IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
201 - 225 of 1288 Matches Previous Page  |  Next Page
Human Vulnerabilities in Our Current Threat Landscape
sponsored by Global Knowledge
WHITE PAPER: This white paper enables you to educate your employees on security best practices and current human vulnerabilities, helping you to ensure that you're not a part of the many organizations that are breached.
Posted: 10 Feb 2015 | Published: 31 Jan 2015

Global Knowledge

Securing the Enterprise in 2015: 5 pragmatic steps to security
sponsored by Dell SecureWorks
WHITE PAPER: This white paper outlines a 5-step plan for developing strong security no matter what security product is used.
Posted: 10 Feb 2015 | Published: 31 Jan 2015

Dell SecureWorks

The Bot Threat
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 01 Feb 2015 | Published: 13 Nov 2013

Hewlett-Packard Company

Next-Generation Firewalls: Breaking Through the Hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 01 Feb 2015 | Premiered: 10 Dec 2013

SearchSecurity.com

A Guide to Improving Your Network Security in 30 Days
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource highlights a NGFW solution combined with intrusion prevention to cure your network security issues.
Posted: 01 Feb 2015 | Published: 19 Aug 2014

Hewlett-Packard Company

Network Security Intelligence Selection Buying Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why network defense can make or break the success of an enterprise; and also introduces HP TippingPoint, a leader in security intelligence, as a potential solution.
Posted: 01 Feb 2015 | Published: 19 Nov 2014

Hewlett-Packard Company

Learn How to Configure and Use a PKI In Your Network
sponsored by Global Knowledge
WHITE PAPER: This white paper investigates the practical use of the PKI and its configuration, as well as how the PKI can secure different types of servers.
Posted: 28 Jan 2015 | Published: 31 Dec 2014

Global Knowledge

DDoS Attack Mitigation Technologies Demystified
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive white paper dives into the technologies used traditionally to detect and mitigate DDoS attacks, and explains how they evolved to the level they're at today. Read on to learn more.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Fortinet, Inc.

Why It's Time to Modernize Your Printing Infrastructure
sponsored by Hewlett-Packard Limited
WHITE PAPER: This exclusive resource takes an in-depth look at how legacy printing strategies are no longer safe and why it may be time to modernize your printing infrastructure. Read on to learn more.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Hewlett-Packard Limited

The Dangers of an Insecure Printer
sponsored by Hewlett-Packard Limited
WEBCAST: Access this brief video to learn why your multifunction printers may be putting your organization at risk and what you can do about it.
Posted: 27 Jan 2015 | Premiered: Jan 27, 2015

Hewlett-Packard Limited

Is Your Printing/Imaging Environment Exposing Your Sensitive Data?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This exclusive white paper dives into some of the toughest challenges with data security.  Read on to learn more.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Hewlett-Packard Limited

Is Your Printing/Imaging Environment As Safe As the Rest of Your Infrastructure?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper explains the importance of securing your printing and imaging environment, and introduces a streamlined, policy-based approach to securing these devices before a data breach occurs.
Posted: 22 Jan 2015 | Published: 31 Oct 2014

Hewlett-Packard Limited

Spoofing Server-Server Communication: How You Can Prevent It
sponsored by Symantec Corporation
WHITE PAPER: In this must-read white paper, you'll learn how to prevent the new SSL Strip threat that could compromise your secure applications.
Posted: 19 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Protecting Users from Firesheep and other Sidejacking Attacks with SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the Firesheep Wi-Fi attack tool and other sidejacking attacks with SSL and explains how to avoid these attacks.
Posted: 15 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Infographic: Data Traffic Security is a Mess
sponsored by Certes Networks
WHITE PAPER: This infographic visually displays the sobering results of a recent survey on what are IT decision makers doing to secure and segment their sensitive data traffic.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Certes Networks

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

It's Time to Get Serious About Protecting Sensitive Data in Transit
sponsored by Certes Networks
WHITE PAPER: This white paper explains why it's long past time to get serious about protecting your sensitive data as it travels across networks, and also lists 3 steps that you can take to avoid being a hacking statistic in 2015.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

Certes Networks

The Current Chaotic State of Data Traffic Security
sponsored by Certes Networks
WHITE PAPER: This white paper explores the results of a survey of more than 6 million IT professionals that aimed to discover how companies across the globe handle data in motion and other IT security issues. The results made one thing apparent: Data traffic encryption is a mess.
Posted: 06 Jan 2015 | Published: 16 Dec 2014

Certes Networks

How to Ensure Web and App Performance by Addressing the Front End
sponsored by Limelight Networks, Inc.
WHITE PAPER: The following white paper explores what companies need to do to ensure the performance of web and mobile applications. Uncover how front end acceleration can help achieve the desired speed, which technologies make this goal a reality, and how to apply the front end acceleration to 3 key areas.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Limelight Networks, Inc.

Battle of the Ethernet Switches: Cisco vs. NETGEAR
sponsored by IT Central Station
ESSENTIAL GUIDE: Have you ever wondered exactly how many options there are for purchasing enterprise level Ethernet switches? Take a look at this comprehensive list of all enterprise Ethernet switches in this expert report which includes real user reviews from IT professionals, like you.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Product vs. Product: Everything you need to know before you buy
sponsored by IT Central Station
ESSENTIAL GUIDE: When making a buying decision for Application Performance Management, it can be challenging to know which product is the best fit for you and your organization. To make your decision easier, IT Central Station is offering you a comprehensive, unbiased guide of the most popular APM products on the market today.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


CW Buyer's Guide: Emerging technologies in networking
sponsored by ComputerWeekly.com
EBOOK: Check out this extensive buyers' guide to explore technologies that are designed to improve networking, and for an inside glance at what established suppliers are doing to re-invent their offerings.
Posted: 09 Jan 2015 | Published: 06 Jan 2015

ComputerWeekly.com

Resolve to Revitalize Your SIEM Security
sponsored by SearchSecurity.com
EBOOK: It's a new year, with new threats. Here's a thorough examination of four capabilities some new security information and event management (SIEM) products are offering.
Posted: 07 Jan 2015 | Published: 07 Jan 2015

SearchSecurity.com

Forrester on Addressing IT Challenges in Today's Mobile World
sponsored by Commvault
WEBCAST: In this webcast, Rachel Dines, senior analyst at Forrester Research, discusses the effect that data growth is having on an ever-changing IT landscape, and how the future will be defined by flexible solutions featuring converged backup and archive.
Posted: 30 Dec 2014 | Premiered: Feb 28, 2013

Commvault

The Transformation of Wireless Network Security
sponsored by SearchSecurity.com
EBOOK: Learn how to integrate Wi-Fi security into your overall network strategy to help maintain security in the age of wireless connectivity.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

SearchSecurity.com
201 - 225 of 1288 Matches Previous Page    7 8 9 10 11 12    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement