IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
201 - 225 of 1533 Matches Previous Page  |  Next Page
Get a 30-Day Free Trial of Array's vAPV Virtual Load Balancer
sponsored by Array Networks
TRIAL SOFTWARE: Available for leading hypervisors and public clouds, as well for Array's Network Functions Platforms, Array's virtual load balancing solutions support all of the features and functionality of Array's dedicated hardware appliances.
Posted: 18 Jul 2017 | Premiered: 18 Jul 2017

Array Networks

Webinar: Cost-Effectively Replacing Juniper SSL VPNs
sponsored by Array Networks
WEBCAST: View this Webinar, which includes a demo of Array Networks SSL VPN features and capabilities, to learn how to meet future requirements for enterprise-class secure remote and mobile access.
Posted: 18 Jul 2017 | Premiered: Jul 18, 2017

Array Networks

Solution Brief: Running Fortinet FortiGate on Network Functions Platforms
sponsored by Array Networks
RESOURCE: Download this resource to learn how two industry leaders are combining best-of-breed solutions in virtual application delivery and next-generation firewalls to provide all the benefits of virtualization with the performance level of dedicated hardware appliances.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

Array Networks

Simple AWS Networking with Application Defined SD-WAN
sponsored by AWS – Riverbed
WHITE PAPER: Many organizations that deploy the cloud are challenged with legacy network infrastructure and management tools. This white paper looks at how Riverbed SD-WAN can help organizations improve performance, agility, and security. Learn more about how to leverage your cloud-centric network.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

AWS – Riverbed

Solution Brief: Running Application Firewalls on Network Functions Platforms
sponsored by Array Networks
RESOURCE: Learn how two industry leaders are combining best-of-breed solutions in virtual application delivery and web application security to provide all the benefits of virtualization with the performance level of dedicated hardware appliances.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Array Networks

View a Product Demo of Array APV Series ADCs
sponsored by Array Networks
VIDEO: View this demo to gain an understanding of the features, capabilities and benefits of Array's APV Series application delivery controllers (ADCs).
Posted: 14 Jul 2017 | Premiered: 27 Oct 2016

Array Networks

View a Product Demo of Array AG Series SSL VPNs
sponsored by Array Networks
VIDEO: View this demo to gain an understanding of the features, capabilities and benefits of Array's AG Series SSL VPN appliances.
Posted: 14 Jul 2017 | Premiered: 27 Oct 2016

Array Networks

The $38 Billion Security Vulnerability Your Enterprise Can't Afford to Ignore: Phone and Video Hacking
sponsored by Vyopta
WHITE PAPER: An architecture firm was surprised by a $166,000 phone bill they accrued in 1 weekend, and found that hackers had placed premium-rate phone calls through their network. Telecom fraud is a multi-billion dollar threat you can't afford. Learn about the impact of this threat, as well as immediate tactics to prevent telecommunications hacking.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Vyopta

Recovering From a "WannaCry" Infection Without Paying
sponsored by Actifio
PRODUCT DEMO: Did you get hit with a WannaCry ransomware attack? In this, demo, learn how to easily combat a WannaCry attack by using Actifio to restore your file server to a clean point-in-time and recover your files, without paying any ransom.
Posted: 12 Jul 2017 | Premiered: 12 Jul 2017

Actifio

Print security: An imperative in the IoT era
sponsored by ComputerWeekly.com
ANALYST REPORT: Analyst group Quocirca gives the perspective on the risks and best practices of print security.
Posted: 10 Jul 2017 | Published: 10 Jul 2017

ComputerWeekly.com

Solution Brief: AVX Series Network Functions Platforms
sponsored by Array Networks
RESOURCE: In this resource, learn how Array Networks empowers enterprise NFV adoption through key unique capabilities.
Posted: 26 Jun 2017 | Published: 15 May 2017

Array Networks

Public Employees' Retirement System Increases Network Visibility and Streamlines Security
sponsored by Gigamon
CASE STUDY: Discover how Public Employees' Retirement System enabled full visibility into their entire network and bolstered their security posture. Find out how they enabled consistent access to key information, improved threat management, enhanced network security, and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Gigamon

Vela Trading Technologies Depends on Gigamon for Real-Time Troubleshooting
sponsored by Gigamon
CASE STUDY: Discover how Vela Trading Technologies bolstered their network security without hindering employee productivity. Find out how they enhanced traffic monitoring, behavioral analytics, data protection, troubleshooting, and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Gigamon

Advanced SD-WAN: Accelerating Digital Transformation and Powering the Cloud-Connected Enterprise
sponsored by Silver Peak
WHITE PAPER: With cloud becoming more of a factor in digital business transformation, many are now looking to SD-WAN to help connect their business. This IDC report discusses the current state of SD-WAN and why so many organizations are adopting it. Find out what benefits these organizations expect SD-WAN to deliver, several use cases, and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Silver Peak

Evaluation Guide: Criteria for Choosing an Enterprise SSL VPN
sponsored by Array Networks
RESOURCE: Download this SSL VPN evaluation guide to help identify, describe and prioritize the criteria you should consider when selecting an SSL VPN solution that best fits the needs of your organization.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Array Networks

See What Matters: Closing Gaps in Network Visibility
sponsored by Gigamon
RESOURCE: Explore some of the top reasons why IT and security pros struggle to drive deep visibility across their networks and uncover strategies for closing critical gaps in network security.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

Gigamon

Troubling Trends in Network Security
sponsored by Gigamon
RESOURCE: Learn about which key issues are complicating network security, making it significantly harder than ever before, and find out how to combat with strategies for automation, networking monitoring, and analytics.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

Gigamon

Array Networks: The Network Functions Platform Company
sponsored by Array Networks
BROCHURE: Learn how Array Networks empowers enterprise NFV adoption through the flexibility of cloud and virtualization, the performance of purpose-built appliances, best-of-breed networking, security and app delivery funcitons, and more.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Array Networks

Overcoming the Human Factor with Visibility-Centric Security
sponsored by Gigamon
RESOURCE: Discover how security pros can identify internal blind spots and overcome the shortcomings of prohibition-based security. Learn about a visibility platform that lets you verify and control network traffic without limiting employee productivity.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Gigamon

Top-10 Reasons for Selecting Array Networks Load Balancers
sponsored by Array Networks
RESOURCE: Discover the 10 most compelling reasons customers are choosing Array Networks load balancers to meet their application availability, performance and security requirements. Build your awareness of ADCs that are simple yet powerful and scalable yet cost-effective, and designed to meet technical requirements without compromising timelines or budgets.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Array Networks

Pervasive Visibility Platform – A New Approach to Network Monitoring
sponsored by Gigamon
WHITE PAPER: Learn how to use a 4-tiered visibility platform to update your network monitoring and management toolset for SDN and NFV, driven by actionable data for traffic intelligence, orchestration, network security, and more.
Posted: 20 Jun 2017 | Published: 31 Mar 2017

Gigamon

Top 10 Reasons for Selecting an Array Networks SSL VPN
sponsored by Array Networks
RESOURCE: Discover 10 reasons customers are choosing an Array Networks SSL VPN to provide secure access to remote applications and remote data centers. Build your awareness of next-generation SSL VPNs that are simple yet flexible and scalable yet cost-effective, and designed to drive business productivity while minimizing network exposure.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Array Networks

Top 7 Reasons to Optimize Network Security with a Security Delivery Platform
sponsored by Gigamon
EBOOK: Uncover the top 7 reasons to optimize your network security model with a security delivery platform, ranging from evolving attacks like malware-as-a-service to the rise of SecOps.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

Gigamon

Top 5 IoT Deployment Best Practices
sponsored by Hewlett Packard Enterprise
RESOURCE CENTER: Overcome potential barriers to IoT adoption by uncovering 5 best practices for creating successful IoT deployments with end-to-end network security, automatic app performance optimization, smart monitoring of wired and wireless infrastructure, and more.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

Hewlett Packard Enterprise

How the Internet of Things Is Transforming Industries and the Nature of Work
sponsored by Hewlett Packard Enterprise
WEBCAST: Jeff Kaplan, managing director and founder of THINKstrategies, provides his expert insight into what the IoT is all about, including the benefits and challenges you can expect. Learn how to create a digital workplace via IoT, how the IoT increases your security risks, and much more.
Posted: 13 Jul 2017 | Premiered: Jul 13, 2017

Hewlett Packard Enterprise
201 - 225 of 1533 Matches Previous Page    7 8 9 10 11 12    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement