IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network Security Reports
201 - 225 of 1251 Matches Previous Page  |  Next Page
Five Ways Network Virtualization Will Revolutionize IT
sponsored by Global Knowledge
WHITE PAPER: Discover how Network Functions Virtualization (NFV) will revolutionize IT and change the way you think about network connectivity, and perhaps even application development.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Global Knowledge

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Networks That Know Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper explains why you must implement a multi-dimensional security approach to minimize any potential risks associated with the cloud.
Posted: 24 Oct 2014 | Published: 01 Aug 2014

Juniper Networks, Inc.

The Emergence of SDN in WLAN
sponsored by TechTarget
RESOURCE: SDN is being implemented rapidly—is your organization maximizing its benefit? New use cases have emerged for SDN in wireless networks. Our e-guide, The Emergence of SDN in WLAN explores how SDN can benefit your wireless network through the improvement of how wireless networks are deployed and managed.
Posted: 24 Oct 2014 | Published: 09 Sep 2014

TechTarget

Networks That Know Automation
sponsored by Juniper Networks, Inc.
WHITE PAPER: Access this white paper to learn how networks are using automation to their advantage, especially with the popularity of software-defined networking (SDN).
Posted: 23 Oct 2014 | Published: 01 Aug 2014

Juniper Networks, Inc.

Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
sponsored by SearchSecurity.com
EBOOK: In this Insider Edition, InfoSec pros will learn about enterprise mobile management, or EMM, the new approach to security in the BYOD age, which focuses on security data rather than devices.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

SearchSecurity.com

CW Buyer's Guide to Security Analytics
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at how organisations are gathering intelligence to stay ahead of emerging threats; the importance of gathering data throughout an incident; and the impact of context-aware security.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

ComputerWeekly.com

How We Define a Network is About to Change, Again
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you'll learn how VMware NSX changes the way that you build, manage, and secure your network.
Posted: 06 Oct 2014 | Published: 25 Sep 2014

Global Knowledge

Intrusion Detection and Protection: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK: Learn how IDS/IPS help you thwart attacks and mitigate post-attack damage.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SearchSecurity.com

Outsider Threat Protection: Building a Kill Chain Defense
sponsored by Digital Guardian
WHITE PAPER: This white paper reveals the story behind outsider threats and how to defend against these attacks that steal sensitive data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

WAF or IPS - Why you need more than a Firewall and IPS to protect your applications
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains the importance of using more than just a firewall and IPS to protect your applications from malicious attacks.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Fortinet, Inc.

Moving Beyond the Firewall for Complete Data Protection
sponsored by Fortinet, Inc.
WHITE PAPER: Check out this white paper to discover several new security threats and what solutions are available to mitigate those risks going forward.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

Fortinet, Inc.

Gauntlet Case Study
sponsored by CloudPassage
WHITE PAPER: Access this informative resource to find out what happened when 367 people participated in a liver server exploitation exercise that ran for 23 days across a collection of Microsoft Windows and Linux-based servers with varying combinations of applications and application frameworks installed.
Posted: 04 Sep 2014 | Published: 04 Dec 2013

CloudPassage

Leveraging Network Infrastructure for Competitive Success in Midsize Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper now to learn how mid-market firms can leverage network infrastructure for success in the era of mobility and the cloud.
Posted: 29 Aug 2014 | Published: 30 May 2014

Cisco Systems, Inc.

Enable Secure Access to Apps
sponsored by IBM
DATA SHEET: The BYOD era has left IT with less control over the network, creating security and network integrity problems.  IT professionals are constantly striving to secure sensitive enterprise data and discover vulnerabilities.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

IBM

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Healthcare organization improves security
sponsored by Dell, Inc.
WHITE PAPER: Discover how Promise Healthcare is able to speed access to medical applications with 35 percent faster network performance while achieving HIPAA compliance. Read this paper to learn how next-generation firewalls enable organizations to block even the most sophisticated threats.
Posted: 20 Aug 2014 | Published: 01 Apr 2014

Dell, Inc.

Endpoint protection: Whitelisting and Beyond
sponsored by SearchSecurity.com
EBOOK: Application whitelisting is a valuable security tool but it's riddled with complexity. This handbook takes a look at whitelisting capabilities, with an eye to the NIST cybersecurity framework and suggests best practices for implementing or managing a whitelist in your enterprise.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

SearchSecurity.com

How SSL and TLS Secure Network Transactions
sponsored by Blue Coat Systems
EGUIDE: This expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Blue Coat Systems

Putting Security on Auto-Pilot: What Works, What Doesn't
sponsored by SearchSecurity.com
EBOOK: This technical guide examines the pros, cons, and unknowns of automated penetration testing, from how best to use one to the components of your security system that will still require human intervention.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

SearchSecurity.com

Get the Network Protection You Need with Next Generation Firewalls
sponsored by CDW Corporation
WHITE PAPER: In this white paper, discover what a next-generation firewall can do for your organization in terms of network security.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CDW Corporation

Data Loss Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

Data Loss Prevention: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

Turning Your Network into a Strategic Business Asset
sponsored by Extreme Networks
EBOOK: This eBook introduces a network-based business intelligence solution that captures and analyzes context-based application traffic to deliver meaningful information about applications, users, locations and devices.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Extreme Networks

A New Set of Network Security Challenges
sponsored by Icomm Technologies
WHITE PAPER: Today, workers demand access from devices beyond the firewall.  Smart phones, tablets, and laptops of all types.  However, the biggest challenge is finding a balance between productive and security.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Icomm Technologies
201 - 225 of 1251 Matches Previous Page    7 8 9 10 11 12    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement