IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
151 - 175 of 1539 Matches Previous Page  |  Next Page
Reliable Wi-Fi for uninterrupted clinical care
sponsored by Fortinet, Inc.
RESOURCE: The mobile revolution and IoT are bringing about an explosion of devices on healthcare networks. With Wi-Fi now at the heart of patient care, learn from the healthcare industry and discover how they achieved a secure wireless solution that performs flawlessly on the array of devices they rely on every day.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Fortinet, Inc.

Secure Access for Retail
sponsored by Fortinet, Inc.
RESOURCE: The wireless network must become a springboard to exploit new technologies without adding to the security risks. This resource highlights how the retail industry can offer Wi-Fi internet to their customers without fear of security failures.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Fortinet, Inc.

Solution Guide
sponsored by Fortinet, Inc.
RESOURCE: Learn the features of a tool which will work to secure your network, even as IT security becomes more complicated and vulnerable. By recognizing the danger presented by wireless networking, you can effectively prepare for the modern explosion of network connected wireless devices.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Fortinet, Inc.

Achieve secure wireless networking in the classroom
sponsored by Fortinet, Inc.
RESOURCE: Affordable laptops and tablets in the classroom plus ubiquitous Wi-Fi can turn the dream of one-to-one computing into reality, but not without challenges in security and application control. Access this resource now to learn how you can support BYOD, guard against malicious attacks, malware and viruses, and completely control application usage.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Fortinet, Inc.

How to combine WLAN control and network security
sponsored by Fortinet, Inc.
PRODUCT LITERATURE: This deployment guide shows how to unify the management of wired and wireless infrastructure and security on to one platform and negate the need for multiple separate appliances.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Fortinet, Inc.

Firewall Technology Evolves with Borderless Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: Fortunately, we're entering into a new era of firewall technology for your modern, borderless network. Discover how to consolidate network security across your entire threat surface, thus increasing security effectiveness and reducing complexity. Gain central visibility and control of your network, managed through a single pane of glass.
Posted: 11 Aug 2016 | Published: 01 Jul 2016

Fortinet, Inc.

Implement secure, high-speed Wi-Fi for large public venues
sponsored by Fortinet, Inc.
RESOURCE: Find out how you can implement fast, secure Wi-Fi, even in unusual and demanding environments. Access now to learn how to confront challenges of scaling, performance, and vulnerability in large buildings.
Posted: 09 Aug 2016 | Published: 09 Aug 2016

Fortinet, Inc.

Mobility management 101: What you need to know
sponsored by IBM MaaS360
WEBCAST: Today, employees are using their devices to access corporate data and using company devices to access personal data. This usage presents new security risks that call for an integrated, comprehensive policy for managing mobile devices. View this webinar that discusses the mobile workplace and how to construct an effective and secure mobile policy.
Posted: 09 Aug 2016 | Premiered: Jun 30, 2016

IBM MaaS360

Common Hyper-Converged Network Concerns and Solutions
sponsored by NTT ICT
EGUIDE: Do your apps require either very high or very specific performance? Discover in this expert guide how to identify and resolve hyper-converged networking bottlenecks by implementing a dedicated storage network and examining how data is stored within your architecture.
Posted: 09 Aug 2016 | Published: 09 Aug 2016

NTT ICT

Protecting mobile devices - Best practices
sponsored by IBM MaaS360
WEBCAST: Expectations for mobile access to corporate data have never been greater. But, how do you enable your company with mobility and ensure security? View this webcast that details mobile security challenges and how to best prepare for them with a complete mobile strategy.
Posted: 09 Aug 2016 | Premiered: May 31, 2016

IBM MaaS360

Why Micro-Segmentation Matters Now
sponsored by VMware
WHITE PAPER: Cybercriminals count on the fact that data center security is still based on a penetrable, hardware-centric model. Access this white paper to learn how the advent of network virtualization empowered by micro-segmentation changes the economics, ease and speed of data center security, eliminating long-standing vulnerabilities.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

VMware

A New Approach to Data Center Security
sponsored by VMware
WHITE PAPER: The persistent threats and coordinated attacks in today's environment call for a new model of data center security. But how do you implement this new model without incurring huge hardware and firewall costs? Access this white paper to learn how micro-segmentation empowered by a network virtualization platform delivers fine-grained security.
Posted: 05 Aug 2016 | Published: 01 Jul 2016

VMware

Network Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: This resource discusses access layer protection in enterprise WLANs, and why deploying ad hoc security is no longer enough to protect against threats in the IoT era. Further, you'll learn how secure access architecture gives enterprise networks the end-to-end protection needed to defend the enterprise in the future.
Posted: 05 Aug 2016 | Published: 05 Aug 2016

Fortinet, Inc.

Software-Defined Network Security: A 'No-Touch' Approach
sponsored by VMware
EGUIDE: Despite its difficult-to-define nature, SDN security is an achievable goal if you can extend SDN's role beyond enhanced network capability. But to do this, a new touchless configuration policy may be necessary. In this expert e-guide, we discuss what it takes to make this "no-touch" approach a reality.
Posted: 02 Aug 2016 | Published: 01 Aug 2016

VMware

Microsegmentation Strategies for Smarter Security
sponsored by VMware
EGUIDE: In this expert e-guide, we discuss the potential benefits of the microsegmentation approach to virtual networking. Discover why this security method is driving deployment momentum across enterprises and find out what questions you should be asking before you get started on your own transformation.
Posted: 02 Aug 2016 | Published: 01 Aug 2016

VMware

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report
sponsored by IBM
WHITE PAPER: Discover how to formulate your own new endpoint protection strategy based around these ever changing endpoint devices. See how other organization are protecting their evolving perimeter and learn statistics from the SANS 2016 Endpoint Security Survey that will help you create your long-term endpoint management strategy.
Posted: 27 Jul 2016 | Published: 01 Mar 2016

IBM

Time to Toughen Up for IoT
sponsored by SearchSecurity.com
EBOOK: This 3-part guide is filled with best practices for Internet-enabled device security, looking at such things as raising awareness of potential security threats wrought by IoT and how to test your defenses in the IoT era.
Posted: 26 Jul 2016 | Published: 20 Jul 2016

SearchSecurity.com

How Industry Collaboration Mitigates Cybersecurity Risks
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Case Study: Protect Your Network with Enhanced Visibility
sponsored by LogicNow
CASE STUDY: Discover how Pearl Drums U.S. was able to get the antivirus, patch management, and automated monitoring they needed to keep their organization running efficiently. Learn how they gained insight into their network and now proactively protect and secure their IT environment with minimal IT resources.
Posted: 21 Jul 2016 | Published: 01 Jun 2016

LogicNow

Behavioral threat analytics
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This school examines the kinds of products that fit into the real-time behavioral threat analytics approach to security and what we know so far about deploying them successfully.
Posted: 20 Jul 2016 | Premiered: 15 Jul 2016

SearchSecurity.com

How to Handle the IoT from the Data Center to Security
sponsored by Xively by LogMeIn
EGUIDE: In this e-guide, learn how experts ensure IoT devices can stand up to the scope of modern security challenges, and what IT pros are doing to help the data center support IoT data from numerous sources.
Posted: 10 Aug 2016 | Published: 08 Aug 2016

Xively by LogMeIn

Enterprise Mobility: How Mobile Device Management Exploded to Include Devices, Apps and Content
sponsored by IBM MaaS360
WHITE PAPER: Today, nearly every enterprise works with mobile devices, but few know how to maximize their potential. So, how do you turn mobility into a valued asset? Access this white paper to learn about workplace mobility and how to successfully implement a unified mobile policy.
Posted: 09 Aug 2016 | Published: 31 Mar 2016

IBM MaaS360

The Threat Defense Lifecycle: Intelligent Endpoint Threat Defense
sponsored by Intel Security
WHITE PAPER: Adopt a threat defense lifecycle that will allow you to discover threats faster, respond quicker and overall outsmart attackers, driving business efficiency forward. Learn how to then apply these insights to an automated policy that can block similar attack attempts up front.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

Healthcare CIOs Address Cybersecurity Vulnerabilities
sponsored by Optum
EGUIDE: As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum
151 - 175 of 1539 Matches Previous Page    5 6 7 8 9 10    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement