IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
151 - 175 of 1440 Matches Previous Page  |  Next Page
The Modern Cybercriminal's Attempt to Stay Undetected
sponsored by Dell SecureWorks
WHITE PAPER: This short infographic gives you an in-depth look at the timeline of the average data breach from penetration to detection. Learn the game plan of a cybercriminal looking to steal your data and prepare a defensive scheme of your own to stop hackers in any phase of the breach lifecycle.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

Dell SecureWorks

Say Hello, Again, to SIEM
sponsored by SearchSecurity.com
EBOOK: SIEM products are ever-changing technologies. Here's what you need to know now about security information and event management tools.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

SearchSecurity.com

Securely Access Business Apps and Data with BYOD
sponsored by Citrix
VIDEO: A BYOD program can lower costs and improve productivity.But how do you ensure your BYOD program can meet IT security guidelines and allow workers remote access for secure end user computing?View this video that discusses one easy-to-install platform that gives your employees secure mobile access to all your virtual applications anytime, anywhere.
Posted: 31 Aug 2016 | Premiered: 19 Aug 2016

Citrix

SD-WAN Securely Delivers a Consistent User Experience
sponsored by Citrix
VIDEO: This short video shows a user maintaining security while demonstrating network performance despite deteriorating conditions. You'll see how an SD-WAN can make up for failures in your MPLS.
Posted: 30 Aug 2016 | Premiered: 19 Aug 2016

Citrix

Frost & Sullivan Best Practices Research: Network Security Forensics
sponsored by RSA
WHITE PAPER: This white paper shows you a comprehensive set of technologies for incident detection and network security forensics that will greatly improve you security posture. Learn how to achieve depth and real-time visibility into the inbound and outbound communications traversing your network.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

RSA

Manage Risk by Protecting Apps, Data and Usage
sponsored by Citrix
WHITE PAPER: When it comes to securing vulnerabilities, especially in apps, there are 5 best practices you can follow. This white paper provides and overview of how to ensure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Citrix

SIEM’s Total Cost of Ownership – Key Considerations
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover how to take a holistic view on SIEM platform capabilities and discover the impact SIEM can have on your security people and processes. Learn what factors to consider when assessing SIEM business practicality and total cost of ownership.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

The Evolution of SIEM: Why it is Critical to Move Beyond Just Logs for Fast Threat Detection
sponsored by RSA
WHITE PAPER: Discover how you can spot advanced threats that bypass preventative controls - ones that SIEM systems simply can't see. Gain greater visibility and security context to reconstruct events and attacker TTPs (Tactics, Techniques and Procedures) to stop the attackers before they compromise your enterprise.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

RSA

Security Analytics is the Cornerstone of Modern Detection and Response: A Forrester Consulting Paper
sponsored by RSA
WHITE PAPER: Within this white paper, read what Forrester Consulting discovered in their survey of 180 security professionals from countries around the world. Understand why mature organizations are moving to security analytics to mitigate today's advanced cyber threats and how SA can greatly improve your recognition of threat impacts.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

RSA

Info-Tech Research Group SIEM Vendor Landscape Report
sponsored by LogRhythm, Inc.
WHITE PAPER: In this Info-Tech research report, discover the effectiveness and simplicity SIEM can bring to threat management for your organization. Uncover pros and cons of leading SIEM products, insights on where the SIEM market is going, and more.
Posted: 22 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

Why DDoS Prevention Appliances are So Important Today
sponsored by Arbor Networks
WHITE PAPER: Discover a carefully curated set of key observations, backgrounds, and drivers of the DDoS prevention appliances market - giving an overall picture of how the DDoS landscape is changing. Learn how your enterprise can stay ahead of the curve and keep your network safe from these nefarious attacks.
Posted: 16 Aug 2016 | Published: 13 Jun 2016

Arbor Networks

Incident Response with NetFlow for Dummies
sponsored by Cisco Systems, Inc.
EBOOK: Security incidents are critical times for information security pros, with the time period after the first identifications having a big impact on the incident's severity. Access this e-book to learn how to align your incident response processes with industry-standard practices and how to enhance your technical capabilities.
Posted: 15 Aug 2016 | Published: 31 Dec 2014

Cisco Systems, Inc.

Five Essential Elements of Mobile Security
sponsored by vmware airwatch
WHITE PAPER: End users want access to data anytime, anywhere, but enterprise mobility creates increased opportunities for cyberattacks. In this trend brief, you'll review the essential elements of building a mobile security strategy. Access now to learn about ways to construct your strategy and protect data.
Posted: 15 Aug 2016 | Published: 29 Apr 2016

vmware airwatch

Cyber Security Trends ASEAN 2016
sponsored by ComputerWeekly.com
EGUIDE: As cyber security becomes a top priority for policy makers and IT leaders, this guide looks at some of the issues facing government and private sector organizations in South-East Asia.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

ComputerWeekly.com

Cyber Security Trends ANZ 2016
sponsored by ComputerWeekly.com
EGUIDE: As cyber security becomes a top priority for policy makers and IT leaders, this e-guide looks at some of the issues facing government and private sector organisations in Australia and New Zealand.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

ComputerWeekly.com

IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy
sponsored by Aruba Networks
EGUIDE: The Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.
Posted: 09 Sep 2016 | Published: 07 Sep 2016

Aruba Networks

Blended IT and Security Operations: Where's the Balance?
sponsored by ServiceNow
EGUIDE: Within this informative e-guide, you'll learn the benefits – and the risks – of integrating IT and security operations. Discover how you can leverage information collected from multiple data sources to get an accurate picture about the issues affecting both security and performance.
Posted: 07 Sep 2016 | Published: 31 Aug 2016

ServiceNow

Five Ways to Prevent a Ransomware Infection
sponsored by Dimension Data
EGUIDE: Access this e-guide for IT security expert Kevin Beaver's 5 ways that you can bolster your network security to prevent ransomware from infecting your enterprise systems.
Posted: 01 Sep 2016 | Published: 31 Aug 2016

Dimension Data

IT Needs to Change its Mindset Around Mobile Data Access
sponsored by Hewlett Packard - Intel Xeon
EGUIDE: To successfully support enterprise mobility, IT admins need to change the way they think about mobile data access, security, and more. This e-guide details four things to keep in mind as your enterprise embraces this mobile world.
Posted: 17 Aug 2016 | Published: 16 Aug 2016

Hewlett Packard - Intel Xeon

What You Need to Know When Choosing Between Office 2016 and Office 365
sponsored by SearchEnterpriseDesktop
EBOOK: Use this expert e-book to discover whether the local Office 2016 or cloud-based Office 365 is the right fit for your enterprise. Explore topics such as the different costs of each program, increased file encryption in Office 2016, and the system requirements that it takes to run each Office suite.
Posted: 16 Aug 2016 | Published: 16 Aug 2016

SearchEnterpriseDesktop

IT Battles the Top Three Mobile Security Threats
sponsored by Hewlett Packard - Intel Xeon
EGUIDE: Learn about 3 mobile security threats facing IT managers and security experts today. Access now to learn what best practices are being deployed to face the rapidly growing danger to your mobile devices.
Posted: 16 Aug 2016 | Published: 11 Aug 2016

Hewlett Packard - Intel Xeon

SD-WAN Helps Secure Hybrid Networks
sponsored by Citrix
EGUIDE: SD-WAN enables enterprises to create hybrid networks. But many network engineers eyeing hybrid WAN architectures are asking themselves the question: It can't be as safe as running on MPLS, right? Access this expert e-guide to learn about SD-WAN platforms' security features that finally make hybrid networks secure enough for widespread use.
Posted: 15 Aug 2016 | Published: 12 Aug 2016

Citrix

How to Handle the IoT from the Data Center to Security
sponsored by Xively by LogMeIn
EGUIDE: In this e-guide, learn how experts ensure IoT devices can stand up to the scope of modern security challenges, and what IT pros are doing to help the data center support IoT data from numerous sources.
Posted: 10 Aug 2016 | Published: 08 Aug 2016

Xively by LogMeIn

Enterprise Mobility: How Mobile Device Management Exploded to Include Devices, Apps and Content
sponsored by IBM MaaS360
WHITE PAPER: Today, nearly every enterprise works with mobile devices, but few know how to maximize their potential. So, how do you turn mobility into a valued asset? Access this white paper to learn about workplace mobility and how to successfully implement a unified mobile policy.
Posted: 09 Aug 2016 | Published: 31 Mar 2016

IBM MaaS360

The Threat Defense Lifecycle: Intelligent Endpoint Threat Defense
sponsored by Intel Security
WHITE PAPER: Adopt a threat defense lifecycle that will allow you to discover threats faster, respond quicker and overall outsmart attackers, driving business efficiency forward. Learn how to then apply these insights to an automated policy that can block similar attack attempts up front.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security
151 - 175 of 1440 Matches Previous Page    5 6 7 8 9 10    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement