IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network Security Reports
126 - 150 of 1272 Matches Previous Page  |  Next Page
Comprehensive Data Protection Against Insider & Outsider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explores how you can implement data protection that travels with your data regardless of location or device.
Posted: 14 Apr 2015 | Published: 25 Mar 2015

Digital Guardian

Meet BYOD Challenges
sponsored by SHI International Corporation
WHITE PAPER: In this white paper, discover one potential BYOD solution that delivers an access-agnostic approach which leverages a universal security and compliancy policy across all devices, while also reducing the IT burden with an easy-to-use self-registration process.
Posted: 14 Apr 2015 | Published: 28 Mar 2014

SHI International Corporation

Encrypted Traffic Management for Dummies
sponsored by Blue Coat Systems
EBOOK: In this eBook, learn all about the world of encrypted traffic management, an easy solution to all of these SSL traffic headaches.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Blue Coat Systems

Don’t let crime rule your network – building an efficient cyber crime strategy
sponsored by Hewlett-Packard Limited
WHITE PAPER: Featuring input from expert analysts with years of experience, this white paper presents a series of guidelines for creating security that can survive the modern threat landscape.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

Hewlett-Packard Limited

SSL Traffic Management to Meet Your Needs
sponsored by Blue Coat Systems
WHITE PAPER: In this infographic, discover a tool that gives you the all the capabilities you need for effective traffic monitoring.
Posted: 09 Apr 2015 | Published: 28 Feb 2015

Blue Coat Systems

Under Threat or Compromise Every Detail Counts
sponsored by Blue Coat Systems
WHITE PAPER: This white paper breaks down the five essential steps of security management to help you create a more comprehensive defense suited for today's threat landscape.
Posted: 08 Apr 2015 | Published: 31 Aug 2014

Blue Coat Systems

2015 Cyberthreat Defense Report
sponsored by Blue Coat Systems
WHITE PAPER: This report, which focuses specifically on IT security management, uses research to reveal what areas of security you should turn your attention to.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Blue Coat Systems

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and vulnerabilities and presents an encrypted traffic management approach to mitigating risks.
Posted: 07 Apr 2015 | Published: 09 Dec 2013

Blue Coat Systems

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: This white paper walks you through security policies to ensure that data doesn't leak out through encrypted tunnels. Read on now to learn how to improve your security strategy.
Posted: 07 Apr 2015 | Published: 20 Jan 2015

Blue Coat Systems

Security Analytics Moves to Real-Time Protection
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover a security analytics platform that works in real time.
Posted: 07 Apr 2015 | Published: 31 Jul 2014

Blue Coat Systems

Network Encryption and its Impact on Enterprise Security
sponsored by Blue Coat Systems
WHITE PAPER: This white paper explores why SSL/TSL decryption and inspection methodologies are being abandoned in favor of more strategic approaches. View now to learn the three crucial characteristics of and how to improve the resiliency and performance of your network security strategy.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Blue Coat Systems

SSL Accerleration Checklist
sponsored by Blue Coat Systems
WHITE PAPER: This white paper explores the challenges of SSL management and offers steps to remedy them. Read on to explore the critical requirements checklist for an SSL acceleration platform.
Posted: 06 Apr 2015 | Published: 09 Oct 2013

Blue Coat Systems

Developing a Network Infrsatructure to Support Cloud Computing
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This white paper explains how to develop a network infrastructure that supports your cloud computing efforts.
Posted: 06 Apr 2015 | Published: 31 Dec 2014

Level 3 Communications, Inc.

What's Your Next Security Move?
sponsored by FireEye
WHITE PAPER: This quick self-assessment will help you navigate to your next big security decision and create better protection against advanced attackers.
Posted: 06 Apr 2015 | Published: 31 Dec 2014

FireEye

Next-Gen Security Analytics - 7 Necessary Functions
sponsored by Blue Coat Systems
WHITE PAPER: This white paper examines security analytics in depth and the seven functions a security analytics platform needs to have.
Posted: 03 Apr 2015 | Published: 09 Jul 2014

Blue Coat Systems

Security Reimagined: An Adaptive Approach for the Digital Age
sponsored by FireEye
WHITE PAPER: It's time to reimagine how we do security. This white paper shows you how with tips on creating an integrated, proactive security system designed for the cybercrime of today.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

FireEye

Attack Mitigation Service
sponsored by Radware
WHITE PAPER: This comprehensive white paper provides an in-depth explanation of all of the latest cyber threats and explains the benefits of one potential cyber security solution.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Radware

A Comprehensive Guide to Network Security in 2014-2015
sponsored by Radware
WHITE PAPER: Access this comprehensive white paper for an in-depth review of what plagued security professionals in 2014, and what will continue to challenge them in 2015.
Posted: 02 Apr 2015 | Published: 26 Dec 2014

Radware

Securing Your Business Against SSL-Based Attacks
sponsored by Radware
WHITE PAPER: Access this white paper to uncover the four challenges of defending against DoS-based SSL attacks. Read on to learn why current defense solutions are falling short and the triple layer defense strategy that replaces them.
Posted: 31 Mar 2015 | Published: 10 Apr 2013

Radware

Protecting Critical DNS Infrastructure Against Attack
sponsored by Radware
WHITE PAPER: This white paper delves into the challenges of protecting DNS from DDoS attacks as well as the three new attack techniques. View now to learn a three phase strategy to mitigate these attacks.
Posted: 31 Mar 2015 | Published: 08 May 2013

Radware

Fighting Emerging Cyber-Attacks with a Holistic Security Architecture
sponsored by Radware
WHITE PAPER: This white paper outlines a holistic security architecture strategy designed to fight complex and dynamic attack campaigns. Access now to learn how to explore four attack cases and how to defend against them.
Posted: 31 Mar 2015 | Published: 09 Apr 2014

Radware

The Enterprise Mobile Security Technology Buyer's Guide
sponsored by Dropbox for Business
WHITE PAPER: In this research report, Forrester Research, Inc., defines the use cases, business value, and outlook for the 14 technologies at the heart of mobile security.
Posted: 30 Mar 2015 | Published: 13 Dec 2013

Dropbox for Business

The Shifting Role of IT Balancing Corporate Needs and Employee Expectations
sponsored by Dropbox for Business
WHITE PAPER: In this white paper, you'll learn what you need to do to effectively secure your enterprise data in this world of BYOA movements.
Posted: 30 Mar 2015 | Published: 28 Mar 2014

Dropbox for Business

The Evolution and Necessity of a Next-Gen Firewall
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper takes you through the history and development of firewalls and explores each generation's strengths and weaknesses. Read on to learn what characteristics you need in a next-gen firewall to improve your security strategy.
Posted: 27 Mar 2015 | Published: 15 Oct 2014

Juniper Networks, Inc.

Markets and Bounties for Cybercrime Tools and Stolen Data
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper examines the fundamental characteristics of black and grey markets to offer understanding of the current and predicted security threat landscape.
Posted: 27 Mar 2015 | Published: 04 Dec 2014

Juniper Networks, Inc.
126 - 150 of 1272 Matches Previous Page    4 5 6 7 8 9    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement