IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
126 - 150 of 1551 Matches Previous Page  |  Next Page
Networking Cloud Computing is Open (Source) for Business (Model)
sponsored by Juniper Networks, Inc.
EGUIDE: Open source cloud infrastructure tools are cost-effective and highly extensible, but they also pose network and other challenges. Access this e-guide to get an expert's take on five common user issues with open source cloud infrastructure tools, and how solution providers can take the first steps toward a cloud business model.
Posted: 03 May 2016 | Published: 28 Apr 2016

Juniper Networks, Inc.

Brasfield and Gorrie builds productivity and security with paperless collaboration
sponsored by Citrix
MICROSITE: Mobility is becoming the business norm and requirement from employees. This resource highlights a solution that allows employees to collaborate, share files and data remotely without hindering security or taking visibility and control from IT.
Posted: 03 May 2016 | Published: 31 Dec 2013

Citrix

Is Your Network Too Flat? Prevent Data Breaches with Segmentation
sponsored by SearchSecurity.com
EZINE: Networks lacking proper network segmentation allow attackers to easily move around the network, turning a minor problem into a major disaster for security managers. In this issue of Information Security, learn about segmentation strategies that can improve your network security infrastructure.
Posted: 02 May 2016 | Published: 02 May 2016

SearchSecurity.com

Internal Segmentation Firewall Deployment Guide
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper presents both a design approach as well as a reference architecture for implementing an firewall strategy for your enterprise.
Posted: 02 May 2016 | Published: 31 Dec 2015

Fortinet, Inc.

The Total Economic Impact Of Forcepoint's SureView Insider Threat
sponsored by Forcepoint
WHITE PAPER: This Forrester report shows you an appliance-based security system that monitors and investigates internal threats across all endpoints and channel communications. View not and learn how you can gain visibility that other network devices cannot.
Posted: 02 May 2016 | Published: 01 Oct 2014

Forcepoint

Virtualization Best Practices Guide
sponsored by Kaspersky Lab
WHITE PAPER: This white paper shows you how to best protect your virtual desktops through a wide range of Windows-based environments. Access now and learn how to get file-level anti-malware protection, network-level protection and cloud-assisted, real time threat data and the best security approach for your organization's needs.
Posted: 02 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

Expertise from Authorized Professional Services Providers, Available On-Demand
sponsored by Juniper Networks, Inc.
WHITE PAPER: Do you have a network project but no expertise on staff? Access this brochure to find available services for your network that are simple and fast, from posting your project to instant connection with the perfect partner and/or service provider that best suits your project goals and budget.
Posted: 02 May 2016 | Published: 02 May 2016

Juniper Networks, Inc.

GLOBAL BANK REDUCES SECURITY RISKS & REAPS COST BENEFITS OF OPEN SOURCE
sponsored by Black Duck Software
WHITE PAPER: This white paper shows you how to properly identify and implement OSS to fit your business' needs. Save time and money by automating the management of open source code from the point it enters your organization and through development.
Posted: 02 May 2016 | Published: 01 Apr 2016

Black Duck Software

What Is the Cost of One More Test?
sponsored by Ixia
WHITE PAPER: This white paper gives you up to date statistics on today's cyber threat landscape and shows you how you can get ahead with early prevention. Access now to see where other organizations failed and how you may better protect yourself against today's most dangerous attacks.
Posted: 02 May 2016 | Published: 01 Apr 2016

Ixia

Data Centers at the Edge
sponsored by Schneider Electric
WEBCAST: In this webcast, you will discover the benefits and boons of localized data centers on the network edge—paving the way for new capabilities deployed into the network. Tune in now to power the digitization of your business, and learn the different data center localization offers now available.
Posted: 02 May 2016 | Premiered: May 2, 2016

Schneider Electric

Unlocking Business Success: The Five Pillars of User Risk Mitigation
sponsored by Forcepoint
WHITE PAPER: This white paper shows you how to embrace a BYOD policy for your organizations and best practices for visibility into all user activity. Access now to gain a formidable defense against both malicious and unintentionally harmful insiders.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Forcepoint

Why extending Your VPN to the cloud will bring better performance and security
sponsored by AT&T
WHITE PAPER: As more applications get delivered through cloud models, IT must ensure maximum performance and availability. Why should you look to extend the capabilities of a VPN that is already in place? Learn the benefits of VPN-based connectivity for the cloud inside.
Posted: 29 Apr 2016 | Published: 20 Apr 2016

AT&T

Defend Against the Undetected
sponsored by Fortinet, Inc.
WHITE PAPER: Your network can no longer rely on perimeters with today's cybercriminals. You must have a comprehensive internal and external solution designed to protect your perimeter, your core, your endpoint and everything else in-between. Learn how you can effectively detect, prevent and remediate a threat before it succeeds.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Data Theft Prevention The Key to Security, Growth & Innovation
sponsored by Forcepoint
WHITE PAPER: This white paper shows you a holistic approach to protecting your critical data. Learn about cybersecurity from a Data Theft Prevention perspective, which is broader in scope and more effective in defending sensitive information.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Forcepoint

Maximize Efficiency by Simplifying Your Network Management
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover in this paper how to leverage a next-generation cloud infrastructure to deliver to your organization greater network agility, enabling you to capitalize on advances in virtualization. Access now and learn how to simplify your network management to achieve business goals.
Posted: 29 Apr 2016 | Published: 29 Apr 2016

Juniper Networks, Inc.

Six Steps To A Better Security Strategy
sponsored by AllClear ID
WHITE PAPER: In this white paper, you'll learn six steps to create an effective security strategy that's linked with key business interests for great success.
Posted: 29 Apr 2016 | Published: 22 Jan 2016

AllClear ID

Protecting_Against_APTs_minibook
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper helps you better understand the security challenges that businesses face today. Access now to learn insight from a range of industry analysts, consultants and hands-on experts on how they believe you should tackle your security problems.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Best Practices for Protecting Patient Data in the Cloud
sponsored by Digital Guardian
WHITE PAPER: Now that many healthcare organizations are using cloud computing to store and share sensitive patient information, they must figure out how to extend data loss prevention (DLP) strategies to include cloud storage. Discover best practices for applying DLP to the cloud.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Digital Guardian

Cyber Dwell Time and Lateral Movement
sponsored by Forcepoint
WHITE PAPER: Today's organizations should not only focus on keeping hackers out, but also remediating damages once a breach occurs. This white paper shows you how to best deal with cyber attackers once a breach happens and how to keep attackers afraid to come back.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Forcepoint

University of Texas at Austin Ensures Network Security for its Distributed Campus
sponsored by Splunk
WHITE PAPER: Access this brief case study to learn how one top-ranked state research university saw significant benefits when they implemented a tool that met the needs of network and information security analysis. Uncover the benefits they achieved by helping their analysts investigate security threats and incidents faster and more accurately.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Splunk

IDC-Analyst-Connection-ISFW
sponsored by Fortinet, Inc.
ANALYST REPORT: This report documents security questions and answers from Chris Christiansen, program vice president for IDC's Security Products and Services group. Access now to learn the latest on perimeter defense and how Christiansen believe organizations can better protect their increasing databases.
Posted: 28 Apr 2016 | Published: 01 Jul 2015

Fortinet, Inc.

Building An Effective Breach Detection And Response Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: This Forrester Research Inc. report shows you the benefits of implementing sandbox solutions to meet your security demands. Modern sandboxed are able to virtually replicate operating environments, execute suspicious code and observe behavior. Access now to best quell sophisticated attackers and prevent future ones.
Posted: 28 Apr 2016 | Published: 31 Oct 2015

Fortinet, Inc.

The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Proofpoint, Inc.

Get Ahead of Threats: Securing Your Network & Application Infrastructure
sponsored by Fortinet, Inc.
EBOOK: This e-book is a collection of 24 essays from industry leaders on a broad array of network security topics. Gain tips on how to build and execute your network security plan, stay ahead of hackers, and more.
Posted: 27 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Total Economic Impact of IBM Security Network Protection (XGS), Forrester Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This white paper examines the benefits you will realize by deploying next generation intrusion prevention. Access now to discover how next-gen IPS could impact your organization.
Posted: 27 Apr 2016 | Published: 01 Feb 2016

IBM
126 - 150 of 1551 Matches Previous Page    4 5 6 7 8 9    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement