IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
126 - 150 of 1602 Matches Previous Page  |  Next Page
Join the Citrix Ready Secure Remote Access Program
sponsored by Citrix Ready
WEBCAST: What is Citrix Ready Secure Remote Access Program? How does it help you showcase your products and solutions while highlighting the integration with Citrix products? This video explains this program, why you should join, and how you and your customers will benefit its implementation.
Posted: 03 Aug 2016 | Premiered: Aug 9, 2016

Citrix Ready

Software-Defined Network Security: A 'No-Touch' Approach
sponsored by VMware
EGUIDE: Despite its difficult-to-define nature, SDN security is an achievable goal if you can extend SDN's role beyond enhanced network capability. But to do this, a new touchless configuration policy may be necessary. In this expert e-guide, we discuss what it takes to make this "no-touch" approach a reality.
Posted: 02 Aug 2016 | Published: 01 Aug 2016

VMware

Microsegmentation Strategies for Smarter Security
sponsored by VMware
EGUIDE: In this expert e-guide, we discuss the potential benefits of the microsegmentation approach to virtual networking. Discover why this security method is driving deployment momentum across enterprises and find out what questions you should be asking before you get started on your own transformation.
Posted: 02 Aug 2016 | Published: 01 Aug 2016

VMware

Discover the Keys to Fast App Deployment
sponsored by BT
DATA SHEET: Do your IT professionals find themselves bogged down in an endless cycle of configuration, testing and local rollout? Learn how to increase your agility, and save your IT managers the endless hassle of manual deployment with cloud-based app automation. Download this paper now to get SLA-assured availability and security.
Posted: 02 Aug 2016 | Published: 31 Dec 2014

BT

The Cloud of Clouds: How to Take Advantage of a Cloud Services Integrator
sponsored by BT
VIDEO: 58% of large businesses cited cloud as driving profound change for their organizations, but are lingering doubts stopping you from joining the masses? Tune into this video to learn about a cloud services integrator that can connect you easily and securely to the applications and data you need—all on a global scale.
Posted: 02 Aug 2016 | Premiered: 10 May 2016

BT

Guide to Making The Cloud Secure
sponsored by BT
WHITE PAPER: Discover the threats every cloud user potentially faces, introductions to advanced security measures to counteract them, and the policies and procedures to help you safeguard your valuable information. You'll also find tips to facilitate the responsibility you must necessarily take for the protection of your own data.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

BT

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report
sponsored by IBM
WHITE PAPER: Discover how to formulate your own new endpoint protection strategy based around these ever changing endpoint devices. See how other organization are protecting their evolving perimeter and learn statistics from the SANS 2016 Endpoint Security Survey that will help you create your long-term endpoint management strategy.
Posted: 27 Jul 2016 | Published: 01 Mar 2016

IBM

Time to Toughen Up for IoT
sponsored by SearchSecurity.com
EBOOK: This 3-part guide is filled with best practices for Internet-enabled device security, looking at such things as raising awareness of potential security threats wrought by IoT and how to test your defenses in the IoT era.
Posted: 26 Jul 2016 | Published: 20 Jul 2016

SearchSecurity.com

How Industry Collaboration Mitigates Cybersecurity Risks
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Case Study: Proactively Protect and Secure the IT Environment
sponsored by LogicNow
CASE STUDY: Discover how Pearl Drums U.S. was able to get the antivirus, patch management, and automated monitoring they needed to keep their organization running efficiently. Learn how they gained insight into their network and now proactively protect and secure their IT environment with minimal IT resources.
Posted: 21 Jul 2016 | Published: 01 Jun 2016

LogicNow

Behavioral threat analytics
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This school examines the kinds of products that fit into the real-time behavioral threat analytics approach to security and what we know so far about deploying them successfully.
Posted: 20 Jul 2016 | Premiered: 15 Jul 2016

SearchSecurity.com

The 7 Components of a Profitable Network Service
sponsored by eTECH Channel
RESOURCE: Discover in this white paper how to deliver a profitable network service by integrating the 7 components critical to truly successful network management.
Posted: 15 Jul 2016 | Published: 15 Jul 2016

eTECH Channel

API-Based Threat Detection and Automated Remediation for SaaS and IaaS
sponsored by Palerra Inc.
RESOURCE: Discover how to use application programming interfaces (APIs) to connect into cloud services, rather than a traditional proxy, providing a myriad of benefits.
Posted: 12 Jul 2016 | Published: 19 Aug 2015

Palerra Inc.

The Top Five Security Threats to Your Business
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Cyber security breaches are more common now than they have ever been. And the risks they present are all serious. This infographic details the top five security threats to your business and highlights a network-based security solution that protects against them.
Posted: 08 Jul 2016 | Published: 30 Jun 2016

Level 3 Communications, Inc.

Network Security Playbook Guide
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Successful enterprises deal with network security threats quickly and efficiently by relying on network security playbooks. Access this white paper that explains how to build your playbook and highlights a security platform that can be crucial to your network security.
Posted: 08 Jul 2016 | Published: 01 Jun 2016

Level 3 Communications, Inc.

Network Based Security Infographic
sponsored by Level 3 Communications, Inc.
RESOURCE: To stop network threats, you first have to see them coming. Access this infographic that explains how implementing a network-based security platform, that provides full protection by wrapping your data, applications and infrastructure in a continuous cycle of protection, stops even the most sophisticated attacks.
Posted: 08 Jul 2016 | Published: 01 Jun 2016

Level 3 Communications, Inc.

Reducing Costs with the Right Cloud Connection
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Failing to choose a cost-effective network connection can leave you with poor performance that heavily impacts your use of cloud services. Access this white paper that explains how a cloud connection solution guarantees network security and performance for your business.
Posted: 07 Jul 2016 | Published: 31 Dec 2014

Level 3 Communications, Inc.

10 Reasons You’re Ready for a Managed Cloud
sponsored by Armor
WHITE PAPER: There are many managed cloud services available, but only a small subset of those emphasize security and are, therefore, secure managed cloud services. Access this white paper that details 10 reasons your business is ready to employ a secure managed cloud service.
Posted: 07 Jul 2016 | Published: 01 Jun 2016

Armor

PSA Buyer's Guide
sponsored by Autotask Corporation
WHITE PAPER: In this buyer's guide you'll discover a step-by-step process for technology service providers to compete in one of the fastest and most disruptive business environments in the industry.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

Autotask Corporation

Improve Remote Monitoring and Management
sponsored by Autotask Corporation
WHITE PAPER: Discover 5 business advantages that can be obtained when addressing a solution towards remote monitoring and management (RMM) including policy-based management and support, superior cloud-based services, and more.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

Autotask Corporation

Healthcare CIOs Address Cybersecurity Vulnerabilities
sponsored by Optum
EGUIDE: As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum

Is UTM Ready for the Big Leagues?
sponsored by SearchSecurity.com
EBOOK: This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

SearchSecurity.com

Is UTM Ready for the Big Leagues?
sponsored by SearchSecurity.com
EBOOK: This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.
Posted: 11 Jul 2016 | Published: 10 Jul 2014

SearchSecurity.com

The Cost of Change: A Network Perspective on How Rigidity Limits Agility
sponsored by Avaya TSG
ANALYST REPORT: For most organizations, the network is now the single biggest inhibitor to achieving business agility. Access this exclusive report to examine the challenges associated with achieving total network agility, and in it, Zeus Kerravala of ZK Research demonstrates the challenge with legacy change management models.
Posted: 06 Jul 2016 | Published: 30 Apr 2015

Avaya TSG
126 - 150 of 1602 Matches Previous Page    4 5 6 7 8 9    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement