IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
201 - 225 of 1644 Matches Previous Page  |  Next Page
DDoS Attack Analysis
sponsored by Thousandeyes
WHITE PAPER: ThousandEyes highlights the impact of an ongoing DDoS attack, provides visibility into the effectiveness of the mitigation and provides insight into the strategies of DDoS mitigation vendors.
Posted: 06 May 2016 | Published: 06 May 2016

Thousandeyes

7 Trends Impacting Enterprise Campus Networks
sponsored by Juniper Networks, Inc.
WHITE PAPER: Reliance upon cloud applications for mission-critical business functions has heightened network requirements at the edge. Discover in this exclusive white paper 7 prevalent issues in today's enterprise campus networks, and how to leverage a cloud-enabled network to seamlessly glue your network edge to the cloud and optimize your cloud applications.
Posted: 06 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Outsource IT Services While Maintaining Control and Transparency
sponsored by Juniper Networks, Inc.
EGUIDE: Find advice on how to choose the right service providers – and avoid the worst ones – for IT security and support in this expert e-guide.
Posted: 06 May 2016 | Published: 02 May 2016

Juniper Networks, Inc.

Enhance Productivity with Managed Mobile Office Apps
sponsored by TechData Corporation
WHITE PAPER: In 2017, 90% of enterprises will have 2 or more mobile operating systems to support. IT teams are under immense pressure to manage this influx of mobile devices. Discover a comprehensive cloud solution that will manage identities, devices, apps, and data in your enterprise, and learn how to leverage EMM for Office365.
Posted: 05 May 2016 | Published: 31 Dec 2015

TechData Corporation

The Evolution of Wireless Business Continuity
sponsored by Accelerated Concepts
WHITE PAPER: Discover in this white paper how to avoid expensive outages and downtime that drastically impact your reputation by formulating a business continuity plan with first-class connectivity. Learn how to take advantage of the expanding IoT to back up your business-critical data, devices, and more.
Posted: 05 May 2016 | Published: 31 Jan 2016

Accelerated Concepts

The top four cybercrime trends
sponsored by IBM
WHITE PAPER: This report highlights four key cybercrime trends that were observed throughout 2015, including an increase in "onion-layered" security incidents, ransomware attacks and insider threats. Access now to figure out how your organization can easily find the footprints attackers leave behind.
Posted: 05 May 2016 | Published: 31 Dec 2015

IBM

Extend Security and Control from the Data Center Edge to the Core
sponsored by VMware
EBOOK: The average total cost of a data breach for companies increased 23% on a year-over-year basis to a whopping $3.79 million in 2015. Micro-segmentation through network virtualization allows your security team to focus on the problem areas and minimize resource usage. Access this e-book to learn more about this strategy to better secure your data.
Posted: 05 May 2016 | Published: 29 Apr 2016

VMware

Discovering Security Analytics Use Cases
sponsored by Prelert
RESOURCE: In this resource, discover how to tailor your security analytics to detect certain behaviors associated with threats advancing on your organization. Select each threat indicator to examine its particular attack progression stages for data exfiltration activity, compromised endpoints, and more.
Posted: 05 May 2016 | Published: 05 May 2016

Prelert

Enterprise Campus Architectures—Transformed
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover in this resource the benefits of collapsing your entire enterprise network into a single platform—including guarantees of increased agility and improved user satisfaction. Read now to deploy cloud network architecture that accommodates your unending need for more bandwidth.
Posted: 05 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Discover the Best Ways to Manage Shadow IT
sponsored by Juniper Networks, Inc.
WHITE PAPER: Should you eliminate, coexist with, or embrace shadow IT? Access this guide to discover the current trends driving the rise of shadow IT, explore the drawbacks and benefits it offers, and learn how designing and building the right network is essential for your preferred shadow IT strategy.
Posted: 05 May 2016 | Published: 05 May 2016

Juniper Networks, Inc.

What to Look for in Secure Sockets Layer
sponsored by SearchSecurity.com
EBOOK: This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
Posted: 04 May 2016 | Published: 04 May 2016

SearchSecurity.com

Build a wiser WAN
sponsored by Verizon
WHITE PAPER: The need for efficient and reliable cloud and mobile technologies is creating a demand for better application performance. Read on to learn how software-defined wide area network (SD-WAN) overcomes the obstacles and demands of mobile technologies, and how it is just the first step in aligning your IT with your business.
Posted: 04 May 2016 | Published: 30 Sep 2015

Verizon

ZK Research Report on Network Management Issues
sponsored by Ixia
WHITE PAPER: ZK Research (a Zeus Kerravala company) conducted a network management survey and inside reviews the results, including the need for application strengthening and the market forces driving this need.
Posted: 04 May 2016 | Published: 01 Apr 2016

Ixia

Network Testing Types to Ensure Top Performance, ROI and Security
sponsored by Ixia
WHITE PAPER: Testing is a crucial part of the lifecycle of networks, products, and services across technology as change becomes more rapid and complexity increases. Testing not only helps project meet or exceed expectations, but also improves ROI and security. Learn about the 5 types of testing and where to focus against each area for maximum performance.
Posted: 04 May 2016 | Published: 01 Mar 2016

Ixia

Ensuring Document Security Across Any Device
sponsored by BlackBerry
WHITE PAPER: Mobile devices have become more common in the workplace and produced a goal of ensuring that sensitive documents can be shared and accessed securely from any device. Access this white paper to learn about a solution that circumvents device management and instead allows for management of the documents themselves.
Posted: 04 May 2016 | Published: 05 Apr 2016

BlackBerry

Top 3 Reasons Your Enterprise Network Matters More in the Cloud Era
sponsored by Juniper Networks, Inc.
WHITE PAPER: Explore the top 3 IT trends that will impact your cloud networking strategy, and learn how to build a network that's 100% cloud-ready. Read on to prepare your network for high bandwidth demands, high SLAs, increased scalability and security requirements, and more.
Posted: 04 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Top 3 Ways to Modernize Your Enterprise Campus Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: When your organization moves to cloud-driven business models, you must decide upon the right technologies and partners to facilitate a successful transition. Read this white paper that examines the most important considerations when deciding upon a vendor to help you modernize and secure your enterprise campus and branch network infrastructure.
Posted: 04 May 2016 | Published: 04 May 2016

Juniper Networks, Inc.

Security From the Inside Out
sponsored by Fortinet, Inc.
EBOOK: This e-book discusses the failings of traditional perimeter-based security measures, and shows how specialized internal segmentation firewalls can help your network respond to modern threats.
Posted: 03 May 2016 | Published: 03 May 2016

Fortinet, Inc.

Networking Cloud Computing is Open (Source) for Business (Model)
sponsored by Juniper Networks, Inc.
EGUIDE: Open source cloud infrastructure tools are cost-effective and highly extensible, but they also pose network and other challenges. Access this e-guide to get an expert's take on five common user issues with open source cloud infrastructure tools, and how solution providers can take the first steps toward a cloud business model.
Posted: 03 May 2016 | Published: 28 Apr 2016

Juniper Networks, Inc.

Brasfield and Gorrie builds productivity and security with paperless collaboration
sponsored by Citrix
MICROSITE: Mobility is becoming the business norm and requirement from employees. This resource highlights a solution that allows employees to collaborate, share files and data remotely without hindering security or taking visibility and control from IT.
Posted: 03 May 2016 | Published: 31 Dec 2013

Citrix

Internal Segmentation Firewall Deployment Guide
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper presents both a design approach as well as a reference architecture for implementing an firewall strategy for your enterprise.
Posted: 02 May 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Is Your Network Too Flat? Prevent Data Breaches with Segmentation
sponsored by SearchSecurity.com
EZINE: How do you determine if your network is too flat? Without proper network segmentation attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure.
Posted: 02 May 2016 | Published: 02 May 2016

SearchSecurity.com

The Total Economic Impact Of Forcepoint's SureView Insider Threat
sponsored by Forcepoint
WHITE PAPER: This Forrester report shows you an appliance-based security system that monitors and investigates internal threats across all endpoints and channel communications. View not and learn how you can gain visibility that other network devices cannot.
Posted: 02 May 2016 | Published: 01 Oct 2014

Forcepoint

Virtualization Best Practices Guide
sponsored by Kaspersky Lab
WHITE PAPER: This white paper shows you how to best protect your virtual desktops through a wide range of Windows-based environments. Access now and learn how to get file-level anti-malware protection, network-level protection and cloud-assisted, real time threat data and the best security approach for your organization's needs.
Posted: 02 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

Expertise from Authorized Professional Services Providers, Available On-Demand
sponsored by Juniper Networks, Inc.
WHITE PAPER: Do you have a network project but no expertise on staff? Access this brochure to find available services for your network that are simple and fast, from posting your project to instant connection with the perfect partner and/or service provider that best suits your project goals and budget.
Posted: 02 May 2016 | Published: 02 May 2016

Juniper Networks, Inc.
201 - 225 of 1644 Matches Previous Page    7 8 9 10 11 12    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement