IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
126 - 150 of 1521 Matches Previous Page  |  Next Page
Top ten reasons you don’t need Mobile Device Management (MDM)
sponsored by IBM MaaS360
WHITE PAPER: Mobile device management (MDM) is a dying trend. Like the frosted tip hairstyles and low-rise jeans of the 90's, smartphones are just another fad that'll be replaced soon enough. Read on for ten reasons why you don't need to bother with this MDM nonsense.
Posted: 20 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Detect Compromised Credentials with Behavioral Analytics
sponsored by Exabeam
WHITE PAPER: User behavior intelligence and security session assembly can help enterprises root out attackers that impersonate employees. Discover how the right solution can help you give more complex tasks to junior security analysts while speeding up data analysis.
Posted: 20 May 2016 | Published: 31 Dec 2014

Exabeam

Detect, Prioritize, and Respond to Modern Cyber Attacks
sponsored by Exabeam
WHITE PAPER: They need the ability to automatically analyze user behavior to respond effectively. Learn how to leverage existing log data to detect modern attacks and prioritize incidents efficiently. Used correctly, user behavior analytics adds a powerful analytics layer over existing security technologies, guiding a more effective response to attacks.
Posted: 20 May 2016 | Published: 31 Dec 2015

Exabeam

Beyond CLM and MDM: Why your Organization needs Unified Endpoint Management (UEM)
sponsored by Matrix42
WHITE PAPER: Unified endpoint management (UEM) combines mobile device management with client lifecycle management to create a new central management environment. Read on to learn more about how UEM works and its benefits for businesses, IT and users.
Posted: 19 May 2016 | Published: 30 Dec 2015

Matrix42

Surfing the Windows 10 Wave with UEM
sponsored by Matrix42
WHITE PAPER: Mobile devices are going largely unmanaged in the workplace. Windows 10 looms large on the horizon. Chaos seems inevitable. Read on to uncover a unified endpoint management solution that will manage all devices across various operating systems and help prepare for the Windows 10 rollout.
Posted: 19 May 2016 | Published: 31 Dec 2015

Matrix42

Korott Labs Implement Next Gen Firewalls for Security and Reliability
sponsored by Barracuda Networks
RESOURCE: What they decided on gave them a distributed, reliable and secure network with centralized management and complete visibility of their entire network. Learn more about Korott's process and eventual decision to help your organization find the proper firewall security it needs.
Posted: 19 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Tackling Workplace Mobility
sponsored by VMware
WHITE PAPER: 84% of employees use a mobile device during their work day and as mobility takes over the workplace, problems with security, compliance, and cost begin to pop up. Learn more about the mobile takeover and find a solution that tackles these challenges.
Posted: 18 May 2016 | Published: 29 Apr 2016

VMware

Mobile is the New Playground for Thieves
sponsored by IBM MaaS360
WHITE PAPER: You need to modernize your security with a robust way to proactively detect, analyze and remediate new mobile threats. Learn the true cost of a data breach and how to best implement your own BYOD policy.
Posted: 18 May 2016 | Published: 31 Dec 2015

IBM MaaS360

Ten rules for Bring Your Own Device (BYOD)
sponsored by IBM MaaS360
WHITE PAPER: Bring your own device (BYOD) is the facet of mobility that is leaving many organizations feeling vulnerable. Here are ten rules, each broken down, to keep you on the right track to taking full advantage of all that mobility has to offer.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Why Visibility Is More Important Than Stopping an Attack
sponsored by Intel
EGUIDE: Visibility into what is happening on your network may matter more than stopping an attack. Can technology keep up with advanced threats? Find out in this expert resource from searchSecurity.com.
Posted: 18 May 2016 | Published: 13 May 2016

Intel

Enterprise Mobility Management
sponsored by IBM MaaS360
WHITE PAPER: 20% of CIOs reported that their organizations do not have a mobile technology strategy. In order to survive in the mobile centric world, a nuanced strategy is in order. See how enterprise mobility management has evolved over the past two decades and how to ensure that your organization doesn't fall behind.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Enterprise Mobility Management Suites Vendor Comparison
sponsored by IBM MaaS360
RESOURCE: This expert report breaks down enterprise mobility management (EMM) into four easily understandable categories and compares the strengths and weaknesses of top EMM suite vendors. Get prepared to navigate the mobile business landscape.
Posted: 18 May 2016 | Published: 07 Jul 2015

IBM MaaS360

Six steps to control the uncontrollable
sponsored by Microsoft
WHITE PAPER: Your employees need to be productive where and when they want to be. If you don't provide ways for them to accomplish this, they'll do it themselves. So how sure are you that you're in full control of your company? Explore six key focus areas to managing your enterprise's mobility and empowering your employees while ensuring security.
Posted: 18 May 2016 | Published: 04 May 2016

Microsoft

Getting Ready for Inevitable Security Breaches
sponsored by Verizon
VIDEO: Get ready for security breaches which, while inevitable, can have a miniscule or a catastrophic impact on your enterprise. If your systems are well prepared, you'll weather attacks much more effectively.
Posted: 18 May 2016 | Premiered: 15 Apr 2016

Verizon

Controlling the uncontrollable
sponsored by Microsoft
WHITE PAPER: 29% of workers use three or more devices, work from many locations, and use many apps, and this number is growing. The problem is enabling employees without compromising security throughout the enterprise. Read on to learn about an enterprise mobile management solution that will make the process easier than you may realize.
Posted: 18 May 2016 | Published: 11 May 2016

Microsoft

The State of Mobile Application Insecurity - Ponemon Institute Research Report
sponsored by IBM MaaS360
RESOURCE: This Ponemon Institute study, which encapsulates 640 individuals involved in the application development and security process, will help you understand how organizations are reducing the risk of unsecured mobile apps used in their business practices.
Posted: 18 May 2016 | Published: 28 Feb 2015

IBM MaaS360

Scaling Security Alongside Your Business Growth
sponsored by Verizon
WHITE PAPER: See how you can extend your WAN while you grow, and do so without being concerned about opening up your enterprise to unseen vulnerability.
Posted: 17 May 2016 | Published: 31 Dec 2015

Verizon

How Equinix Uses Splunk as a Cloud-based SIEM
sponsored by Splunk
WEBCAST: Join this webinar to hear from George Do, CISO at Equinix, about how cloud-based SIEM can deliver you instant access to advanced security analytics, valuable context, and detailed insights.
Posted: 17 May 2016 | Premiered: May 17, 2016

Splunk

AAA WCNY Optimizes Roadside Assistance, Delivers Physical and Network Security
sponsored by Splunk
CASE STUDY: Discover how to achieve full operational visibility into your network security and firewall traffic. Learn how AAA Western and Central New York leveraged cloud to monitor their VPN, enhance PCI compliance, and deliver superior customer service—all not possible without its secure network.
Posted: 17 May 2016 | Published: 17 May 2016

Splunk

Enterprise Mobile Management
sponsored by IBM MaaS360
RESOURCE: Are you sure that your mobility solution is keeping you competitive? The future of business is becoming increasingly focused on mobility and shaping the mobile worker's experience. Access this report to compare the top eleven enterprise mobile management vendors and gain an understanding of what to look for in a solution.
Posted: 17 May 2016 | Published: 04 Dec 2015

IBM MaaS360

The Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: Trends in mobility, IoT, BYOD, cloud-based computing and more are changing the way that business is done. This poses a lot of network and security issues. Access this resource to explore four steps that will guide you through this evolutionary phase and into a digital workplace.
Posted: 16 May 2016 | Published: 29 Feb 2016

Aruba Networks

How to Create a Culture of Compliance in IT
sponsored by Verizon
WHITE PAPER: Navigating compliance issues is no easy task – and the cost of noncompliance is high. Learn how to create a culture of compliance at your enterprise, and get tips on balancing your mobile strategy with compliance, protecting customer data, and more.
Posted: 16 May 2016 | Published: 31 Dec 2015

Verizon

Definitive Guide: Securing The Mobile Enterprise
sponsored by Aruba Networks
WHITE PAPER: Mobility, BYOD and cloud computing are changing the way people do work and this can quickly become a nightmare for security and IT managers. Access this white paper to learn how to handle the increasingly mobile workforce and turn mobility into a business advantage.
Posted: 16 May 2016 | Published: 04 May 2016

Aruba Networks

Spot Risks Before They Become Real Threats
sponsored by Verizon
WHITE PAPER: Discover how you can – and why you should – shift from simply reacting to threats to proactively managing risk in order to quickly identify attacks heading to your network.
Posted: 16 May 2016 | Published: 31 Dec 2015

Verizon

Barracuda NextGen Firewalls protect the ever-expanding operation of Georgia’s leading telecoms provider, Geocell
sponsored by Barracuda Networks
RESOURCE: Geocell chose a next-generation firewall that fit every criteria and beyond. Within only two months, business-critical apps were running smoothly and network management controls were centralized. Learn more about how Geocell's experiences could benefit your network.
Posted: 16 May 2016 | Published: 01 Apr 2016

Barracuda Networks
126 - 150 of 1521 Matches Previous Page    4 5 6 7 8 9    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement