IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
151 - 175 of 1271 Matches Previous Page  |  Next Page
The Printer Playbook: Strategy and Insight for the Enterprise
sponsored by Hewlett-Packard Company
WHITE PAPER: This Printer Playbook explains why printer security should be part of your overall information technology strategy. It offers suggestions and resources to help businesses begin securing their networks.
Posted: 04 May 2015 | Published: 04 May 2015

Hewlett-Packard Company

Red Tiger Security: Printer and Embedded Device Security
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this Red Tiger Security Paper, Printer and Embedded Device Security, and see where and how bad guys exploit print devices—and the measures you can take to stop them.
Posted: 04 May 2015 | Published: 07 Apr 2015

Hewlett-Packard Company

HP Secure Print Analysis Tool
sponsored by Hewlett-Packard Company
ASSESSMENT TOOL: Focus your print security strategy with the HP Secure Print Analysis tool. This quick assessment of your current print security infrastructure will tell you where to strengthen print security, using best practices in mobile print security, printer hard drive encryption, fleet management, and more.
Posted: 04 May 2015 | Published: 04 May 2015

Hewlett-Packard Company

Information Security Magazine – May 2015 Issue
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we study perimeter network security in the mobile and cloud era, and strategies to secure access from application-layer protection to single sign-on technologies.
Posted: 01 May 2015 | Published: 30 Apr 2015

SearchSecurity.com

Viruses in the Queue: IT Pros Share Their Experiences Combating Printer Security Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, hear firsthand experience from three different IT pros who found out the hard way about document and network security—it only takes one unprotected printer to create major, long-lasting headaches.
Posted: 01 May 2015 | Published: 01 May 2015

Hewlett-Packard Company

Intralinks® Information Rights Management
sponsored by IntraLinks, Inc
DATA SHEET: Access this data sheet to learn about an Information Rights Management tool that can secure your content.
Posted: 30 Apr 2015 | Published: 31 Dec 2014

IntraLinks, Inc

Mobile Device Management for Education
sponsored by IBM
WHITE PAPER: Access this white paper now and learn how mobility and BYOD strategies in all levels of education can make school districts and organizations more cost-effective with the right device and app management solution.
Posted: 29 Apr 2015 | Published: 26 Dec 2014

IBM

Transform Network Infrastructure and Accelerate Your Profitability
sponsored by Hewlett-Packard Company
PODCAST: This podcast reveals the best ways to use SDN to improve the performance of your campus networks.
Posted: 28 Apr 2015 | Premiered: Apr 20, 2015

Hewlett-Packard Company

Hyper-Connected Enterprise Infrastructure
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, you'll learn about a mobile-first IT infrastructure approach that enables employees to use powerful apps on any device.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Hewlett-Packard Company

Mobile Device Management for Everyone
sponsored by IBM
WHITE PAPER: Access this white paper now to learn how your company can implement a secure mobile strategy that won't cause headaches for your IT department to manage.
Posted: 27 Apr 2015 | Published: 26 Dec 2014

IBM

Transforming Your Customer‘s Infrastructure and Accelerating Your Profitability with Converged Networking
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this white paper now to discover the best ways to use software defined networking (SDN) to handle security threats and device management at a fraction of the cost and without any headache.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Hewlett-Packard Company

SSL Certificates: The Return of the DSA Algorithm
sponsored by Symantec Corporation
WHITE PAPER: This white paper explores the shortcoming of the RSA algorithm and how the Digital Signature Algorithm (DSA) developed in 1991 is making a return in a big way to trip up cybercriminals.
Posted: 24 Apr 2015 | Published: 05 Feb 2014

Symantec Corporation

It's Time to Identify and Confront Today's Data Center Security Challenges
sponsored by VMware
WHITE PAPER: In this white paper, you will learn how to detect, isolate, and block dynamic threats with a granular security approach from inside your data center. Access now to learn why network security is a good start and how to enhance it.
Posted: 23 Apr 2015 | Published: 29 Dec 2014

VMware

Extend Security and Control from the Data Center Edge to the core
sponsored by VMware
WHITE PAPER: This white paper explores how to enable comprehensive data center security through network virtualization. Access now to learn how to overcome the three major issues with traditional network security and how to defend your data center from within.
Posted: 21 Apr 2015 | Published: 04 Mar 2015

VMware

Market Study: 7 Security Forensics Platforms
sponsored by IBM
WHITE PAPER: In this research report, find detailed reviews and ratings for seven leading security forensics platforms.
Posted: 21 Apr 2015 | Published: 31 Jul 2014

IBM

Advancing Cyber-security Measures from the Inside
sponsored by VMware
RESOURCE: This infographic teaches you how to secure your network and data center from the inside and add to your perimeter defenses.
Posted: 20 Apr 2015 | Published: 11 Dec 2014

VMware

Comprehensive Data Protection Against Insider & Outsider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explores how you can implement data protection that travels with your data regardless of location or device.
Posted: 14 Apr 2015 | Published: 25 Mar 2015

Digital Guardian

5 Key Design Principles for Security Professionals
sponsored by Gigamon
WHITE PAPER: You know that the loss of a single device or power source could jeopardize network connectivity and your business. In this white paper, you will discover one powerful solution that can leverage traffic visibility and an intrusion protection system for continuous monitoring of the network.
Posted: 14 Apr 2015 | Published: 26 Sep 2014

Gigamon

Network Monitoring: Leveraging Traffic Visibility and IPS
sponsored by Gigamon
WHITE PAPER: You know that the loss of a single device or power source could jeopardize network connectivity and your business. In this white paper, you will discover one powerful solution that can leverage traffic visibility and an intrusion protection system for continuous monitoring of the network.
Posted: 14 Apr 2015 | Published: 26 Dec 2014

Gigamon

Eliminating Virtual Network Security Blindspots
sponsored by Gigamon
WHITE PAPER: This white paper examines a holistic security approach using NPM, DLP, and SSL decryption to mitigate malware threats on virtualized networks. View now to learn more.
Posted: 13 Apr 2015 | Published: 29 Oct 2014

Gigamon

5 Steps to SSL Decryption
sponsored by Gigamon
WHITE PAPER: This white paper explores an alternative, five step SSL decryption strategy.  View now to learn more
Posted: 13 Apr 2015 | Published: 15 Oct 2014

Gigamon

Case Study: A New Approach to Network Monitoring and Security
sponsored by Gigamon
VIDEO: This case study introduces a new security approach used by the University of Glasgow, a renowned academic institution, which improves network visibility and security without adding on expensive appliances. View now to learn how to detect and remedy infected endpoints, among other solutions.
Posted: 13 Apr 2015 | Premiered: 25 Feb 2015

Gigamon

Don’t let crime rule your network – building an efficient cyber crime strategy
sponsored by Hewlett-Packard Limited
WHITE PAPER: Featuring input from expert analysts with years of experience, this white paper presents a series of guidelines for creating security that can survive the modern threat landscape.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

Hewlett-Packard Limited

Online Retailers: Get Specific When Defending Against Price-Scraping Bots
sponsored by Distil Networks
WHITE PAPER: This white paper explains the fine print details about bots and strategies to mitigate them. Access now to learn more.
Posted: 10 Apr 2015 | Published: 11 Mar 2015

Distil Networks

Data Companies vs. Bots: Bot types and their impact on online data companies
sponsored by Distil Networks
WHITE PAPER: This white paper discusses the need for real-time identification and protection against scraping bots and examines a new approach to mitigate them.
Posted: 10 Apr 2015 | Published: 04 Feb 2015

Distil Networks
151 - 175 of 1271 Matches Previous Page    5 6 7 8 9 10    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement