IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network Security Reports
176 - 200 of 1245 Matches Previous Page  |  Next Page
The Current Chaotic State of Data Traffic Security
sponsored by Certes Networks
WHITE PAPER: This white paper explores the results of a survey of more than 6 million IT professionals that aimed to discover how companies across the globe handle data in motion and other IT security issues. The results made one thing apparent: Data traffic encryption is a mess.
Posted: 06 Jan 2015 | Published: 16 Dec 2014

Certes Networks

Taking Hybrid WANs Further
sponsored by VeloCloud
WHITE PAPER: In this whitepaper, explore the additional ways to take the hybrid WAN further.  Read on to learn more.
Posted: 22 Dec 2014 | Published: 22 Dec 2014

VeloCloud

How to Ensure Web and App Performance by Addressing the Front End
sponsored by Limelight Networks, Inc.
WHITE PAPER: The following white paper explores what companies need to do to ensure the performance of web and mobile applications. Uncover how front end acceleration can help achieve the desired speed, which technologies make this goal a reality, and how to apply the front end acceleration to 3 key areas.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Limelight Networks, Inc.

Defend web properties from modern threats with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Defending your organization's web properties means more than just protecting enterprise web applications from advanced malware. Learn more on the challenges of defending against today's modern threats and discover how Citrix NetScaler application delivery controller (ADC) is an ideal defense solution.
Posted: 16 Dec 2014 | Published: 31 Dec 2013

Citrix

Battle of the Ethernet Switches: Cisco vs. NETGEAR
sponsored by IT Central Station
ESSENTIAL GUIDE: Have you ever wondered exactly how many options there are for purchasing enterprise level Ethernet switches? Take a look at this comprehensive list of all enterprise Ethernet switches in this expert report which includes real user reviews from IT professionals, like you.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Product vs. Product: Everything you need to know before you buy
sponsored by IT Central Station
ESSENTIAL GUIDE: When making a buying decision for Application Performance Management, it can be challenging to know which product is the best fit for you and your organization. To make your decision easier, IT Central Station is offering you a comprehensive, unbiased guide of the most popular APM products on the market today.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Product Comparison: Network Performance Monitoring
sponsored by IT Central Station
ESSENTIAL GUIDE: With the number of network performance monitoring products on the market, searching for the right one for your organization can be a challenge. With IT Central Station's comprehensive report, you will find IT Professionals' honest opinions about the most popular vendors and products in network performance management today.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Busting Myths About Mobility: Why the Dream of Mobility shouldn’t be a Security Nightmare for Highly Regulated Businesses
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This exclusive white paper takes an in-depth look at mobile security and why your business shouldn't have security nightmares. Read on to crack the common myths about mobility, and more.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

Dell, Inc. and Intel®

Implementing Software-Defined Security with CloudPassage Halo
sponsored by CloudPassage
WHITE PAPER: This paper summarizes the five architectural principles of SDSec and the ways in whichCloudPassage has implemented them by building the Halo SDSec platform for cloud infrastructure. Read on to learn more.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

CloudPassage

Five Steps to Firewall Planning and Design
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper highlights a set of guidelines that can be used to create an overall security policy for your organization.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Juniper Networks, Inc.

The 2014 Global Cost of Cybercrime Study
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative report distills interviews with senior-level IT personnel about the impact of cybercrime on their organizations in 2014 into trends that apply to every enterprise around the world.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

Implement a More Secure Network to Keep Up with Shadow IT
sponsored by Verizon
WHITE PAPER: This white paper examines the ramifications of the growth of shadow IT and examines how you can protect against potential issues. Read on to learn how you can implement a more secure network to keep up with evolving IT demands.
Posted: 12 Nov 2014 | Published: 31 Dec 2013

Verizon

Addressing NIST and DOD Requirements for Mobile Device Management (MDM)
sponsored by IBM
WHITE PAPER: Read this exclusive white paper to gain key insights on the security risks associated with mobile device policies, as well as an in-depth look at one solution that was able to drive rock-solid security without risking network performance and end-user satisfaction. Read on to learn more.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

IBM

Five Ways Network Virtualization Will Revolutionize IT
sponsored by Global Knowledge
WHITE PAPER: Discover how Network Functions Virtualization (NFV) will revolutionize IT and change the way you think about network connectivity, and perhaps even application development.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Global Knowledge

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Networks That Know Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper explains why you must implement a multi-dimensional security approach to minimize any potential risks associated with the cloud.
Posted: 24 Oct 2014 | Published: 01 Aug 2014

Juniper Networks, Inc.

The Emergence of SDN in WLAN
sponsored by TechTarget
RESOURCE: SDN is being implemented rapidly—is your organization maximizing its benefit? New use cases have emerged for SDN in wireless networks. Our e-guide, The Emergence of SDN in WLAN explores how SDN can benefit your wireless network through the improvement of how wireless networks are deployed and managed.
Posted: 24 Oct 2014 | Published: 09 Sep 2014

TechTarget

5 Key Areas To Consider For Remodeling Your Infrastructure
sponsored by IBM
EBOOK: This informative resource can help you take advantage of the biggest business opportunities and the technology required for success.
Posted: 05 Jan 2015 | Published: 01 Dec 2014

IBM

The Transformation of Wireless Network Security
sponsored by SearchSecurity.com
EBOOK: Learn how to integrate Wi-Fi security into your overall network strategy to help maintain security in the age of wireless connectivity.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

SearchSecurity.com

Trends Reshaping Wireless Networking
sponsored by SearchNetworking.com
EBOOK: Today's advanced threats demand a network security strategy that can adjust policies based on contextual data about users and apps.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

SearchNetworking.com

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.

Putting Network Security Into Context
sponsored by SearchNetworking.com
EBOOK: Today's advanced threats demand a network security strategy that can adjust policies based on contextual data about users and apps.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

SearchNetworking.com

Next-Generation Switches to Consider
sponsored by TechTarget
RESOURCE: Next-generation switches have a lot of capabilities, especially as vendors retool their product lines to support application awareness and other features. How do you know you're buying the right switch? Take our brief survey on network infrastructure and you'll gain immediate access to our expert guide, What you need to know about switch upgrades.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

TechTarget

Redefining your Security Vision
sponsored by ComputerWeekly.com
RESOURCE: Despite its undisputed dominance of the security market recently, Symantec's revenues have remained static. Will the expansion of its enterprise data security, cloud and mobile portfolio return it to growth? Take our brief survey and you'll gain immediate access to a ComputerWeekly eguide, Building momentum: Symantec's new approach to security.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

ComputerWeekly.com

Endpoint protection: Whitelisting and Beyond
sponsored by SearchSecurity.com
EBOOK: Application whitelisting is a valuable security tool but it's riddled with complexity. This handbook takes a look at whitelisting capabilities, with an eye to the NIST cybersecurity framework and suggests best practices for implementing or managing a whitelist in your enterprise.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

SearchSecurity.com
176 - 200 of 1245 Matches Previous Page    6 7 8 9 10 11    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement