IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
176 - 200 of 1288 Matches Previous Page  |  Next Page
Better Manage Your BYOD Program
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper provides indispensible advice on how to select device specifications for BYOD, how to streamline management, and more.
Posted: 11 Mar 2015 | Published: 31 Oct 2014

Dell, Inc. and Intel®

Enhancing employee flexibility while reducing IT complexity
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Read this exclusive case study to find out what solutions Dell took to embrace BYOD, streamline IT, and manage their security at the same time.
Posted: 11 Mar 2015 | Published: 31 Aug 2014

Dell, Inc. and Intel®

Enhance Your Malware Protection
sponsored by IBM
WHITE PAPER: This white paper describes a malware protection that can accurately identify even the most advanced malware.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

SIEM Battleground Unfolds Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom looks at next-generation security information and event management (SIEM), analytic tools and cloud-based systems designed to help CISOs make sense of security data.
Posted: 05 Mar 2015 | Premiered: 16 Mar 2015

SearchSecurity.com

Buyer's Essential: What to Look for In Threat Intelligence Services
sponsored by SearchSecurity.com
EBOOK: This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from the adding a threat intelligence feed to your security system.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

SearchSecurity.com

Why Leasing Beats Buying Every Time E-Book - MobPOS
sponsored by Sprint
WHITE PAPER: Save your company thousands by checking out this short read to find out the smartest way to get your employees the latest tech, without prohibitive costs. Read on to learn more.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Sprint

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

An advanced and integrated approach to managed enterprise network security
sponsored by ComputerWeekly.com
ANALYST BRIEF: Many businesses are turning to managed security services as a means of addressing the difficulty associated with deploying and managing multiple-point security systems, according to this report from Frost & Sullivan.
Posted: 24 Feb 2015 | Published: 24 Feb 2015

ComputerWeekly.com

Strengthening networks and endpoints with behavior-based protection
sponsored by IBM
WHITE PAPER: This white paper looks at behavior-based protection, a comprehensive security system that fights the latest threats.
Posted: 24 Feb 2015 | Published: 31 Oct 2014

IBM

Eliminating Security Weak Points with Next-Gen NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Access this white paper to learn how next-gen network access control (NAC) empowers you to define, implement, and enforce granular access policies for connecting endpoints based on user identity, role, device, location, and other factors.
Posted: 23 Feb 2015 | Published: 04 Dec 2014

ForeScout Technologies, Inc.

Definitive Guide to Next-Gen NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: View this thorough white paper to learn how to manage security risks and eliminate rogue users, devices, and applications through next-gen network access control (NAC). Read on now to:
Posted: 23 Feb 2015 | Published: 05 Nov 2014

ForeScout Technologies, Inc.

The Critical Security Controls: What's NAC Got to Do with IT?
sponsored by ForeScout Technologies, Inc.
PRODUCT REVIEW: This white paper discusses the capabilities of next-generation NAC and explains why it's an essential part of securing the modern enterprise.
Posted: 18 Feb 2015 | Published: 31 Jan 2015

ForeScout Technologies, Inc.

Web security meets DDoS Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: John Pescatore explores new DDoS attack vectors and discusses incident response planning (tools and processes) you need to plan for in 2015.
Posted: 18 Feb 2015 | Premiered: 20 Feb 2015

SearchSecurity.com

Next-Generation Network Security: A Buyers’ Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: This buyer's guide provides an in-depth explanation of the factors that impel organizations to look at next generation security solutions.  Read on to learn more.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Cisco Systems, Inc.

Optimizing Enterprise Security: Intelligence, Control, and Response
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explores the factors that make network security management and operations more difficult today than ever before.
Posted: 17 Feb 2015 | Published: 28 Nov 2014

ForeScout Technologies, Inc.

Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.

Changing Face of Mobility: Raises The Stakes For Endpoint Data Protection
sponsored by Commvault
WHITE PAPER: This white paper highlights some potentially troubling byproducts of that movement. Read on to learn more.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

Commvault

Network Access Control: Navigating the Crowded Market
sponsored by ForeScout Technologies, Inc.
ANALYST REPORT: This analyst report from Gartner evaluates and compares 10 top network access control (NAC) vendors. Read on to learn the strengths and weaknesses of each vendor in order to discover which NAC vendor is the best fit for your enterprise's network security needs.
Posted: 16 Feb 2015 | Published: 10 Dec 2014

ForeScout Technologies, Inc.

4 Data Traffic Security Challenges Exposing Enterprises to Hack Attacks
sponsored by Certes Networks
WHITE PAPER: This white paper discusses the 4 major points of weakness that your enterprise needs to prioritize in 2015 in order to defend your business-critical data from hackers.
Posted: 12 Feb 2015 | Published: 22 Jan 2015

Certes Networks

Bridging the Data Security Gap: Unified Data Protection for 4 Key Data Environments
sponsored by IBM
WHITE PAPER: This white paper explores how to bridge the data security gap amid the digital information explosion in four major areas: Big data, virtual environments and the cloud, enterprise data, and enterprise applications.
Posted: 12 Feb 2015 | Published: 31 May 2013

IBM

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

HP: Protecting Printers with Enterprise Grade Security by Moor Insights and Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the key security risks presented by today's networked printer and offers an overview of some innovative solutions that address them.
Posted: 11 Feb 2015 | Published: 30 Sep 2014

Hewlett-Packard Company

What to look for in secure file transfer
sponsored by SearchSecurity.com
EBOOK: This guide provides essential knowledge for enterprise InfoSec pros acquiring tools and products to transfer files efficiently and securely.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

SearchSecurity.com

Discover the Capabilities of a Next Generation Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This in-depth white paper provides a close look at a next generation firewall, describing each of its capabilities in detail.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Streamlining Multifunction Printer Security
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper describes an example of how you can efficiently enhance your MFP security with centralized and automated security settings.
Posted: 11 Feb 2015 | Published: 31 Mar 2013

Hewlett-Packard Company
176 - 200 of 1288 Matches Previous Page    6 7 8 9 10 11    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement