IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network SecurityReports
201 - 225 of 1181 Matches Previous Page  | Next Page
Build a Network that Meets the Enterprise Standard of Security
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper examines how your organization can meet the challenges of securing and managing a modern network by embracing a perimeter model based on logical controls that consistently enforce enterprise policy wherever an asset is located.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Palo Alto Networks

Next Generation Network Security Guide
sponsored by TechTarget
RESOURCE: Mobile devices are exploding in enterprises everywhere. Unfortunately, managing this dynamic world of communication is complex and daunting. This guide showcases how to deploy network security devices and how to avoid deployment failures.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

TechTarget

Endpoint Security Technology
sponsored by TechTarget
RESOURCE: With the increasing number of client devices-endpoints, IT is challenged with managing this sheer volume of endpoints as your organization is left with multiple vulnerabilities. This expert guide details how endpoint protection software can help block malicious network traffic while providing secure access to your sensitive business data.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

NSS Labs:  2013 Next Generation Firewall Security Value Map
sponsored by Fortinet, Inc.
WHITE PAPER: This crucial white paper uses analytical data of the top next generation firewall solution on the market to create a security value map (SVM). Find out which tool offers the most effective services and which best satisfies your organization's specific needs.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Fortinet, Inc.

The Next Generation of Firewalls: How to Stop Tomorrow's Advanced Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper discusses the next generation firewall, examining its market drivers, critical requirements and how it is extending to respond to the ever-changing needs of the modern enterprise.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Fortinet, Inc.

Purchase Intentions – Summer 2013 Europe
sponsored by TechTarget
RESOURCE: Making the right purchasing decisions is a daunting task, especially when it concerns the well-being of your organizations network. By taking this brief survey you will gain access to this exclusive guide based off a survey completed by over 600 respondents on purchase intentions. Learn what drives purchases, what is being purchased, and much more!
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Modern network security for modern threats
sponsored by Palo Alto Networks
WHITE PAPER: This exclusive paper discusses the current state of network security and examines a set of flexible solutions that account for changes to applications, threats, and users, providing air-tight security.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Palo Alto Networks

Achieve Deeper Network Security and Application Control (eBook)
sponsored by Dell Software
EBOOK: Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we knew it. Traditional firewalls that only focus on stateful packet inspection and access control rules are not effective in today's advanced-threat environment.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

Next-Gen Security
sponsored by Dell Software
WHITE PAPER: SSL decryption and inspection keeps attackers away from your data and out of your network. Choose security offerings that can mitigate the most risks. A good NGFW lets you block SSL-encrypted attacks as they happen.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

What Works in Detecting and Blocking Advanced Threats: A Real Case Study at a Large Research Organization
sponsored by FireEye
WHITE PAPER: Cybercriminals are always looking for new ways to infiltrate your system, making it essential to have an effective intrusion prevention system (IPS). This white paper explores one company's IPS platform and how it can greatly enhance your system security.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

FireEye

Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
sponsored by IBM
WHITE PAPER: This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Poison Ivy and Random Access Tools: What You Need to Know
sponsored by FireEye
WHITE PAPER: This guide explores the current threat landscape and more specifically Poison Ivy, a remote access tool that has been used in several high-profile malware campaigns. Read on to learn which tools you need to defend yourself from this form of cybercrime.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye

IBM QRadar Security Intelligence: Perception Capture Study
sponsored by IBM
WHITE PAPER: This Ponemon Institute report highlights the capabilities and benefits of one security incident event management (SIEM) solution.
Posted: 05 Mar 2014 | Published: 28 Feb 2014

IBM

Seven Strategies for Identifying Who’s Behind Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This informative guide breaks down the nature of malware attacks and what they reveal about the culprit, including their location, ties to other malware attacks, and connections to common threat factors.
Posted: 04 Mar 2014 | Published: 31 Dec 2013

FireEye

Networking Monitoring Best Practices: Setting A Network Performance Baseline
sponsored by Ixia
EGUIDE: Explore the necessities for a network performance baseline, potential challenges and how to overcome them with the tips and advice in this e-guide.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Ixia

Best Practices for Utilizing Network Monitoring Switches in Cisco Environments
sponsored by Ixia
WHITE PAPER: Access this white paper to discover how network monitoring switches can help overcome the challenges of deploying packet-based monitoring in a Cisco network.
Posted: 03 Mar 2014 | Published: 31 Mar 2013

Ixia

Transcript: Network Visibility: Thinking Outside the Box
sponsored by Ixia
PRESENTATION TRANSCRIPT: Explore how virtualization can challenge network monitoring, and discover a scalable solution that will help improve visibility for effective, scalable, secure network monitoring.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Ixia

Five Steps to Building Visibility and Security Into Your Network
sponsored by Ixia
WHITE PAPER: Discover five steps you need to take to not only build visibility and security into your network, but also get the most out of your current monitoring investments.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Ixia

Transforming Your WiFi Network Into A Secure Wireless LAN
sponsored by Fortinet, Inc.
WHITE PAPER: With businesses utilizing WLAN for BYOD strategies, it is more important than ever to secure your wireless networks. This guide explores a solution that allows a network of any size to take advantage of wireless technology without compromising the network's security.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Fortinet, Inc.

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Hewlett-Packard Company

Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
sponsored by Dell, Inc.
WHITE PAPER: This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

Dell, Inc.

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: Data intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

BYOD, mobile collaboration and network security
sponsored by Cisco
WHITE PAPER: This guide explores the current state of workplace mobility, BYOD and what you can do to ensure security for user-devices.
Posted: 19 Mar 2014 | Published: 31 Dec 2013

Cisco

How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This white paper explores the widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers.
Posted: 10 Mar 2014 | Published: 31 Dec 2013

FireEye
201 - 225 of 1181 Matches Previous Page    7 8 9 10 11 12    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement