IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
151 - 175 of 1289 Matches Previous Page  |  Next Page
Secure Your Network: Best Practices for Battling Security Threats
sponsored by TechTarget
RESOURCE: Our new e-guide, How to Overcome Top Network Security Obstacles, shares best practices and information on the latest tools available, so that you can make an informed decision and achieve the best possible network security.
Posted: 30 Nov 2015 | Published: 30 Nov 2015

TechTarget

Strategies for Advanced Threat Protection
sponsored by Symantec Corporation
WHITE PAPER: In this data sheet, you'll find a new strategy designed to uncover, prioritize, and remediate advanced attacks across all your endpoints. Access now and learn how to search for, discover, and remediate any attack artifacts across all of your endpoint systems.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Symantec Corporation

How to Provide Accelerated Triage for Cisco UC/Jabber
sponsored by NetScout Systems, Inc.
PRODUCT OVERVIEW: In this brief resource, you will learn how to improve your UC service delivery and IT collaboration with a UC server, complete with real-time call quality performance monitoring. Discover how to quickly resolve service quality issues with proactive application and network analyses and service quality alerts.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

NetScout Systems, Inc.

Security Intelligence for the Modern Data Center
sponsored by AccelOps Inc.
WHITE PAPER: Organizations need an intelligent approach to understand data and proactively detect security threats and anomalies. In this white paper, learn how to consolidate security, performance, and compliance monitoring into a single pane of glass to improve protection across environments
Posted: 17 Nov 2015 | Published: 03 Nov 2015

AccelOps Inc.

Unknown Malware - What You Can't See Can Hurt You
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This infographic provides some essential statistics on the rise of unknown malware and gives advice for defeating it. Discover how you can fight the unknown and keep your organization secure.
Posted: 17 Nov 2015 | Published: 31 Dec 2014

Check Point Software Technologies Ltd.

Multi-Layered Defense for an Evolving Threat Landscape
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Access this webcast to learn how you can protect against both known and unknown malware and to make today's difficult cybersecurity landscape just a little bit easier.
Posted: 16 Nov 2015 | Premiered: Oct 13, 2015

Check Point Software Technologies Ltd.

How Sandboxing puts a Stop to Today's Advanced Attacks
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video introduces a modern approach to sandboxing that catches even the most evasive attack. Take a look to learn how you can upgrade your sandboxing capabilities to match today's advanced and zero-day attacks.
Posted: 16 Nov 2015 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.

Staying One Step Ahead with Zero-Day Protection
sponsored by Check Point Software Technologies Ltd.
WEBCAST: This webcast examines how you can stop today's advanced hackers. Watch and learn how sandboxing, CPU-level detection and more can keep your organization secure from even the most sophisticated threats.
Posted: 16 Nov 2015 | Premiered: Sep 22, 2015

Check Point Software Technologies Ltd.

A Guide to Selecting the Best Authentication and Access Control for Your Enterprise
sponsored by SecureAuth
WHITE PAPER: Discover the 4 critical categories to consider when choosing an advanced authentication and access control strategy.
Posted: 13 Nov 2015 | Published: 28 Oct 2015

SecureAuth

Exposing The Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper to learn how sandboxing has evolved to fight modern cybercrime and how the technology could secure your business.
Posted: 13 Nov 2015 | Published: 30 Jun 2015

Check Point Software Technologies Ltd.

How to Choose Your Next Sandboxing Solution
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper for a look at the eight essential qualities of effective sandboxing solutions and advice from Gartner on preventing the most sophisticated unknown malware from compromising your systems and networks.
Posted: 12 Nov 2015 | Published: 13 Jul 2015

Check Point Software Technologies Ltd.

Critical Capabilities for Security Information and Event Management (SIEM)
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this report for insight on aligning IT's needs with three key use cases to choose the best SIEM solution for the organization.
Posted: 12 Nov 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

How Boston Properties Stays One Step Ahead of Advanced Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this case study to discover how Boston Properties, a real estate company, found a security tool that could catch any cybersecurity threat, even unknown ones.
Posted: 12 Nov 2015 | Published: 12 Nov 2015

Check Point Software Technologies Ltd.

Three Cybersecurity Developments You Can’t Ignore
sponsored by UnitedLex
WHITE PAPER: Discover the 3 developments causing CFOs nightmares in this informative white paper. Continue reading to learn the questions you need to ask security leaders to establish a robust cybersecurity strategy.
Posted: 10 Nov 2015 | Published: 30 Sep 2015

UnitedLex

Evaluating the Next Generation of Threat Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper looks at a next-generation threat prevention tool, evaluating the effectiveness of this form of technology and the practicality of implementing it.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

Check Point Software Technologies Ltd.

Network Evolution: November Issue
sponsored by SearchNetworking.com
EZINE: This issue of Network Evolution, examines real SDN use cases and deployment models for mainstream enterprises. Also in this issue, network engineers weigh in on how the growing pressure to improve their fluency in security is affecting their jobs.
Posted: 02 Nov 2015 | Published: 02 Nov 2015

SearchNetworking.com

vSRX Services Gateway Solution Brief
sponsored by Juniper Networks, Inc.
RESOURCE: This solution brief discusses the challenges to virtualization in the modern enterprise, and introduce an all-encompassing solution built to defend your increasingly virtualized data center.
Posted: 28 Oct 2015 | Published: 28 Oct 2015

Juniper Networks, Inc.

The Total Economic Impact of Comprehensive Security
sponsored by Alert Logic
WHITE PAPER: This white paper analyzes the TEI and ROI for one suite of security solutions and discusses how you can get the most out of your security spending.
Posted: 28 Oct 2015 | Published: 31 Dec 2014

Alert Logic

The State of the Virtualized Data Center: Physical and Virtual Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Find out how your network security peers evaluate network security when implementing new technology, and what they look for when choosing tools to support a virtualized environment, in this survey report.
Posted: 27 Oct 2015 | Published: 27 Oct 2015

Juniper Networks, Inc.

How to Remove the Barriers to Cloud Collaboration Adoption
sponsored by Mimecast
WEBCAST: In this webinar, join Forrester Research-backed experts as they take you through the advantages of adopting cloud collaboration technology, overcoming security challenges, and developing a flexible strategy.
Posted: 27 Oct 2015 | Premiered: Oct 27, 2015

Mimecast

Report Summary: Reliability Analysis of Juniper Networks SRX5000 Line of Services Gateways
sponsored by Juniper Networks, Inc.
ANALYST REPORT: This analysis report focuses on a networking and security service that provides application security, UTM, integrated IPS, and advanced integrated threat management. Read on to see how this scalable, resilient security solution can guard your enterprise's data center against cyber threats and malware.
Posted: 26 Oct 2015 | Published: 31 Jan 2015

Juniper Networks, Inc.

Protecting Traditional and Cloud Data Centers with Security Intelligence
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper discusses the need for a high level of security in both traditional and cloud data centers and offers solutions to common challenges that can arise, such as security inefficacy or insufficient firewall performance. Access now to learn how security intelligence services can provide your enterprise with many benefits.
Posted: 26 Oct 2015 | Published: 31 Oct 2014

Juniper Networks, Inc.

Continuous Testing: How to Streamline Performance, Regression, and Security Testing
sponsored by Citrix and NRG Global
WEBCAST: This webinar reveals how you can use a continuous testing strategy to incorporate any alterations into your environment quickly and with confidence.
Posted: 26 Oct 2015 | Premiered: Nov 4, 2015

Citrix and NRG Global

Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This in-depth resource tells you all you need to know about big data security and how it can catch advanced, targeted attacks.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

Blue Coat Systems

What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: Learn how to uncover the what, when, and how of security incidents to fortify your security strategy against increasingly sophisticated attacks. Examine the shortcomings of conventional breach investigation approaches and how to build intelligence to navigate investigations faster and easier in this helpful whitepaper.
Posted: 12 Nov 2015 | Published: 14 Apr 2014

IBM
151 - 175 of 1289 Matches Previous Page    5 6 7 8 9 10    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement