiSandbox
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at a breach detection solution that identifies and mitigates any potential network threat or intrusion, allowing you to continue to provide the services your users need.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Fortinet, Inc.

Five Simple Strategies for Securing APIs
sponsored by CA Technologies.
WHITE PAPER: This exclusive paper examines security risks unique to APIs and discusses five simple solutions to these issues.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

CA Technologies.

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER: This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

FireEye

Denial-of-Service (DoS) Secured Virtual Tenant Networks (VTN)
sponsored by NEC Corporation of America
WHITE PAPER: This crucial paper discusses the evolution of DDoS attacks and examines an SDN solution that detects and mitigates potential attacks almost instantly, ensuring that your network is kept up and running.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

NEC Corporation of America

Making the Case for a BYOD Alternative
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to find out why your business should implement COPE and learn how to cut down device chaos, reduce costs, tighten content control, and more!
Posted: 03 Jun 2014 | Published: 30 Jul 2014

CA Technologies.

Security Considerations When Undergoing a Network Refresh
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.
Posted: 02 Jun 2014 | Published: 02 Jun 2014

Hewlett-Packard Company

Protecting DNS Infrastructure—Inside and Out
sponsored by Infoblox
WHITE PAPER: This white paper unveils the critical risk your domain name system (DNS) is in, and offers leading strategies to help you protect your infrastructure against outside-in and inside-out threats.
Posted: 30 May 2014 | Published: 29 May 2014

Infoblox

Designing a Secure DNS Architecture
sponsored by Infoblox
WHITE PAPER: This exclusive paper discusses how your organization can design a scalable and secure DNS architecture, examining what tools to use and what security threats you should be preparing for.
Posted: 29 May 2014 | Published: 29 May 2014

Infoblox

How To Avoid Heartbleed Or Similar SSL Related Vulnerabilities?
sponsored by i-Sprint Innovations
WHITE PAPER: This informative guide explores top strategies for resolving Heartbleed and similar SSL-related vulnerabilities.
Posted: 29 May 2014 | Published: 29 May 2014

i-Sprint Innovations

Designing a Secure DNS Architecture
sponsored by Infoblox
WHITE PAPER: This white paper offers essential tips to building a high-performance, secure domain name system (DNS) server to promote business growth.
Posted: 28 May 2014 | Published: 30 Apr 2014

Infoblox

The Capabilities and Benefits of Enhanced File Transfer (EFT)
sponsored by GlobalScape
WHITE PAPER: This resource features a military-grade file transfer solution that ensures compliance with internal security policies and government regulations.
Posted: 23 May 2014 | Published: 31 Dec 2013

GlobalScape

The Purview™ Solution–Integration With SIEM
sponsored by Extreme Networks
WHITE PAPER: This whitepaper explores one unique network monitoring and management system that allows for easy integration with your SIEM platform.
Posted: 23 May 2014 | Published: 23 May 2014

Extreme Networks

Network-Powered Applications Analytics Webinar
sponsored by Extreme Networks
WHITE PAPER: This informative resource outlines a unique networking analytics tool that enables greater business performance by improving user experience, engagement and organizational efficiency.
Posted: 22 May 2014 | Published: 22 May 2014

Extreme Networks

Big Five in Overdrive- Are State and Local Networks Ready?
sponsored by Brocade
WHITE PAPER: This informative whitepaper explores state and local governments - asking the question, are their networks ready for the "Big Five of IT."
Posted: 18 Jun 2014 | Published: 10 Feb 2014

Brocade

Live Webinar: Strategies That Work for Advanced Persistent Threat Prevention
sponsored by Palo Alto Networks
WHITE PAPER: Join this exclusive live webcast on July 10, at 11 AM GMT to take an in-depth look at the state of ATP prevention today and find out how your organization can keep your sensitive data and applications safe.
Posted: 16 Jun 2014 | Published: 10 Jul 2014

Palo Alto Networks

The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
sponsored by Vormetric
WHITE PAPER: This white paper defines the global legal obligations and financial services laws that require data encryption.
Posted: 10 Jun 2014 | Published: 31 May 2014

Vormetric

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

The University of Leeds Stops Millions of Attacks and Countless Illegal Downloads with HP TippingPoint
sponsored by Hewlett-Packard Company
CASE STUDY: This case study focuses on the University of Leeds' experience with an intrusion prevention system (IPS) that helped IT secure networks without disturbing Web access.
Posted: 29 May 2014 | Published: 31 May 2012

Hewlett-Packard Company
126 - 150 of 1202 Matches Previous Page    4 5 6 7 8 9    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement