IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
201 - 225 of 1544 Matches Previous Page  |  Next Page
Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover key features of ISFWs how their deployment can provide instant network visibility and protection. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Wireless Security Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Defend Against the Undetected
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper discusses how an automated, integrated security process can ensure a more secure network. Discover how this security strategy can efficiently defend your network from the perimeter to the core.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: As IoT blooms, it's introducing new security challenges. Challenges that access layer security strategies can help you combat. Read on to learn about new approaches and choosing secure WLAN solutions.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Automated Infrastructure Management Delivers Real-Time Network Visibility
sponsored by CommScope
WHITE PAPER: Explore how to gain real-time, granular visibility into the critical connectivity that drives your business with automated network infrastructure management (AIM).
Posted: 20 Jun 2016 | Published: 31 Dec 2015

CommScope

Mastering the Top Enterprise Mobility Challenges
sponsored by Microsoft
EGUIDE: Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Microsoft

Top 10 Cyber Incident Pain Points: Are You Prepared?
sponsored by Delta Risk
WHITE PAPER: Discover the 10 pain points that organizations grapple with when responding to cybersecurity incidents, and how to counter them.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Delta Risk

Masergy Unified Enterprise Security Demo
sponsored by MASERGY
WEBCAST: Access this webcast to discover how machine learning combined with continuous human monitoring can harden your defenses and improve your advanced threat detection capabilities.
Posted: 09 Jun 2016 | Premiered: May 1, 2016

MASERGY

McKenna Long & Aldridge Chose Masergy's Managed Cloud Networking
sponsored by MASERGY
WEBCAST: With these Managed Cloud Networking solutions, the firm could open new offices quicker than ever before. Learn how you can leverage analysis tools to monitor network traffic and application usage patterns to gain predictive insights for strategic IT initiatives.
Posted: 09 Jun 2016 | Premiered: May 1, 2016

MASERGY

A Unified View of the Enterprise Network for Proactive Security
sponsored by Fortinet, Inc.
WHITE PAPER: Trends in mobility and cloud-host enterprise applications are prompting enterprises to reconsider how they deploy enterprise networks. Find out how these trends are changing approaches to network management, the need for more unified, proactive security and the challenges this all presents.
Posted: 08 Jun 2016 | Published: 31 Mar 2016

Fortinet, Inc.

Wireless Security Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 08 Jun 2016 | Published: 02 May 2016

Fortinet, Inc.

Cybersecurity for Banking and Financial Institutions
sponsored by Delta Risk
WHITE PAPER: Follow this primer for IT professionals who are looking to protect their organization and secure their networks from attack while remaining in compliance with evolving regulations. In addition to discussing the nature of the modern cyberthreat, it also discusses the numerous extra burdens specifically for banking and financial firms.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Delta Risk

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
EBOOK: As IoT blooms, it's introducing new security challenges. Challenges that access layer security strategies can help you combat. Read on to learn about new approaches and choosing secure WLAN solutions.
Posted: 08 Jun 2016 | Published: 01 Jun 2016

Fortinet, Inc.

Understand the Business Impact and Cost of a Breach
sponsored by MASERGY
ANALYST REPORT: This Forrester Report will help security and risk leaders build a case for investment to show business leaders what kind of investment it'll take to adequately protect their organization.
Posted: 07 Jun 2016 | Published: 12 Jan 2015

MASERGY

The Top 7 Criteria for Cloud Wi-Fi
sponsored by Fortinet, Inc.
WHITE PAPER: The vision of an all-wireless enterprise has been in sight for years, but it has finally come within grasping range. Cloud-managed Wi-Fi is the way to achieve the goals of a more agile enterprise at lower IT costs. Read on to learn about the top seven requirements to look for in cloud Wi-Fi.
Posted: 07 Jun 2016 | Published: 12 May 2016

Fortinet, Inc.

Next Generation Cybersecurity: The Age of Artificial Intelligence
sponsored by MASERGY
WEBCAST: Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.
Posted: 06 Jun 2016 | Premiered: May 1, 2016

MASERGY

How to Implement Network Microsegmentation
sponsored by NTT Com Security (UK) Ltd
EGUIDE: Discover how microsegmentation can break up your data center into logical elements and reduce its susceptibility to catastrophic lateral movement of malicious activity once a breach occurs.
Posted: 21 Jun 2016 | Published: 14 Jun 2016

NTT Com Security (UK) Ltd

The Adaptive Security Platform: Secure the Modern Data Center
sponsored by Illumio
EGUIDE: In this e-guide, uncover an interview with two security gurus from Illumio, a winner of our Network Innovation Award, on their Adaptive Security Platform (ASP). Learn the basics about this platform, and gain insights on how you can reduce complexity and develop a discerning data center security posture.
Posted: 21 Jun 2016 | Published: 15 Jun 2016

Illumio

Mobile Data Security Threats: Hype vs. Reality
sponsored by Lookout
EGUIDE: As threats such as mobile malware evolve, so do the tools to combat them. It's a chess match, and you must stay well-educated to ensure protection. In this e-guide, learn about today's common mobile threats so you can prepare your network to combat them.
Posted: 20 Jun 2016 | Published: 14 Jun 2016

Lookout

Cyberhunting: A Critical Component of Enterprise Security
sponsored by Infocyte
EGUIDE: Cyberhunting – actively looking for signs of compromise in an organization and controlling and minimizing the overall damage – must be a part of your security program. Learn more about this proactive security approach, and how to implement it within your organization, in this e-guide.
Posted: 20 Jun 2016 | Published: 15 Jun 2016

Infocyte

Laptop Management for Windows
sponsored by IBM MaaS360
WHITE PAPER: Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

IBM MaaS360

QRadar SIEM
sponsored by IBM
WHITE PAPER: Protecting today's complex networks against malicious activities is a never-ending task. Learn how you can boost threat protection and compliance by developing security intelligence.
Posted: 15 Jun 2016 | Published: 20 Dec 2013

IBM

The Importance Of Network Data When It Comes To Protecting Your IT System
sponsored by IBM
WHITE PAPER: With the growing amount of threats in today's IT landscape, businesses have bolstered their network security with greater visibility methods. This guide explores the importance of network data when it comes to protecting your network with SIEM.
Posted: 15 Jun 2016 | Published: 31 Jan 2013

IBM

Six Steps to Buying Data Loss Prevention Products
sponsored by Intel Security
EGUIDE: Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security
201 - 225 of 1544 Matches Previous Page    7 8 9 10 11 12    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement