IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
201 - 225 of 1536 Matches Previous Page  |  Next Page
Network Strategies that Will Help You Eliminate, Embrace, or Coexist with Shadow IT
sponsored by Juniper Networks, Inc.
WHITE PAPER: Shadow IT is here. Access this e-guide for the current trends driving the rise of shadow IT, explore the drawbacks and benefits it offers, and learn how designing and building the right network is essential for your preferred shadow IT strategy.
Posted: 05 May 2016 | Published: 05 May 2016

Juniper Networks, Inc.

What to Look for in Secure Sockets Layer
sponsored by SearchSecurity.com
EBOOK: This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
Posted: 04 May 2016 | Published: 04 May 2016

SearchSecurity.com

Build a wiser WAN
sponsored by Verizon
WHITE PAPER: The need for efficient and reliable cloud and mobile technologies is creating a demand for better application performance. Read on to learn how software-defined wide area network (SD-WAN) overcomes the obstacles and demands of mobile technologies, and how it is just the first step in aligning your IT with your business.
Posted: 04 May 2016 | Published: 30 Sep 2015

Verizon

Ensuring Document Security Across Any Device
sponsored by BlackBerry
WHITE PAPER: Mobile devices have become more common in the workplace and produced a goal of ensuring that sensitive documents can be shared and accessed securely from any device. Access this white paper to learn about a solution that circumvents device management and instead allows for management of the documents themselves.
Posted: 04 May 2016 | Published: 05 Apr 2016

BlackBerry

Top 3 Reasons Your Enterprise Network Matters More in the Cloud Era
sponsored by Juniper Networks, Inc.
WHITE PAPER: Traditional networks simply can't handle all the implications of the cloud. Explore the top 3 IT trends that will impact your cloud networking strategy, and learn how to build a network that's 100% cloud-ready.
Posted: 04 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

3 Ways to Modernize Your Enterprise Network and Optimize Cloud Investments
sponsored by Juniper Networks, Inc.
WHITE PAPER: When your organization moves to cloud-driven business models, you must decide upon the right technologies and partners to facilitate a successful transition. Read this white paper that examines the most important considerations when deciding upon a vendor to help you modernize and secure your enterprise campus and branch network infrastructure.
Posted: 04 May 2016 | Published: 04 May 2016

Juniper Networks, Inc.

Security From the Inside Out
sponsored by Fortinet, Inc.
EBOOK: This e-book discusses the failings of traditional perimeter-based security measures, and shows how specialized internal segmentation firewalls can help your network respond to modern threats.
Posted: 03 May 2016 | Published: 03 May 2016

Fortinet, Inc.

Brasfield and Gorrie builds productivity and security with paperless collaboration
sponsored by Citrix
MICROSITE: Mobility is becoming the business norm and requirement from employees. This resource highlights a solution that allows employees to collaborate, share files and data remotely without hindering security or taking visibility and control from IT.
Posted: 03 May 2016 | Published: 31 Dec 2013

Citrix

Is Your Network Too Flat? Prevent Data Breaches with Segmentation
sponsored by SearchSecurity.com
EZINE: How do you determine if your network is too flat? Without proper network segmentation attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure.
Posted: 02 May 2016 | Published: 02 May 2016

SearchSecurity.com

Data Centers at the Edge
sponsored by Schneider Electric
WEBCAST: In this webcast, you will discover the benefits and boons of localized data centers on the network edge—paving the way for new capabilities deployed into the network. Tune in now to power the digitization of your business, and learn the different data center localization offers now available.
Posted: 02 May 2016 | Premiered: May 2, 2016

Schneider Electric

Why extending Your VPN to the cloud will bring better performance and security
sponsored by AT&T
WHITE PAPER: As more applications get delivered through cloud models, IT must ensure maximum performance and availability. Why should you look to extend the capabilities of a VPN that is already in place? Learn the benefits of VPN-based connectivity for the cloud inside.
Posted: 29 Apr 2016 | Published: 20 Apr 2016

AT&T

Defend Against the Undetected
sponsored by Fortinet, Inc.
WHITE PAPER: Your network can no longer rely on perimeters with today's cybercriminals. You must have a comprehensive internal and external solution designed to protect your perimeter, your core, your endpoint and everything else in-between. Learn how you can effectively detect, prevent and remediate a threat before it succeeds.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Maximize Network Security and Simplify Operations with Automated Access Policies
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover in this paper how to leverage a next-generation cloud infrastructure that builds on advances in virtualization and automation to deliver greater agility, cost savings and enhanced security to your enterprise network.
Posted: 29 Apr 2016 | Published: 29 Apr 2016

Juniper Networks, Inc.

Six Steps To A Better Security Strategy
sponsored by AllClear ID
WHITE PAPER: In this white paper, you'll learn six steps to create an effective security strategy that's linked with key business interests for great success.
Posted: 29 Apr 2016 | Published: 22 Jan 2016

AllClear ID

University of Texas at Austin Ensures Network Security for its Distributed Campus
sponsored by Splunk
WHITE PAPER: Access this brief case study to learn how one top-ranked state research university saw significant benefits when they implemented a tool that met the needs of network and information security analysis. Uncover the benefits they achieved by helping their analysts investigate security threats and incidents faster and more accurately.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Splunk

Building An Effective Breach Detection And Response Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: This Forrester Research Inc. report shows you the benefits of implementing sandbox solutions to meet your security demands. Modern sandboxed are able to virtually replicate operating environments, execute suspicious code and observe behavior. Access now to best quell sophisticated attackers and prevent future ones.
Posted: 28 Apr 2016 | Published: 31 Oct 2015

Fortinet, Inc.

Get Ahead of Threats: Securing Your Network & Application Infrastructure
sponsored by Fortinet, Inc.
EBOOK: This e-book is a collection of 24 essays from industry leaders on a broad array of network security topics. Gain tips on how to build and execute your network security plan, stay ahead of hackers, and more.
Posted: 27 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Total Economic Impact of IBM Security Network Protection (XGS), Forrester Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This white paper examines the benefits you will realize by deploying next generation intrusion prevention. Access now to discover how next-gen IPS could impact your organization.
Posted: 27 Apr 2016 | Published: 01 Feb 2016

IBM

How advanced endpoint protection is stopping fraudsters in their tracks
sponsored by IBM
WHITE PAPER: This white paper teaches you why antivirus software and firewalls on consumer endpoints aren't sufficient to combat today's sophisticated hacking tools. Access now to learn common misconceptions about endpoint protection and what unexpected benefits you can realize by extending protection to customer endpoints.
Posted: 26 Apr 2016 | Published: 01 Oct 2015

IBM

IBM 2015 Cyber Security Intelligence Index for Information and Communication
sponsored by IBM
WHITE PAPER: This white paper outlines cyber attack incidents of organizations in the information and communications industry. Access now to learn about past trends of cyber criminals and what to look for in the future of cyber crime.
Posted: 25 Apr 2016 | Published: 31 Dec 2015

IBM

Overview of the Asia-Pacic Intrusion Detection & Prevention Systems Market
sponsored by IBM
WHITE PAPER: This white paper shows you how greatly IDS/IPS is growing in Asia Pacific and methods they are using to stay ahead of advanced threats. Access now and learn how to improve your organization's awareness of these threats and prepare yourself against sophisticated attacks in the future.
Posted: 25 Apr 2016 | Published: 31 Dec 2015

IBM

Best Practices for Protecting Patient Data in the Cloud
sponsored by Digital Guardian
WHITE PAPER: Now that many healthcare organizations are using cloud computing to store and share sensitive patient information, they must figure out how to extend data loss prevention (DLP) strategies to include cloud storage. Discover best practices for applying DLP to the cloud.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Digital Guardian

Detecting Malware-Free Intrusions and Advanced Cyber Threats with Anomaly Detection and "Behavioral MD5" of Endpoint Processes
sponsored by Prelert
ANALYST REPORT: This report shows you how machine learning can detect changes in endpoint process behavior to help protect your business. Access now to learn how you can automate the analysis of data by looking for helpful anomalies that indicate malicious activity.
Posted: 25 Apr 2016 | Published: 29 Feb 2016

Prelert

Machine Learning: Perception Problem? Maybe. Pipe Dream? No Way!
sponsored by Prelert
ANALYST REPORT: This report dispels misconceptions about machine learning and explains what its actual application is. Access now to learn about recent developments in machine learning-based security analytics capabilities.
Posted: 25 Apr 2016 | Published: 29 Jan 2016

Prelert

Machine Learning Is Cybersecurity’s Answer to Detecting Advanced Breaches
sponsored by Prelert
ANALYST REPORT: This blog post talks about replacing legacy safeguards with new machine learnings, the heart of IT's shift in mindset. Access now to learn how to focus on identifying potential threats early rather than reacting to threats after they happen.
Posted: 25 Apr 2016 | Published: 21 Mar 2016

Prelert
201 - 225 of 1536 Matches Previous Page    7 8 9 10 11 12    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement