IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
126 - 150 of 1428 Matches Previous Page  |  Next Page
Revation Systems Revolutionizes Managed Connectivity Services With 128 Technology's Networking Platform
sponsored by 128 Technology
CASE STUDY: Learn how Revation Systems was able to deliver reliable, secure connectivity to their geographically dispersed customers and enjoy benefits such as improved voice quality, enhanced security, high-quality experience, and more.
Posted: 08 May 2017 | Published: 30 Dec 2016

128 Technology

Hypersegmentation Under the Hood
sponsored by 128 Technology
WHITE PAPER: This white paper discusses a new, entirely distinct approach to segmenting traffic, hypersegmentation. Hypersegmentation introduces a whole new set of tools for network design intended to allow operators to build the network around the services it is meant to deliver.
Posted: 08 May 2017 | Published: 20 Apr 2017

128 Technology

Strengthen Your Security Posture by Mapping Network Traffic to Users
sponsored by Palo Alto Networks
WHITE PAPER: This white paper explores how to leverage a User-ID security platform with next-generation firewall capabilities. Find out how to easily integrate user information into your security infrastructure and with features like user authentication and user-based policy control and reporting.
Posted: 08 May 2017 | Published: 31 Dec 2016

Palo Alto Networks

The Challenges of Managing SSL/TLS Encrypted Traffic
sponsored by Gigamon
RESEARCH CONTENT: Just 31% of companies say they have a plan in place to protect both their security sockets layer (SSL) and transport layer security (TLS) traffic in their network. In this SC Media survey, learn why it's so imperative to have a SSL/TLS plan.
Posted: 05 May 2017 | Published: 05 May 2017

Gigamon

Re-Thinking The Network: Delivering Transformation With Simplicity
sponsored by 128 Technology
WHITE PAPER: Overly complex networks are barely meeting today's business requirements. How will they meet the demands of tomorrow? Learn how you can remove the barrier of network complexity from the way you do business.
Posted: 05 May 2017 | Published: 30 Dec 2016

128 Technology

Businesses Blame Rivals for DDoS Attacks& The Importance of Cloud WAF
sponsored by F5 Networks
EGUIDE: More than 40% of businesses hit by a DDoS attack believe their competitors were behind it, according to research by Kaspersky Lab and B2B International. But is there truth behind this suspicion? In this expert e-guide, learn ]about the real culprits behind DDoS attacks, and get some insight into the emergence of cloud WAF for application security.
Posted: 04 May 2017 | Published: 01 May 2017

F5 Networks

End Web Application Security Risks with WAF
sponsored by F5 Networks
EGUIDE: In this expert e-guide, educate yourself on all things WAF by discovering how a WAF works, the best WAF features and more. Additionally, learn how to further resolve web application vulnerabilities.
Posted: 04 May 2017 | Published: 01 May 2017

F5 Networks

Silver Peak Enhances its SD-WAN Edge Device to Improve the Branch Experience
sponsored by Silver Peak
RESOURCE: Learn about the functionality SD-WAN boasts that MPLS just can't match, including access to 4G LTE and broadband and increased application performance for mobile and remote users.
Posted: 04 May 2017 | Published: 14 Apr 2017

Silver Peak

Rethinking the Approach to Cybersecurity
sponsored by Fortinet, Inc.
WHITE PAPER: Before an effective network security strategy can be put in place, you need to understand the top cybersecurity challenges putting organizations at risk today. Learn more about these challenges, including cloud adoption, IoT and ransomware.
Posted: 04 May 2017 | Published: 10 Feb 2017

Fortinet, Inc.

SIEM in 2016: Spruce Up Your Technology
sponsored by TechTarget
RESOURCE: In Resolve to Revitalize Your SIEM, our experts discuss new SIEM product offerings, how you can best use the data that a SIEM collects, and even how to make an old SIEM work better for your organization.
Posted: 03 May 2017 | Published: 30 Nov 2015

TechTarget

Buyer's Guide: Network Monitoring Tools
sponsored by TechTarget
RESOURCE: In this complimentary e-guide, learn more about monitoring tools, how network monitoring works, and the difference between nice-to-have and need-to-have features in order to determine the best tool to monitor your network's performance.
Posted: 03 May 2017 | Published: 30 Nov 2015

TechTarget

Enterprise Vulnerability: Expert Tips and Product Reviews
sponsored by TechTarget
RESOURCE: Explore a 3-step process for ranking enterprise vulnerabilities, learn how to calculate a vulnerability's risk score, and discover the best risk assessment and management tools for your enterprise with the expert advice found in our exclusive e-guide, Prioritize and Manage Enterprise Vulnerability.
Posted: 03 May 2017 | Published: 30 Nov 2015

TechTarget

The IoT Explosion's Impact on Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Find out what's driving the IoT explosion and how you can prepare your network for the potential security risks that accompany it.
Posted: 03 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

Countering Evolving Cybersecurity Challenges
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about an intelligent, new approach to network security that can seamlessly follow and protect data, provide actionable threat intelligence and close gaps left by legacy point products and platforms.
Posted: 03 May 2017 | Published: 23 Jan 2017

Fortinet, Inc.

What's Driving Hybrid WAN Adoption?
sponsored by Silver Peak
WHITE PAPER: Selecting a hybrid WAN without knowledge of the challenges it needs to address is a recipe for disaster. Learn about these challenges in this white paper.
Posted: 02 May 2017 | Published: 30 Dec 2016

Silver Peak

CCNA Certification Exam: Study Guide
sponsored by TechTarget
RESOURCE: Complete our brief Network Performance Management Survey and receive a complimentary copy of our prep guide for obtaining your CCNA certification. Learn how to prepare, find out about changes that have been made, and take practice quizzes to help test your knowledge.
Posted: 02 May 2017 | Published: 02 May 2017

TechTarget

A Security Leaders Definitive Guide to the Threat Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: This guide goes in-depth on five network trends that are causing security pros to panic, so you can begin to understand what your security infrastructure is up against and how to best prepare for it.
Posted: 02 May 2017 | Published: 30 Jan 2017

Fortinet, Inc.

Six Ways to Improve Your Network Security with SD-WAN
sponsored by Silver Peak
WHITE PAPER: Learn six ways to improve network security and compliance by implementing SD-WAN.
Posted: 01 May 2017 | Published: 28 Apr 2017

Silver Peak

What's Driving WAN Architecture Simplification?
sponsored by Silver Peak
WHITE PAPER: Learn more about what challenges are driving WAN architecture simplification and how you can take advantage of it in this white paper.
Posted: 01 May 2017 | Published: 30 Dec 2016

Silver Peak

How Fortinet Security Fabric Addresses Today's Top Security Concerns
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how you can get the networks security you need to protect your organization from IoT, ransomware, a lack of skilled IT security staff and more.
Posted: 01 May 2017 | Published: 03 Mar 2017

Fortinet, Inc.

Demystifying The Threat Landscape: 10 Ways Network Security Pros Can Step Up Game
sponsored by F5 Networks
WHITE PAPER: In this eBook, you'll learn more about the changing network security landscape, where your business is most vulnerable today, and 10 areas you can step up your security game.
Posted: 24 Apr 2017 | Published: 30 Dec 2016

F5 Networks

DDoS Recommended Practices
sponsored by F5 Networks
WHITE PAPER: In this white paper, learn recommended network and application practices for successful DDoS attack protection.
Posted: 24 Apr 2017 | Published: 30 Dec 2016

F5 Networks

Focus: Network security
sponsored by ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

ComputerWeekly.com

Fast-Forward Business with IT Infographic
sponsored by VMware and Circle IT
RESOURCE: In this infographic, learn how you can make your IT processes 87% faster by cutting out time-consuming and labor-intensive manual processes.
Posted: 04 May 2017 | Published: 31 Jan 2017

VMware and Circle IT

Fast-Forward Business with On-Demand App Deployments
sponsored by VMware and Presidio
WHITE PAPER: In this e-book, learn how to automate your IT and application delivery process to meet the demands of the cloud.
Posted: 01 May 2017 | Published: 30 Dec 2016

VMware and Presidio
126 - 150 of 1428 Matches Previous Page    4 5 6 7 8 9    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement