IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
226 - 250 of 1373 Matches Previous Page  |  Next Page
SD-WAN for Maximizing WAN Performance
sponsored by Fatpipe, Inc.
WHITE PAPER: More and more applications are moving to the cloud which is causing a decrease in WAN performance. This white paper displays how SD-WAN offers a solution to address these new network complexities and performance needs with a seven layered approach to WAN optimization.
Posted: 19 Apr 2016 | Published: 06 Apr 2016

Fatpipe, Inc.

Guide to Flexible Working
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.
Posted: 07 Apr 2016 | Published: 07 Apr 2016

ComputerWeekly.com

Innovative Cloud-Based SIEM Deployment Delivers Actionable Security Intelligence
sponsored by Splunk
CASE STUDY: This case study explores how Equinix, a global cloud interconnection provider, overcame security blind spots and the burden of manually extracting and correlating data by turning to cloud-based SIEM.
Posted: 06 Apr 2016 | Published: 24 Feb 2016

Splunk

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: This report outlines next-generation security approaches to better fortify mobile enterprise deployments against malicious attacks. Access now to learn about the current mobile threat landscape and learn how you can better protect against new, evolving mobile malware.
Posted: 28 Mar 2016 | Published: 31 Dec 2015

MobileIron

Network Strategies that Will Help You Eliminate, Embrace, or Coexist with Shadow IT
sponsored by Juniper Networks, Inc.
WHITE PAPER: Shadow IT is here. Access this e-guide for the current trends driving the rise of shadow IT, explore the drawbacks and benefits it offers, and learn how designing and building the right network is essential for your preferred shadow IT strategy.
Posted: 05 May 2016 | Published: 05 May 2016

Juniper Networks, Inc.

What to Look for in Secure Sockets Layer
sponsored by SearchSecurity.com
EBOOK: This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
Posted: 04 May 2016 | Published: 04 May 2016

SearchSecurity.com

Top 3 Reasons Your Enterprise Network Matters More in the Cloud Era
sponsored by Juniper Networks, Inc.
WHITE PAPER: Traditional networks simply can't handle all the implications of the cloud. Explore the top 3 IT trends that will impact your cloud networking strategy, and learn how to build a network that's 100% cloud-ready.
Posted: 04 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Is Your Network Too Flat? Prevent Data Breaches with Segmentation
sponsored by SearchSecurity.com
EZINE: How do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.
Posted: 02 May 2016 | Published: 02 May 2016

SearchSecurity.com

For Enterprise IT: Extend Your VPN to Bring Better Security, Performance, Reliability to the Cloud
sponsored by AT&T
WHITE PAPER: As more applications get delivered through cloud models, IT must ensure maximum performance and availability. Why should you look to extend the capabilities of a VPN that is already in place? Learn the benefits of VPN-based connectivity for the cloud inside.
Posted: 29 Apr 2016 | Published: 20 Apr 2016

AT&T

Total Economic Impact of IBM Security Network Protection (XGS), Forrester Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This white paper examines the benefits you will realize by deploying next generation intrusion prevention. Access now to discover how next-gen IPS could impact your organization.
Posted: 27 Apr 2016 | Published: 01 Feb 2016

IBM

Detecting Malware-Free Intrusions and Advanced Cyber Threats with Anomaly Detection and "Behavioral MD5" of Endpoint Processes
sponsored by Prelert
ANALYST REPORT: This report shows you how machine learning can detect changes in endpoint process behavior to help protect your business. Access now to learn how you can automate the analysis of data by looking for helpful anomalies that indicate malicious activity.
Posted: 25 Apr 2016 | Published: 29 Feb 2016

Prelert

Machine Learning: Perception Problem? Maybe. Pipe Dream? No Way!
sponsored by Prelert
ANALYST REPORT: This report dispels misconceptions about machine learning and explains what its actual application is. Access now to learn about recent developments in machine learning-based security analytics capabilities.
Posted: 25 Apr 2016 | Published: 29 Jan 2016

Prelert

Machine Learning Is Cybersecurity’s Answer to Detecting Advanced Breaches
sponsored by Prelert
ANALYST REPORT: This blog post talks about replacing legacy safeguards with new machine learnings, the heart of IT's shift in mindset. Access now to learn how to focus on identifying potential threats early rather than reacting to threats after they happen.
Posted: 25 Apr 2016 | Published: 21 Mar 2016

Prelert

Star Wars X – Attack of the DROWNs: Machine Learning-based Anomaly Detection Finds the DROWN SSLv2 Vulnerability
sponsored by Prelert
ANALYST REPORT: This blog post teaches you about the DROWN vulnerability and exactly why it could be affecting your organization. Learn the great impact DROWN has had in the past and what you can do to patch this vulnerability.
Posted: 25 Apr 2016 | Published: 19 Apr 2016

Prelert

Next-Generation IPS in the Era of Targeted Attacks
sponsored by IBM
WHITE PAPER: This white paper talks about the future of IPS and gives you statistics from the current IPS market. Access now to learn about the features, capabilitie, costs and impacts of next-generation IPS and the future of cyberattacks in general.
Posted: 21 Apr 2016 | Published: 01 Jan 2016

IBM

Is It Time to 'Software-Define' Your Network Security?
sponsored by SearchSecurity.com
EBOOK: This guide goes beyond most examinations of security in SDN, goes beyond explaining what SDN is and how it might improve network security. Instead, this publication looks in-depth at specific implementations of SDN. Readers will come away with a freshly packed toolkit of SDN-related actionable advice.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

SearchSecurity.com

VMware identity management adds SSO to AirWatch
sponsored by VMware
EGUIDE: This e-guide shows you how to better manage network access from mobile devices with a single sign-on (SSO) application. Access now to gain better security across all your remote locations while also adding ease of access for authorized users.
Posted: 20 Apr 2016 | Published: 19 Apr 2016

VMware

The Current Landscape of Cybersecurity
sponsored by eSentire
EGUIDE: This e-guide breaks down current common attack vectors and pain points in the cybersecurity strategies of organizations across industries. Access now to get the latest information from security professionals and businesses of all sizes on how they're mitigating cyber attacks and loss of data.
Posted: 19 Apr 2016 | Published: 15 Apr 2016

eSentire

Behavior-Based Threat Detection
sponsored by eSentire
VIDEO: This video shows you behavior-based threat detection that scans your network for a multitude of different anomalies. It combines time of day, bandwidth surges, IP reputation and port scanning to identify possible threats to your network security. Access now to learn about always on full traffic forensics.
Posted: 19 Apr 2016 | Premiered: 01 Mar 2016

eSentire

Don't Be the Next Cyber Victim
sponsored by eSentire
WEBCAST: The best way to manage the complexities of cybersecurity is to simplify it. Micro-incident response has the capability to protect your network 24/7, 365 days per year. Access now to stop small breaches from turning into business-ending catastrophes.
Posted: 19 Apr 2016 | Premiered: Mar 1, 2016

eSentire

eSentire Partner Program
sponsored by eSentire
WHITE PAPER: This white paper gives you a brief overview of the eSentire partner program and how becoming a partner will allow you to reach new customers, increase revenues, expand your portfolio and grow market share. Access now and learn about their program benefits, requirements and if it is the right fit for you.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

eSentire

We’ve Been Breached- Now What?
sponsored by eSentire
WHITE PAPER: This white paper teaches you how to respond after a cyber threat becomes a cyber attack. Access now to learn how to eradicate cyber threats, repair infected systems and restore operations to normal after an attack occurs.
Posted: 14 Apr 2016 | Published: 31 Dec 2015

eSentire

Cyber Liability: Risks, Ramifications, and Mitigation
sponsored by eSentire
WHITE PAPER: Find out how you can better defend your organization against external attack and limit exposure by reducing your attack profile available to attackers by accessing this resource.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

eSentire

Growing Security Concerns Across Industries
sponsored by Dell, Inc.
EGUIDE: This e-guide illustrates the survey results of more than 1,300 business and IT decision makers across seven countries. They found that, while the C-suite is more invested in data security than in the past, executives are still not allocating the energy and resources to properly address data security.
Posted: 12 Apr 2016 | Published: 07 Apr 2016

Dell, Inc.

How to Choose an EMM Solution That’s Right for You
sponsored by vmware airwatch
WHITE PAPER: Providing a seamless mobile experience for users starts with gaining control over the spread of devices. Discover how the right EMM solution provides the security and management capabilities you need and learn the 6 main questions to address during the buying phase.
Posted: 23 Mar 2016 | Published: 23 Mar 2016

vmware airwatch
226 - 250 of 1373 Matches Previous Page    8 9 10 11 12 13    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement