IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network SecurityReports
151 - 175 of 1053 Matches Previous Page  | Next Page
Cisco Smart Business Architecture
sponsored by Cisco
WHITE PAPER: This white paper covers a network architecture solution that can allow you to expand while also maintaining effective security.
Posted: 09 Jan 2014 | Published: 07 Feb 2013

Cisco

5 DNS Security Risks That Keep You Up At Night
sponsored by Dyn
WHITE PAPER: This guide explores 5 DNS security risks and what you can do to prevent them.
Posted: 08 Jan 2014 | Published: 08 Jan 2014

Dyn

NetScaler 2048-bit SSL performance advantage
sponsored by Citrix
WHITE PAPER: IT professionals are deploying application device controllers (ADCs) for their network due to their unique set of capabilities. This brief guide highlights one company's ADC solution and how it will improve your network functionality.
Posted: 06 Jan 2014 | Published: 31 Dec 2011

Citrix

Solving the ADC Market Share Riddle: Why Citrix NetScaler is Winning the Data Center
sponsored by Citrix
WHITE PAPER: When it comes to the new demands of network infrastructure, it is critical to have an effective application device controller (ADC). This brief guide explores an effective ADC that can help improve your network performance and provide you with effective scalability solutions.
Posted: 06 Jan 2014 | Published: 06 Jan 2014

Citrix

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: The role of secure sockets layer (SSL) technology is no longer a luxury, it is now a crucial part of all networking systems. This guide explores some best practices for implementing 2048-bit SSL and how it can benefit your network infrastructure.
Posted: 03 Jan 2014 | Published: 31 Dec 2011

Citrix

Achieve mobile delivery with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: This guide explores the importance of transmission control protocol, application delivery controllers and how they can boost your network performance, availability and security.
Posted: 02 Jan 2014 | Published: 31 Dec 2013

Citrix

Solve the application visibility challenge with NetScaler Insight Center
sponsored by Citrix
WHITE PAPER: Managing your application performances is a task all IT departments face, and in order to ensure optimal speeds, it is crucial to monitor your network. This guide explores one company's solution to these challenges and how they can help you gain greater network visibility.
Posted: 31 Dec 2013 | Published: 31 Dec 2013

Citrix

10 Must Haves for Secure Enterprise Mobility
sponsored by Citrix
WHITE PAPER: In this resource, discover 10 valuable features to include when creating a mobile security strategy so that your organization can fully realize the benefits of BYOD policies.
Posted: 27 Dec 2013 | Published: 31 May 2013

Citrix

Citrix NetScaler: A powerful defense against denial of service attacks
sponsored by Citrix
WHITE PAPER: As cybercrime continues to grow, denial of service (DoS) attacks have become far more prevalent. This guide explores the current landscape of DoS attacks and what you can do to protect your network.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Citrix

Frost & Sullivan: Continuous Compliance and Next Generation NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Let's face it, cybercrime is growing and attacks are becoming far more prevalent. This guide explores the role of NAC in securing your network and how it is important to keep your network up-to-date as BYOD and mobility continue to rise.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

ForeScout Technologies, Inc.

ESG Market Report: The EVAS Market - The Evolution of NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: For many businesses, network access control is essential for their network security since the days of Ethernet and IP. This guide outlines the history of network access control and how you can implement more effective policies to secure your network.
Posted: 27 Dec 2013 | Published: 31 Jul 2013

ForeScout Technologies, Inc.

Firewall Buyers Guide for Evaluating Enterprise Network Firewalls
sponsored by Palo Alto Networks
WHITE PAPER: In this resource, uncover a buyers guide for next-generation firewalls that details all the must-have functions in order to ensure optimum network security. Click now to see how to choose the right solution for your organization's needs.
Posted: 26 Dec 2013 | Published: 26 Dec 2013

Palo Alto Networks

Tolly Report: Comparative NAC: ForeScout, Bradford, Cisco & Juniper
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: With the demand for remote access from different mobile devices growing, IT departments are adopting network access control (NAC) as an integral part of their network security. This guide compares various NAC strategies and how they can benefit your system.
Posted: 26 Dec 2013 | Published: 31 Mar 2012

ForeScout Technologies, Inc.

Securing BYOD with NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: For many businesses BYOD is a great way to lower cost and increase work productivity, but this does not come without security risks. This case study highlights one company's success story after implementing an effective NAC solution.
Posted: 26 Dec 2013 | Published: 29 Aug 2012

ForeScout Technologies, Inc.

10 Things Your Next Firewall Must Do
sponsored by Palo Alto Networks
WHITE PAPER: This valuable resource highlights the renewed focus on firewalls to improve security given the increasing complexities in network architectures. Click now to explore next-generation firewalls, and 10 things that they must do to protect your organization.
Posted: 24 Dec 2013 | Published: 19 Aug 2013

Palo Alto Networks

Next-generation Firewalls Enable Secure Mobile Network Access
sponsored by Palo Alto Networks
WHITE PAPER: Access this white paper to discover a next-generation firewall that integrates with mobile device management solutions to ensure secure mobile network access from any device that authorized users choose.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Palo Alto Networks

2014 Magic Quadrant for User Authentication
sponsored by SafeNet Asia Ltd
ANALYST REPORT: View this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

SafeNet Asia Ltd

Next-Generation Authentication: Keys to Balancing Security and Convenience
sponsored by SafeNet Asia Ltd
WHITE PAPER: This white paper highlights the top characteristics and requirements for next-generation authentication that's built to endure a constantly evolving and risk-filled IT landscape.
Posted: 09 Jan 2014 | Published: 28 Oct 2013

SafeNet Asia Ltd

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
Posted: 09 Jan 2014 | Published: 09 Sep 2010

SafeNet Asia Ltd

A Full-Service Network With Secure, Encrypted Communications
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this guide, discover how to design a full-service network with secure, encrypted communications with VPN technology.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Cisco Systems, Inc.

Taming the Integration Nightmares of a 1,000 App Enterprise
sponsored by Palo Alto Networks
WHITE PAPER: Access this informative white paper today, which highlights an innovative integration approach that will enable you to significantly boost business agility and cost control.
Posted: 26 Dec 2013 | Published: 28 Jan 2014

Palo Alto Networks

Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks
sponsored by Palo Alto Networks
WHITE PAPER: In this valuable resource, discover a security platform designed to keep up with today's ever-evolving threat landscape, which offers optimum network security without lowering network performance or reducing business productivity.
Posted: 26 Dec 2013 | Published: 31 Aug 2013

Palo Alto Networks

Checklist: 5 Impactful Tips for Securing BYOD in the Enterprise
sponsored by Code42
WHITE PAPER: This comprehensive checklist includes 5 critical things to consider when constructing a mobile security strategy so that your organization can confidently utilize BYOD initiatives without worry of risk.
Posted: 24 Dec 2013 | Published: 24 Dec 2013

Code42

Seeding Clouds on Power Systems with IBM SmartCloud Entry - Executive Summary
sponsored by IBM
WHITE PAPER: As cloud computing continues to grow, businesses are looking to decide which strategy is best for them. This guide explores a range of cloud services and how it will fit in with your system.
Posted: 23 Dec 2013 | Published: 31 Jan 2012

IBM

Secure virtual desktop infrastructure with Citrix NetScaler and Palo Alto Networks Next Generation Firewall
sponsored by Citrix and Palo Alto Networks
WHITE PAPER: As desktop virtualization continues to grow in popularity, organizations are looking to optimize their potential benefits. This guide explores virtual desktop infrastructure, potential implementation challenges and how to overcome these challenges.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Citrix and Palo Alto Networks
151 - 175 of 1053 Matches Previous Page    5 6 7 8 9 10    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement