IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
201 - 225 of 1281 Matches Previous Page  |  Next Page
Can New Security Tools Keep Your Network Clean?
sponsored by SearchSecurity.com
EZINE: This issue provides network and security IT pros with step-by-step guidance so they can decide what advanced security monitoring tools are right for their network's particular needs.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

SearchSecurity.com

10 Things Security Experts Wish End Users Knew
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you'll learn the 10 concerns that security experts want end users to know about security at work and at home.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge

Strengthening Security From the Inside Out
sponsored by Mimecast
WEBCAST: Listen to guest speaker Nick Hayes from Forrester Research and Steve Malone from Mimecast for insight into how technology and awareness together can strengthen defenses.
Posted: 26 Jun 2015 | Premiered: Jun 10, 2015

Mimecast

Buyer's Essentials: What to Look for in an EMM Strategy
sponsored by SearchSecurity.com
EBOOK: EMM products can contain a variety of features -- for mobile device management, mobile app management, mobile content management and more -- so they vary greatly. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

SearchSecurity.com

Unlock Your Customer Identities: Virtualize SQL to Deliver Better Security and Services
sponsored by Radiant Logic, Inc.
WEBCAST: This webinar explains how a common identity service for all constituents can improve security and deliver better services to your customers.
Posted: 25 Jun 2015 | Premiered: Mar 9, 2015

Radiant Logic, Inc.

Defending Against Advanced Threats at the Identity Perimeter
sponsored by SecureAuth
WHITE PAPER: This white paper explores how identity has become the new perimeter and the challenges that lie ahead.
Posted: 17 Jun 2015 | Published: 27 May 2015

SecureAuth

Case Study: How Varian Medical Systems Employees Became More Productive with Mobile Solutions
sponsored by MobileIron
WHITE PAPER: In this white paper, you'll learn how Varian Medical Systems made its employees more productive with mobile devices while staying in control of devices and applications.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

MobileIron

Case Study: World's First Cloud-Enabled G20 Leaders' Summit
sponsored by Dimension Data
CASE STUDY: This case study explains how they deployed a fully consumptive network solution, including Wi-Fi, security, BYOD management, and a bespoke virtualized desktop to provide a seamless user experience.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

Dimension Data

Fortinet Threat Trends in 2015
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper presents today's four most significant cyber-security threats from the hacker's perspective. Access this resource to learn the steps that you need to take to protect your organization from being the next breach victim, as well as how to shift from a reactive to a proactive security approach.
Posted: 05 Jun 2015 | Published: 25 Feb 2015

Fortinet, Inc.

Preventing Attackers from Getting What They Want
sponsored by SecureAuth
WHITE PAPER: This white paper explores the danger of a modern attack and discusses why traditional security tools, such as basic authentication, are insufficient.
Posted: 11 May 2015 | Published: 25 Mar 2015

SecureAuth

Top 10 Firewall Shopping Checklist
sponsored by Juniper Networks, Inc.
RESOURCE: In this white paper, you will learn the 10 necessary functions of a next-gen firewall to mitigate evolving dynamic threats.  View this helpful buyer's guide now to learn more.
Posted: 11 May 2015 | Published: 06 May 2015

Juniper Networks, Inc.

Security on the Edge Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom looks at enterprise strategies for network perimeter defense and next-gen models such as network access control, single sign-on, encryption certificates and more.
Posted: 05 May 2015 | Premiered: 04 May 2015

SearchSecurity.com

Red Tiger Security: Printer and Embedded Device Security
sponsored by HP Limited
WHITE PAPER: Download this Red Tiger Security Paper, Printer and Embedded Device Security, and see where and how bad guys exploit print devices—and the measures you can take to stop them.
Posted: 04 May 2015 | Published: 07 Apr 2015

HP Limited

Intralinks® Information Rights Management
sponsored by IntraLinks, Inc
DATA SHEET: Access this data sheet to learn about an Information Rights Management tool that can secure your content.
Posted: 30 Apr 2015 | Published: 31 Dec 2014

IntraLinks, Inc

Mobile Device Management in Education: Will MDM Make the Grade?
sponsored by IBM
WHITE PAPER: This white paper outlines how mobility implemented at all grade levels can transform school districts and higher education organizations into more innovative institutions. Read on and discover the true ROI and benefits of education mobility, and find out how it can help your organization.
Posted: 29 Apr 2015 | Published: 26 Dec 2014

IBM

Mobile Device Management for the Manufacturing Industry
sponsored by IBM
WHITE PAPER: Access this white paper now to learn how your company can implement a secure mobile strategy that won't cause headaches for your IT department to manage. Discover a simple solution to enterprise mobility management that any company can enjoy.
Posted: 27 Apr 2015 | Published: 26 Dec 2014

IBM

Extend Security and Control from the Data Center Edge to the Core
sponsored by VMware
WHITE PAPER: This white paper explores how to enable comprehensive data center security through network virtualization. Access now to learn how to overcome the three major issues with traditional network security and how to defend your data center from within.
Posted: 21 Apr 2015 | Published: 04 Mar 2015

VMware

Comprehensive Data Protection Against Insider & Outsider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explores how you can implement data protection that travels with your data regardless of location or device.
Posted: 14 Apr 2015 | Published: 25 Mar 2015

Digital Guardian

SSL Traffic Management to Meet Your Needs
sponsored by Blue Coat Systems
WHITE PAPER: In this infographic, discover a tool that gives you the all the capabilities you need for effective traffic monitoring.
Posted: 09 Apr 2015 | Published: 28 Feb 2015

Blue Coat Systems

Under Threat or Compromise Every Detail Counts
sponsored by Blue Coat Systems
WHITE PAPER: This white paper breaks down the five essential steps of security management to help you create a more comprehensive defense suited for today's threat landscape.
Posted: 08 Apr 2015 | Published: 31 Aug 2014

Blue Coat Systems

2015 Cyberthreat Defense Report
sponsored by Blue Coat Systems
WHITE PAPER: This report, which focuses specifically on IT security management, uses research to reveal what areas of security you should turn your attention to.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Blue Coat Systems

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and describes how encrypted traffic management can help mitigate these risks.
Posted: 07 Apr 2015 | Published: 09 Dec 2013

Blue Coat Systems

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: This white paper walks you through security policies to ensure that data doesn't leak out through encrypted tunnels. Read on now to learn how to improve your security strategy.
Posted: 07 Apr 2015 | Published: 20 Jan 2015

Blue Coat Systems

Security Analytics Moves to Real-Time Protection
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover a security analytics platform that works in real time.
Posted: 07 Apr 2015 | Published: 31 Jul 2014

Blue Coat Systems

Information Security Magazine – May 2015 Issue
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we study perimeter network security in the mobile and cloud era, and strategies to secure access from application-layer protection to single sign-on technologies.
Posted: 01 May 2015 | Published: 30 Apr 2015

SearchSecurity.com
201 - 225 of 1281 Matches Previous Page    7 8 9 10 11 12    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement