IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
201 - 225 of 1553 Matches Previous Page  |  Next Page
Pervasive Security Enabled by Next Generation Monitoring Fabric
sponsored by Big Switch Networks
WHITE PAPER: As organizations become more reliant on their networks for critical functions, hackers are honing their focus on networks to increase the effectiveness of their attacks. Access this white paper to learn how to best protect your network.
Posted: 05 Apr 2016 | Published: 29 Dec 2015

Big Switch Networks

Big Monitoring Fabric 5.5
sponsored by Big Switch Networks
DATA SHEET: Network security and traffic monitoring are highly important to business. Review this data sheet to see the benefits this product can provide for your business's network.
Posted: 05 Apr 2016 | Published: 27 Jan 2016

Big Switch Networks

Moving Beyond MDM: Why Legacy Mobile Security Products Don’t Work
sponsored by Sierraware
WHITE PAPER: As organizations embrace BYOD, they need todevelop a strategy to protect corporate data and satisfy compliance while supporting a broad array of mobile devices and apps. Discover how a virtual mobile infrastructure can solve many BYOD security problems.
Posted: 05 Apr 2016 | Published: 30 Mar 2016

Sierraware

IDS Evaluation Guide
sponsored by AlienVault
WHITE PAPER: This white paper provides a useful reference for evaluating IDS tools. In it, you'll learn the critical components of host and network IDS, giving you real-time threat intelligence to quickly respond to threats.
Posted: 04 Apr 2016 | Published: 01 Mar 2016

AlienVault

How to Raise your Organization's Security Maturity Level
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

LogRhythm, Inc.

Overcome Security And Identity Management Challenges In Enterprise Mobility With The Right IT Infrastructure
sponsored by Microsoft
WHITE PAPER: Mobility is becoming an increasingly crucial tool in today's business landscape. Access this white paper to uncover the three key findings about risk management, security, and infrastructure that Forrester Research discovered during a study on enterprise mobility.
Posted: 31 Mar 2016 | Published: 30 Dec 2014

Microsoft

How to Choose the Right Cyber Threat Intelligence Provider
sponsored by SurfWatch Labs
WHITE PAPER: This white paper teaches you what your organization should look for from its threat intelligence software. Learn how to bring cybersecurity in line with your business operations, provide necessary context to prioritize and take meaningful action on specific threats.
Posted: 30 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

The Human Factor Report
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.
Posted: 29 Mar 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

4 Ways Hackers Break into Your Network – And How to Stop Them
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Despite heavy investments, networks are still seeing successful attacks. Access this white paper to learn about four fatal failures of network security and the actions you can take to fortify your defenses.
Posted: 29 Mar 2016 | Published: 27 Jan 2016

ForeScout Technologies, Inc.

Q4 Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: This report outlines next-generation security approaches to better fortify mobile enterprise deployments against malicious attacks. Access now to learn about the current mobile threat landscape and learn how you can better protect against new, evolving mobile malware.
Posted: 28 Mar 2016 | Published: 31 Dec 2015

MobileIron

ForeScout CounterACT- Datasheet
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explores ways to continuously monitor network traffic and ways to integrate your networking infrastructure to identify devices as soon as they access the network.
Posted: 28 Mar 2016 | Published: 31 Dec 2015

ForeScout Technologies, Inc.

Case Study: Northern Health and Social Care Trust
sponsored by ForeScout Technologies, Inc.
CASE STUDY: This case study of Northern Health shows you the steps they took to gain real-time visibility over all network devices while never interrupting their critical health and social care services. Access now to learn about how easy it is to gain real time visibility, easier and fast compliance reporting and more.
Posted: 28 Mar 2016 | Published: 31 Dec 2015

ForeScout Technologies, Inc.

Norwich School - Case Study
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper describes the network security challenges that Norwich School faced and how they found a solution that met their every need. Access now to learn how you can have increased visibility and save time by easily identifying potential threats before they become a major problem.
Posted: 28 Mar 2016 | Published: 31 Dec 2015

ForeScout Technologies, Inc.

Case Study: You Can't Manage what You Can't See
sponsored by ForeScout Technologies, Inc.
CASE STUDY: In this case study, uncover how Pioneer Investments, a global investment management firm, solved their network access control (NAC) woes and shed a light on whom and what was on their network.
Posted: 25 Mar 2016 | Published: 25 Nov 2015

ForeScout Technologies, Inc.

Cloud Providers Can Hurt Your Website Performance...Now What?
sponsored by Dyn
WEBCAST: There are a lot of advantages to joining the cloud, but many people expect the cloud be the perfect solution to everything. The fact is that cloud providers have problems like everyone else. Learn about the problems facing cloud providers and how you can mitigate these problems.
Posted: 25 Mar 2016 | Premiered: Mar 16, 2016

Dyn

The IOT Impact: Networks Face Their Biggest Challenge Yet
sponsored by Ixia
WHITE PAPER: Connected cars are just the first mainstream area IOT has forged ahead, but that and other internet-enabled machinery are causing major upheaval in businesses as they look to protect their network and mitigate the risks associated with IOT. Inside, we review some of the concerns and how to protect against them.
Posted: 25 Mar 2016 | Published: 24 Feb 2016

Ixia

Hidden Network Devices: How State of Missouri Uncovered and Stopped Threats
sponsored by ForeScout Technologies, Inc.
CASE STUDY: This case study details how the State of Missouri shined a light on their network access and traffic to uncover how many devices – secure and vulnerable – were on at any given time. Inside learn how you too can improve visibility and control of endpoints, accelerate threat response and mitigate non-compliant device access risks.
Posted: 25 Mar 2016 | Published: 27 Jan 2016

ForeScout Technologies, Inc.

Rapidly Detect and Respond to the Advanced and Evasive Threat
sponsored by Dell SecureWorks
WHITE PAPER: This white paper explores the benefits of combining advanced network and endpoint detection technology with the right people, processes and intelligence for greater visibility of threats.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Case Study: Reveal Malicious Endpoints on Your Network
sponsored by ForeScout Technologies, Inc.
CASE STUDY: This case study reviews how Sutton and East Surrey Water, an organization that supplies drinking water to approximately 670,000 residents, faced non-compliance and network threats and the steps they took to reveal what devices accessed their network.
Posted: 24 Mar 2016 | Published: 25 Nov 2015

ForeScout Technologies, Inc.

Understand How to Implement DLP that fits your Organization
sponsored by Digital Guardian
EGUIDE: This e-guide shows you different levels of DLP tools that you'll need depending on the size of your organization. Continue reading and make an assessment based on the four DLP categories: Knowing where your data is, understanding where it goes, knowing how it's used and educating employees and blocking unwanted activities.
Posted: 24 Mar 2016 | Published: 22 Mar 2016

Digital Guardian

Video: Advanced Endpoint Protection & Forensics
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video invites you to uncover key strategies for continuously preventing even the most sophisticated attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.
Posted: 24 Mar 2016 | Premiered: 08 Feb 2016

Check Point Software Technologies Ltd.

Security for the Internet of Things: Upcoming Trends to Watch
sponsored by Microsoft
RESOURCE: By 2020, over 25% of identified attacks in enterprises will involve the Internet of Things (IoT). In this resource, Gartner's IoT security analysts offer predictions for upcoming market trends and recommendations about which security services are worth the investment.
Posted: 23 Mar 2016 | Published: 09 Dec 2015

Microsoft

Webinar - Network security without compromise
sponsored by Aruba Networks
WEBCAST: In this webcast, you will learn how to enhance network security, enforcement and a better user experience.
Posted: 23 Mar 2016 | Premiered: Feb 1, 2016

Aruba Networks

Extend Security and Control from the Data Center Edge to the Core
sponsored by VMware, Inc.
EBOOK: This eBook presents solutions to three of today's common network security issues and how software-defined data centers are here to provide the tools that you will need moving forward.
Posted: 22 Mar 2016 | Published: 16 Mar 2016

VMware, Inc.

Does SDN Negate ADCs? Not if Innovators in Virtualization Have Their Way
sponsored by Citrix
WHITE PAPER: This e-guide reveals the advent of virtual application delivery controllers (ADCs) in response to the growth of virtualized systems. Access now to learn about innovative features that enable virtual ADCs on a software-defined (SDN) network.
Posted: 23 Mar 2016 | Published: 18 Mar 2016

Citrix
201 - 225 of 1553 Matches Previous Page    7 8 9 10 11 12    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement