IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
126 - 150 of 1291 Matches Previous Page  |  Next Page
A Security Approach to Safeguard the Endpoint Explosion
sponsored by Fortinet, Inc.
VIDEO: 33 billion network connected devices are expected by 2020. Tune into this video to learn new ways to protect your organization against internal and external threats, and uncover a portfolio of strategies to ensure your network is protected.
Posted: 09 Dec 2015 | Premiered: 09 Dec 2015

Fortinet, Inc.

Survey: The State of Wireless Security Today
sponsored by Fortinet, Inc.
WHITE PAPER: Learn more about what your peers are doing – or not doing – to secure the wireless infrastructure. Additional data points covered in this report include plans for cloud-managed WLANs and IT decision-maker confidence in relying on third-party hosted management.
Posted: 09 Dec 2015 | Published: 15 Oct 2015

Fortinet, Inc.

Rethinking Network Security and Access to Meet Today's Business Demands
sponsored by Fortinet, Inc.
WHITE PAPER: This paper outlines comprehensive Fortinet's Secure Access offering across 3 deployment modes, which provides the same comprehensive security in both controller-managed and cloud-managed environments. Read how this suite delivers flexibility and simplicity in both the wired and wireless network while ensuring that security is never compromised.
Posted: 09 Dec 2015 | Published: 09 Oct 2015

Fortinet, Inc.

Protect your Network with Effective Incident Response
sponsored by Blue Coat Systems
VIDEO: For a holistic view of security, organizations need effective incident response. Watch this videocast to find a demo on comprehensive network forensics.
Posted: 08 Dec 2015 | Premiered: 08 Dec 2015

Blue Coat Systems

How to Apply the Data and Network Maturity Model to Four Technology Pillars
sponsored by Carousel Industries
WHITE PAPER: This expert white paper shows how you can evaluate your approach to network and security against a proven maturity model, which will help you determine if you're adopting new technologies in the most efficient way. Read on to learn how you can apply this model to a variety of technologies
Posted: 08 Dec 2015 | Published: 08 Dec 2015

Carousel Industries

Case Study: Government Contractor Secures its Data with Enhanced Analytics
sponsored by Blue Coat Systems
WHITE PAPER: Access this case study to learn how a defense contractor cut down on security incidents and protected its sensitive assets by implementing an advanced security analytics platform.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

Blue Coat Systems

Analytics Stop Advanced Threats in their Tracks
sponsored by Blue Coat Systems
WHITE PAPER: In this solution brief, you'll find relief knowing that breaches can be treated with a comprehensive approach that provides the intelligence and real-time analysis needed to see, understand, respond to and fortify the network against advanced threats.
Posted: 04 Dec 2015 | Published: 31 Dec 2014

Blue Coat Systems

The Four Horsemen of Mobile Security
sponsored by Skycure
WEBCAST: In this webcast, hear from security professionals as they explore today's mobile threat landscape and describe alternative security strategies.
Posted: 03 Dec 2015 | Premiered: Jun 25, 2015

Skycure

Predictive Mobile Threat Defense
sponsored by Skycure
WHITE PAPER: This white paper explains the 3 reasons why traditional mobile security approaches can no longer protect users and organizations. Access this resource now to learn how to advance mobile security into a next-gen mobile threat defense to protect networks, apps, and users.
Posted: 03 Dec 2015 | Published: 11 Nov 2015

Skycure

Executive Summary: Proactive Response to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: This white paper describes how to find a solution that addresses two main drivers of incident response (IR) costs. Discover key strategies for lowering costs and maximizing ROI when performing IR, with details on three maturity models.
Posted: 03 Dec 2015 | Published: 30 Sep 2015

Blue Coat Systems

Trillion-Dollar Shenzhen Stock Exchange Relies on CommScope Networks: Here's Why
sponsored by CommScope
CASE STUDY: In the following case study, learn how CommScope provides The Shenzhen Stock Exchange with the network infrastructure capable of securely and reliably handling over $16 billion in average daily transactions. Access now and learn what CommScope can do for your business, no matter the demand pressed on your network.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

CommScope

When Policy and Productivity go Hand-in-Hand
sponsored by IBM
WHITE PAPER: Access this article and learn how to accommodate the new ways employees collaborate, while also maintaining a level of control and visibility over what corporate data can and cannot be shared with third-party cloud apps.
Posted: 01 Dec 2015 | Published: 22 Sep 2015

IBM

Transcript: Continuous Testing: How to streamline Citrix Performance, Regression, and Security Testing
sponsored by Citrix and NRG Global
TRANSCRIPT: This transcript reveals how you can use a continuous testing strategy to incorporate any alterations into your environment quickly and with confidence.
Posted: 01 Dec 2015 | Published: 01 Dec 2015

Citrix and NRG Global

Securing 35,000 Mobile Devices
sponsored by Skycure
CASE STUDY: In this case study, learn how New York Life, an insurance company with over 35,000 mobile devices in use by employees, closed vulnerability gaps.
Posted: 01 Dec 2015 | Published: 11 Nov 2015

Skycure

Advanced Threat Protection Strategies for your Network
sponsored by Symantec Corporation
DATA SHEET: This data sheet offers strategies for uncovering veiled threats that infiltrate organizations by leveraging your network protocols. Access now to find out how you can expose these attacks and optimize network security.
Posted: 30 Nov 2015 | Published: 30 Nov 2015

Symantec Corporation

Battling Security Threats from Within your Organization
sponsored by IBM
WHITE PAPER: Access this report to discover how employees and other business partners may be taking advantage of your data. Read on and learn mitigation techniques for threats within the enterprise.
Posted: 30 Nov 2015 | Published: 30 Jun 2015

IBM

Next-Gen SIEM: 5 Ways to Faster, Better Data Center Monitoring
sponsored by AccelOps Inc.
WHITE PAPER: This white paper presents a 5 step strategy to discover and mitigate threats faster while reducing IT monitoring complexity.
Posted: 30 Nov 2015 | Published: 30 Nov 2012

AccelOps Inc.

Advanced Visual Analytics for the Modern Data Center
sponsored by AccelOps Inc.
WHITE PAPER: In this white paper, learn how to detect trends and threats in your network and data center through enhanced visibility.
Posted: 30 Nov 2015 | Published: 31 Dec 2014

AccelOps Inc.

Buyer's Guide: Network Monitoring Tools
sponsored by TechTarget
RESOURCE: In this complimentary e-guide, learn more about monitoring tools, how network monitoring works, and the difference between nice-to-have and need-to-have features in order to determine the best tool to monitor your network's performance.
Posted: 30 Nov 2015 | Published: 30 Nov 2015

TechTarget

Combine Your Detection and Prevention Defenses for a Secure Network
sponsored by TechTarget
RESOURCE: In this complimentary e-guide, learn what IDS and IPS can do, the concrete benefits they offer companies of every size, and how you can evaluate and select the technology that will effectively block attacks while still complementing your existing security controls.
Posted: 30 Nov 2015 | Published: 30 Nov 2015

TechTarget

Secure Your Network: Best Practices for Battling Security Threats
sponsored by TechTarget
RESOURCE: Our new e-guide, How to Overcome Top Network Security Obstacles, shares best practices and information on the latest tools available, so that you can make an informed decision and achieve the best possible network security.
Posted: 30 Nov 2015 | Published: 30 Nov 2015

TechTarget

Strategies for Advanced Threat Protection
sponsored by Symantec Corporation
WHITE PAPER: In this data sheet, you'll find a new strategy designed to uncover, prioritize, and remediate advanced attacks across all your endpoints. Access now and learn how to search for, discover, and remediate any attack artifacts across all of your endpoint systems.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Symantec Corporation

How to Provide Accelerated Triage for Cisco UC/Jabber
sponsored by NetScout Systems, Inc.
PRODUCT OVERVIEW: In this brief resource, you will learn how to improve your UC service delivery and IT collaboration with a UC server, complete with real-time call quality performance monitoring. Discover how to quickly resolve service quality issues with proactive application and network analyses and service quality alerts.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

NetScout Systems, Inc.

Security Intelligence for the Modern Data Center
sponsored by AccelOps Inc.
WHITE PAPER: Organizations need an intelligent approach to understand data and proactively detect security threats and anomalies. In this white paper, learn how to consolidate security, performance, and compliance monitoring into a single pane of glass to improve protection across environments
Posted: 17 Nov 2015 | Published: 03 Nov 2015

AccelOps Inc.

Unknown Malware - What You Can't See Can Hurt You
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This infographic provides some essential statistics on the rise of unknown malware and gives advice for defeating it. Discover how you can fight the unknown and keep your organization secure.
Posted: 17 Nov 2015 | Published: 31 Dec 2014

Check Point Software Technologies Ltd.
126 - 150 of 1291 Matches Previous Page    4 5 6 7 8 9    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement