IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
226 - 250 of 1508 Matches Previous Page  |  Next Page
Strengthen Your Security Posture by Mapping Network Traffic to Users
sponsored by Palo Alto Networks
WHITE PAPER: This white paper explores how to leverage a User-ID security platform with next-generation firewall capabilities. Find out how to easily integrate user information into your security infrastructure and with features like user authentication and user-based policy control and reporting.
Posted: 08 May 2017 | Published: 31 Dec 2016

Palo Alto Networks

The Challenges of Managing SSL/TLS Encrypted Traffic
sponsored by Gigamon
RESEARCH CONTENT: Just 31% of companies say they have a plan in place to protect both their security sockets layer (SSL) and transport layer security (TLS) traffic in their network. In this SC Media survey, learn why it's so imperative to have a SSL/TLS plan.
Posted: 05 May 2017 | Published: 05 May 2017

Gigamon

Re-Thinking The Network: Delivering Transformation With Simplicity
sponsored by 128 Technology
WHITE PAPER: Overly complex networks are barely meeting today's business requirements. How will they meet the demands of tomorrow? Learn how you can remove the barrier of network complexity from the way you do business.
Posted: 05 May 2017 | Published: 30 Dec 2016

128 Technology

Silver Peak Enhances its SD-WAN Edge Device to Improve the Branch Experience
sponsored by Silver Peak
RESOURCE: Learn about the functionality SD-WAN boasts that MPLS just can't match, including access to 4G LTE and broadband and increased application performance for mobile and remote users.
Posted: 04 May 2017 | Published: 14 Apr 2017

Silver Peak

Enterprise Vulnerability: Expert Tips and Product Reviews
sponsored by TechTarget
RESOURCE: Explore a 3-step process for ranking enterprise vulnerabilities, learn how to calculate a vulnerability's risk score, and discover the best risk assessment and management tools for your enterprise with the expert advice found in our exclusive e-guide, Prioritize and Manage Enterprise Vulnerability.
Posted: 03 May 2017 | Published: 30 Nov 2015

TechTarget

SIEM in 2016: Spruce Up Your Technology
sponsored by TechTarget
RESOURCE: In Resolve to Revitalize Your SIEM, our experts discuss new SIEM product offerings, how you can best use the data that a SIEM collects, and even how to make an old SIEM work better for your organization.
Posted: 03 May 2017 | Published: 30 Nov 2015

TechTarget

Buyer's Guide: Network Monitoring Tools
sponsored by TechTarget
RESOURCE: In this complimentary e-guide, learn more about monitoring tools, how network monitoring works, and the difference between nice-to-have and need-to-have features in order to determine the best tool to monitor your network's performance.
Posted: 03 May 2017 | Published: 30 Nov 2015

TechTarget

What's Driving Hybrid WAN Adoption?
sponsored by Silver Peak
WHITE PAPER: Selecting a hybrid WAN without knowledge of the challenges it needs to address is a recipe for disaster. Learn about these challenges in this white paper.
Posted: 02 May 2017 | Published: 30 Dec 2016

Silver Peak

CCNA Certification Exam: Study Guide
sponsored by TechTarget
RESOURCE: Complete our brief Network Performance Management Survey and receive a complimentary copy of our prep guide for obtaining your CCNA certification. Learn how to prepare, find out about changes that have been made, and take practice quizzes to help test your knowledge.
Posted: 02 May 2017 | Published: 02 May 2017

TechTarget

6 Ways to Use Threat Intelligence Data
sponsored by Splunk
WHITE PAPER: Uncover 6 ways threat intelligence data can help you gain broader perspective of any threat. Discover how it can help you detect malicious activities, provide visibility, save time/resources, and more.
Posted: 02 May 2017 | Published: 31 Dec 2016

Splunk

Six Ways to Improve Your Network Security with SD-WAN
sponsored by Silver Peak
WHITE PAPER: Learn six ways to improve network security and compliance by implementing SD-WAN.
Posted: 01 May 2017 | Published: 28 Apr 2017

Silver Peak

What's Driving WAN Architecture Simplification?
sponsored by Silver Peak
WHITE PAPER: Learn more about what challenges are driving WAN architecture simplification and how you can take advantage of it in this white paper.
Posted: 01 May 2017 | Published: 30 Dec 2016

Silver Peak

Focus: Network security
sponsored by ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

ComputerWeekly.com

Stairway to Cloud Networking Nirvana
sponsored by AWS – Riverbed
EBOOK: Migrating to the Amazon Web Services (AWS) Cloud enables organizations to realize greater business agility and lower operational expenditures.However, using legacy network management solutions can leave you with poor agility.Learn how Riverbed and AWS can fundamentally change the way you manage networks and get the most out of your AWS environment.
Posted: 18 Apr 2017 | Published: 30 Dec 2016

AWS – Riverbed

SD-WAN: The Pathway to a Digitally Transformed Branch
sponsored by Windstream Communications
WHITE PAPER: This IDC white paper examines how digital transformation has necessitated a rethinking of WAN connectivity for distributed enterprises.
Posted: 14 Apr 2017 | Published: 28 Feb 2017

Windstream Communications

Automation Isn't One-Size-Fits-All
sponsored by FireMon
WHITE PAPER: In this white paper, learn how intelligent policy automation can take the pressure off your firewall team by telling you which access to approve and which to deny, increasing speed and security of change management workflows.
Posted: 13 Apr 2017 | Published: 30 Dec 2016

FireMon

Prepping for the Oncoming Wave of SD-WANs
sponsored by Windstream Communications
WHITE PAPER: In this TechTarget white paper, learn what the experts are saying about the near future for SD-WANS.
Posted: 12 Apr 2017 | Published: 31 Jan 2017

Windstream Communications

Array Networks Secure Access Gateway Datasheet (SSL VPN)
sponsored by Array Networks
RESOURCE: In this resource, learn about Array Network's AG Series secure access gateways and see how they match up against the competition.
Posted: 12 Apr 2017 | Published: 31 Mar 2017

Array Networks

Businesses Blame Rivals for DDoS Attacks& The Importance of Cloud WAF
sponsored by F5 Networks
EGUIDE: More than 40% of businesses hit by a DDoS attack believe their competitors were behind it, according to research by Kaspersky Lab and B2B International. But is there truth behind this suspicion? In this expert e-guide, learn ]about the real culprits behind DDoS attacks, and get some insight into the emergence of cloud WAF for application security.
Posted: 04 May 2017 | Published: 01 May 2017

F5 Networks

End Web Application Security Risks with WAF
sponsored by F5 Networks
EGUIDE: In this expert e-guide, educate yourself on all things WAF by discovering how a WAF works, the best WAF features and more. Additionally, learn how to further resolve web application vulnerabilities.
Posted: 04 May 2017 | Published: 01 May 2017

F5 Networks

Fast-Forward Business with IT Infographic
sponsored by VMware and Circle IT
RESOURCE: In this infographic, learn how you can make your IT processes 87% faster by cutting out time-consuming and labor-intensive manual processes.
Posted: 04 May 2017 | Published: 31 Jan 2017

VMware and Circle IT

Fast-Forward Business with On-Demand App Deployments
sponsored by VMware and Presidio
WHITE PAPER: In this e-book, learn how to automate your IT and application delivery process to meet the demands of the cloud.
Posted: 01 May 2017 | Published: 30 Dec 2016

VMware and Presidio

Ransomware Detection and Prevention Tools You Need Now
sponsored by SearchSecurity.com
EBOOK: Fighting today's malware threats requires a range of ransomware prevention tools. Learn how to tweak the tools you have and identify what new tools you need.
Posted: 13 Apr 2017 | Published: 05 Mar 2017

SearchSecurity.com

Meeting the Network Requirements of Intelligent Transportation Systems
sponsored by TechData - Digi
WHITE PAPER: In this white paper, learn how to choose a router and vendor that can provide your organization with Global 3G/4G LTE options, centralized mass configuration, remote troubleshooting and more.
Posted: 10 Apr 2017 | Published: 29 Jan 2016

TechData - Digi

How to Find the Best DDoS Attack Prevention and Detection Tools
sponsored by SearchSecurity.com
EBOOK: In this handbook, one expert reveals how to select tools that will best strengthen your defense against DDoS attacks. Uncover 4 key questions to ask as you begin your DDoS defense strategy.
Posted: 10 Apr 2017 | Published: 05 Apr 2017

SearchSecurity.com
226 - 250 of 1508 Matches Previous Page    8 9 10 11 12 13    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement