IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
151 - 175 of 1533 Matches Previous Page  |  Next Page
IT Security Trends to Know
sponsored by Cisco Umbrella
EGUIDE: The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.
Posted: 06 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella

Web Security: Now What?
sponsored by SearchSecurity.com
EZINE: In this handbook, experts dive into the ongoing issues related to TLS security and HTTPS inspection. Uncover more about the journey of computer worms and how they play a role in advanced persistent threats.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

SearchSecurity.com

Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway
sponsored by Cisco Umbrella
EGUIDE: Cisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic.
Posted: 01 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella

The Dawn of the DDoS of Things & 1 Tbps Attacks
sponsored by A10 Networks
WHITE PAPER: In this white paper learn how to prevent Mirai maleware, a type of DDoS attacks hackers use to compromise unsecured IoT devices.
Posted: 01 Sep 2017 | Published: 30 Jun 2017

A10 Networks

VoIP Adoption Leads to Free PCI Upgrades for Major Quick Service Restaurant
sponsored by Hughes Network Systems
WHITE PAPER: The case study uncovers how VoIP adoption and network service consolidation helped a popular restaurant chain address growing cybersecurity challenges and increase their bandwidth for the best network connection.
Posted: 01 Sep 2017 | Published: 30 Apr 2017

Hughes Network Systems

Ddos Jumpstart: 11 Best Practices for Mitigating the DDoS of Things
sponsored by A10 Networks
WHITE PAPER: Learn how to proactively detect and mitigate even advanced, multi-vector DDoS attacks. Plus, find out how to protect your network and key business apps by implementing 11 best practices.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

A10 Networks

DDos of Things: Survival Guide
sponsored by A10 Networks
WHITE PAPER: To learn more about prevention techniques for DDoS attacks on the IoT, explore this white paper that explains the how DDoS attacks have evolved in terms of both network and application layer attacks.
Posted: 31 Aug 2017 | Published: 30 Jun 2017

A10 Networks

3 Keys to Unlocking the Bank of the Future
sponsored by Hughes Network Systems
EGUIDE: Discover the tools to meet digitally-savvy customers' expectations for reliable network connections and security.
Posted: 30 Aug 2017 | Published: 30 Apr 2017

Hughes Network Systems

Interroll Deploys a Broadband WAN with Unity EdgeConnect
sponsored by Silver Peak
WEBCAST: Learn how Interroll updated their WAN architecture with EdgeConnect to improve application performance, and uncover the top functional features SD-WAN creates for your company.
Posted: 30 Aug 2017 | Premiered: Aug 30, 2017

Silver Peak

Provide Quality of Service for UC Platforms
sponsored by Nectar Corp
WEBCAST: Watch this brief video to learn how to deliver quality of service (QoS) and positive user experiences for the key UC apps and devices that power your organization's collaboration.
Posted: 29 Aug 2017 | Premiered: Aug 29, 2017

Nectar Corp

How to Find the Best DDoS Attack Prevention and Detection Tools
sponsored by SearchSecurity.com
EBOOK: Explore this expert handbook on how to evaluate DDoS prevention tools and services to identify the best ones for you.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

SearchSecurity.com

How mobile and IoT connectivity is shaping the network of the future
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about the concept of autonomous self-driving networks, how the IoT connectivity wars are playing out and why Asia is set to dominate industry conversations on 5G.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

ComputerWeekly.com

Networking Checklist: Follow the Steps of Industry Peers
sponsored by Spectrum Enterprise
WHITE PAPER: When networking technology challenges are daunting and you need a new strategy, some of the best guidance comes from those who've been there. Learn from industry peers on how to overcome technology challenges and enable business growth.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Spectrum Enterprise

Investigate attacks like never before
sponsored by Cisco Umbrella
RESOURCE: Dive into this interactive resource and learn about a truly innovative approach to security that allows you to drastically cut down on the noise from alerts. Access now and see for yourself how this system delivers an intuitive, single source of security intelligence that can allow you to investigate and eliminate the most critical threats.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Cisco Umbrella

Ambushed By Data
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: This recent survey of 233 security professionals takes a look into the security gaps that still plague the market. Uncover the results to the questions posed to these professionals and an analysis of their relevance.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Arctic Wolf Networks, Inc.

IDC Webcast: Advanced SD-WAN Powering the Cloud-Connected Enterprise
sponsored by Silver Peak
WEBCAST: Learn about the need for WAN transformation to support cloud-connected enterprises and digital transformation initiatives. Get the facts from IDC about the current state of SD-WAN, its potential benefits, and use cases. Plus, hear about one of the leading SD-WAN edge tools.
Posted: 18 Aug 2017 | Premiered: Aug 18, 2017

Silver Peak

Stop Ransomware in its Tracks
sponsored by Cisco Umbrella
RESOURCE CENTER: In this resource center, explore the many facets of ransomware through several available resources and even enjoy a little embed game to lighten the mood.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Cisco Umbrella

Addressing Today's Endpoint Security Challenges
sponsored by Citrix
WHITE PAPER: Endpoint security has become a major issue for enterprise IT as business mobility and BYOD render traditional perimeter based protection ineffective. Read this white paper to uncover key strategies for mobile and endpoint security, including multilayered protection for apps, data, devices and networks.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Citrix

Stop Attacks in Real-Time with Threat Intelligence
sponsored by Cisco Umbrella
VIDEO: Take a closer look into how threat intelligence can take massive amounts of information and make sense of it all. See how you can use this strategy to respond to threats in real-time before they become attacks.
Posted: 14 Aug 2017 | Premiered: 07 Mar 2017

Cisco Umbrella

Improve Endpoint Security with Advanced Tools and Techniques
sponsored by OPSWAT inc
EGUIDE: Better endpoint security protection is possible with NAC, DLP and other tools and techniques. Access this expert e-guide to learn how they fit together to improve enterprise endpoint protection.
Posted: 31 Aug 2017 | Published: 29 Aug 2017


Digital Transformation Obstacles and How to Overcome Them
sponsored by Verizon
RESEARCH CONTENT: This IDC white paper reveals networking obstacles to achieving digital success. Access the survey results inside to learn what network leaders are doing to overcome these challenges and support digital transformation.
Posted: 28 Aug 2017 | Published: 31 Jul 2016

Verizon

Cyber security solutions from IBM
sponsored by IBM
WHITE PAPER: Government agencies rely on the Internet to store large amounts of data. As a result, internal and external threats are a growing concern for personal and valuable information. This informative white paper offers cyber security solutions to ensure protection.
Posted: 28 Aug 2017 | Published: 20 Jul 2012

IBM

Web Hacking - Network Security Secrets & Solutions
sponsored by Bit9, Inc.
WHITE PAPER: This chapter seeks to outline the scope of the webhacking phenomenon and show you how to avoid becoming just another statistic in the litter of web properties that have been victimized over the past few years.
Posted: 28 Aug 2017 | Published: 09 Jun 2009

Bit9, Inc.

Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network
sponsored by nCircle
WHITE PAPER: This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact.
Posted: 28 Aug 2017 | Published: 02 Aug 2010

nCircle

Virtual Network Services: Simplify Your Network
sponsored by Verizon
PRODUCT LITERATURE: A software-defined network enables you to manage your network as a single ecosystem instead of a group of individual systems. Access this white paper to learn about a virtual network service that helps address the problems of disparate devices, while controlling costs, responding quickly to changing needs, and more.
Posted: 25 Aug 2017 | Published: 25 Aug 2017

Verizon
151 - 175 of 1533 Matches Previous Page    5 6 7 8 9 10    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement