IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
126 - 150 of 1546 Matches Previous Page  |  Next Page
The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure
sponsored by Google Cloud
WHITE PAPER: Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Google Cloud

Metrics for Success: How does your UC&C stack up?
sponsored by Vyopta
RESOURCE: In this resource, find out how your UC&C strategies compare to competitors and learn how to leverage key performance indicators (KPIs) to bring your monitoring, voice, video, and messaging tools into a single view to track your success.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Vyopta

Driving Voice and Video Usage with Skype for Business
sponsored by Vyopta
RESOURCE: In this resource, learn how to make the transition to new UC strategies - like Skype for Business - without impacting security and customer satisfaction.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Vyopta

Intro to UCaaS: Creating Engaging Experiences in the Digital Workplace
sponsored by Windstream Communications
RESOURCE: In this resource, learn the fundamentals of UCaaS, how to make the switch, and what you qualities you should consider when choosing a UCaaS provider.
Posted: 25 Sep 2017 | Published: 26 Jul 2017

Windstream Communications

Leaving the Traditional Network WANosaurus Behind with SD-WAN
sponsored by Windstream Communications
WHITE PAPER: The biggest challenge for current WAN networks is the cloud. Explore this white paper to learn how SD-WAN technology provides its users with the flexibility to add/change bandwidth in near real-time, while enhancing security and user experience.
Posted: 22 Sep 2017 | Published: 01 Aug 2017

Windstream Communications

Cloud Security Report
sponsored by Alert Logic
RESEARCH CONTENT: According to this Cloud Security report, application attacks account for 75% of verified security incidents beating out brute force attacks, DDoS and more. In this research report, explore an overview of these different types of attacks and how attackers choose their targets.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Alert Logic

Transitioning from Traditional IT to a Secure Cloud
sponsored by Alert Logic
CASE STUDY: This case study explores how Wilbur-Ellis transformed their network infrastructure and the immediate benefits received from leveraging an Amazon Web Services (AWS) cloud platform and security-as-a-service (SaaS) provider.
Posted: 22 Sep 2017 | Published: 31 Dec 2015

Alert Logic

Interconnection: Fueling the Explosion of the Digital Economy
sponsored by Equinix
RESOURCE: In this resource, learn how your bandwidth compares to others with the help of the Global Interconnection Index. Recognize the trends, insights, and projections.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Equinix

Remote Access Redefined: Managing the Rise of Third-Party Users
sponsored by Akamai Technologies
WHITE PAPER: This white paper discusses the need for new access models that establish next-generation firewalls (NGFW) to manage the rise of third-party users while meeting security and usability demands.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

Akamai Technologies

Security Analytics: Putting Together an Effective Incident Response Plan
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, learn how to create and implement an effective incident response plan to detect security breaches and react before attacks wreak havoc on your network and reputation.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Cisco Systems, Inc.

Modernize your Network to Digitize your Business
sponsored by Aruba Networks
RESOURCE CENTER: In this article, learn how the changing network infrastructure and increase of IoT devices motivates organizations to implement new technologies like automation to boost capacity, reliability, and security.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Aruba Networks

IHS Technology: Network Monitoring Equipment
sponsored by Gigamon
WHITE PAPER: In this report, gain a stronger understanding of the top tools on the network monitoring market to help improve overall security and reliability.
Posted: 20 Sep 2017 | Published: 19 May 2017

Gigamon

Disrupt the Machine-to-Human Fight with a New Defender Lifecycle Model in Security Operations
sponsored by Gigamon
WHITE PAPER: In this white paper, learn how Gigamon's security delivery platform combats breaches and cyberattacks by integrating machine learning, artificial intelligence (AI) and security workflow automation.
Posted: 20 Sep 2017 | Published: 31 Jul 2017

Gigamon

Aruba Clearpass Network Access Control
sponsored by Aruba Networks
WHITE PAPER: In this white paper, learn how mobility and IoT are changing how organizations approach network access control (NAC) and how switching to security tools like Aruba Clearpass can help detect threats before damage occurs.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

Aruba Asset Tracking
sponsored by Aruba Networks
RESOURCE: In this resource, uncover the benefits of using real-time location systems (RTLS) to locate your assets to improve productivity in the workplace.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

Global Interconnection Index
sponsored by Equinix
WHITE PAPER: Evolving business models are placing more importance on real-time engagement, requiring you to scale your digital platforms or risk failing. Access this white paper to learn about a network infrastructure that gives your the power to transfer the entire printed content in the U.S. Library of Congress three times over in one second.
Posted: 18 Sep 2017 | Published: 31 Aug 2017

Equinix

Aruba Campus Switching: The Foundation for the Modern Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: In this white paper, learn the key benefits of different types of campus switching tools to prepare your network infrastructure for the increase of doing business on mobile.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

The Total Economic Impact Of xMatters
sponsored by xMatters, Inc.
RESEARCH CONTENT: In this research report, Forrester Consulting shares the ROI from organizations that used xMatters as their communications and notifications platform.
Posted: 15 Sep 2017 | Published: 31 Jan 2017

xMatters, Inc.

Five Risk Points To Avoid In Enterprise Security
sponsored by Microsoft
RESOURCE: In this white paper, guide yourself through the 5 step course to detect and prevent advance cyberattacks.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Microsoft

Microsoft Windows Defender Advanced Threat Protection Examined
sponsored by Microsoft
RESEARCH CONTENT: In this Forrester Research Report, learn how, by switching to the Windows Defender Advanced Threat Protection software, 4 businesses in the energy, automotive, food and beverage, and IT industries were able to improve productivity, reduce risk, and more.
Posted: 15 Sep 2017 | Published: 31 Jul 2017

Microsoft

Guide to Early Application Testing and Understanding Dev and Ops Responsibilities
sponsored by IBM
EGUIDE: Explore the importance of early application security testing. Learn from Owen Garrett, Head of Products for NGINX Inc., while he explains the security risks with containers and developing microservices.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

How to Think like a Hacker to Stop Application Security Threats
sponsored by IBM
EGUIDE: Find out how applying the hacker mindset when setting application security standards can help uncover flaws that vulnerability scanners might not recognize.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

How to Secure Mobile Applications in a Private Cloud
sponsored by IBM
EGUIDE: In this expert e-guide, uncover the benefits and challenges of creating a private app store to control and monitor the delivery of properly secured mobile applications.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

How to Boost Mobile Application Security
sponsored by IBM
EGUIDE: In this expert e-guide, discover ways to boost mobile application security by performing regular assessments to help eliminate an enterprise's vulnerability to data breaches and attacks.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

How to Build an Enterprise Application Security Program
sponsored by IBM
EGUIDE: In this e-guide, learn the key steps to building an enterprise application security program to decrease exposure to potential attackers through statics and dynamic application testing.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

IBM
126 - 150 of 1546 Matches Previous Page    4 5 6 7 8 9    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement