IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
226 - 250 of 1436 Matches Previous Page  |  Next Page
Controlling the Uncontrollable: Why You Need to Enable, Protect, and Manage Mobile
sponsored by Microsoft
WHITE PAPER: This guide details how you can ensure a productive and secure mobile workplace through enterprise mobility management. Learn how to control what once seemed uncontrollable now.
Posted: 18 May 2016 | Published: 11 May 2016

Microsoft

AAA WCNY Optimizes Roadside Assistance, Delivers Physical and Network Security
sponsored by Splunk
CASE STUDY: Discover how to achieve full operational visibility into your network security and firewall traffic. Learn how AAA Western and Central New York leveraged cloud to monitor their VPN, enhance PCI compliance, and deliver superior customer service—all not possible without its secure network.
Posted: 17 May 2016 | Published: 17 May 2016

Splunk

Where Network Virtualization Fits Into Data Center Initiatives
sponsored by VMware
WHITE PAPER: Network virtualization is what is going to enable you to keep up with the constant advances in technology without having to sweat over too many details. See how it fits into your existing physical network, your plans for software-defined data center and much more.
Posted: 16 May 2016 | Published: 29 Jan 2016

VMware

The Zero Trust Data Center in Action
sponsored by VMware
WHITE PAPER: Micro-segmentation is the key to securing your data center from the inside out. Read on to learn more about how micro-segmentation works, how to incorporate it, the role network virtualization plays and the benefits it brings.
Posted: 16 May 2016 | Published: 27 Apr 2016

VMware

Information Security Magazine: Insider Edition
sponsored by SearchSecurity.com
EZINE: Attaining truly 21st century security requires new thinking. Learn how to deal with a vanishing network perimeter and bring on board the best new security tools to protect your enterprise.
Posted: 10 May 2016 | Published: 10 May 2016

SearchSecurity.com

Why Get Certified in Network Virtualization?
sponsored by VMware
WHITE PAPER: Today's networks are now playing catch-up with how much agility and flexibility virtualization can provide to the compute world. Get onboard and uncover the benefits of virtualization certification so you can help your organization deliver apps and services at the speed of business.
Posted: 10 May 2016 | Published: 10 May 2016

VMware

Schuberg Philis accelerates application deployment using network virtualization
sponsored by VMware
CASE STUDY: This case study presents an IT outsourcing company that sought to deploy new environments centrally using software APIs in order to guarantee its clients 100% functional uptime for their mission-critical applications. Access now to see how they were able to use network virtualization to make major strides toward this goal.
Posted: 10 May 2016 | Published: 31 Dec 2014

VMware

Operationalizing Threat Intelligence: Interrupt the Cyberattack Chain
sponsored by Intel Security
PRODUCT OVERVIEW: Learn how to leverage a collaborative platform for operationalizing threat intelligence—including real-time sharing of threat information across the IT infrastructure and delivery of adaptive protection. Discover how to interrupt the cyberattack chain and arming your enterprise with the latest cyberthreat intelligence insights.
Posted: 09 May 2016 | Published: 31 Dec 2015

Intel Security

Understanding Cyberthreat Motivations to Improve Defense
sponsored by Intel Security
WHITE PAPER: Find out why you must add cyber-criminal motivation to your threat taxonomy in order to understand what causes a threat agent to commit harmful acts. Read on to discover in detail the elements of this new parameter and how this crucial understating of the hacker's mind can help protect your entire infrastructure.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

Is Your Network Too Flat? Prevent Data Breaches with Segmentation
sponsored by SearchSecurity.com
EZINE: How do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.
Posted: 02 May 2016 | Published: 02 May 2016

SearchSecurity.com

University of Texas at Austin Ensures Network Security for its Distributed Campus
sponsored by Splunk
WHITE PAPER: Access this brief case study to learn how one top-ranked state research university saw significant benefits when they implemented a tool that met the needs of network and information security analysis. Uncover the benefits they achieved by helping their analysts investigate security threats and incidents faster and more accurately.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Splunk

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

TechTarget's Top 6 Security Measures for the Enterprise Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover a next-generation security model that moves away from traditional security tools. Learn how you can bring together all critical network security elements to provide an integrated security framework for your cloud-enabled enterprise.
Posted: 11 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

blinkbox Remediates Cloud App Security Challenges
sponsored by Barracuda Networks
VIDEO: In this video, you will learn about a VOD service called blinkbox and their struggles finding solid security for their cloud platform. See how they remediated their cloud application security issues and how they now operate without breach concerns.
Posted: 11 May 2016 | Premiered: 28 Oct 2014

Barracuda Networks

Case Study: Global Security Management Made Easier for Leading IT Service Provider
sponsored by Intel Security
CASE STUDY: Discover how to unify endpoint management with a centralized security platform thanks to this case study. Read on to learn how a leading IT service provider tamed their endpoint chaos, and see how you can boost the efficiency of your security operations with a unified security platform that eliminates centralized management pain points.
Posted: 10 May 2016 | Published: 10 May 2016

Intel Security

Nemertes Research: Re-Architecting the Enterprise Network For WLAN, Cloud, Mobility, Bandwidth, and Cybercrimes
sponsored by Juniper Networks, Inc.
WHITE PAPER: IT professionals continue to embrace new technologies but are they thinking about the infrastructure across which they're to delivering these technologies? Learn how to re-architect the enterprise network and security infrastructure, in light of the momentum towards cloud, mobility, bandwidth-hungry apps, and advanced security threats.
Posted: 09 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

IDC Research: 7 Trends Impacting Enterprise Campus Networks
sponsored by Juniper Networks, Inc.
WHITE PAPER: Reliance upon cloud applications for mission-critical business functions has heightened network requirements at the edge. Discover in this exclusive white paper 7 prevalent issues in today's enterprise campus networks, and how to leverage a cloud-enabled network to seamlessly glue your network edge to the cloud and optimize your cloud applications.
Posted: 06 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Discovering Security Analytics Use Cases
sponsored by Prelert
RESOURCE: In this resource, discover how to tailor your security analytics to detect certain behaviors associated with threats advancing on your organization. Select each threat indicator to examine its particular attack progression stages for data exfiltration activity, compromised endpoints, and more.
Posted: 05 May 2016 | Published: 05 May 2016

Prelert

Network Strategies that Will Help You Eliminate, Embrace, or Coexist with Shadow IT
sponsored by Juniper Networks, Inc.
WHITE PAPER: Shadow IT is here. Access this e-guide for the current trends driving the rise of shadow IT, explore the drawbacks and benefits it offers, and learn how designing and building the right network is essential for your preferred shadow IT strategy.
Posted: 05 May 2016 | Published: 05 May 2016

Juniper Networks, Inc.

What to Look for in Secure Sockets Layer
sponsored by SearchSecurity.com
EBOOK: This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
Posted: 04 May 2016 | Published: 04 May 2016

SearchSecurity.com

Top 3 Reasons Your Enterprise Network Matters More in the Cloud Era
sponsored by Juniper Networks, Inc.
WHITE PAPER: Traditional networks simply can't handle all the implications of the cloud. Explore the top 3 IT trends that will impact your cloud networking strategy, and learn how to build a network that's 100% cloud-ready.
Posted: 04 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

For Enterprise IT: Extend Your VPN to Bring Better Security, Performance, Reliability to the Cloud
sponsored by AT&T
WHITE PAPER: As more applications get delivered through cloud models, IT must ensure maximum performance and availability. Why should you look to extend the capabilities of a VPN that is already in place? Learn the benefits of VPN-based connectivity for the cloud inside.
Posted: 29 Apr 2016 | Published: 20 Apr 2016

AT&T

Total Economic Impact of IBM Security Network Protection (XGS), Forrester Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This white paper examines the benefits you will realize by deploying next generation intrusion prevention. Access now to discover how next-gen IPS could impact your organization.
Posted: 27 Apr 2016 | Published: 01 Feb 2016

IBM

Detecting Malware-Free Intrusions and Advanced Cyber Threats with Anomaly Detection and "Behavioral MD5" of Endpoint Processes
sponsored by Prelert
ANALYST REPORT: This report shows you how machine learning can detect changes in endpoint process behavior to help protect your business. Access now to learn how you can automate the analysis of data by looking for helpful anomalies that indicate malicious activity.
Posted: 25 Apr 2016 | Published: 29 Feb 2016

Prelert

Machine Learning: Perception Problem? Maybe. Pipe Dream? No Way!
sponsored by Prelert
ANALYST REPORT: This report dispels misconceptions about machine learning and explains what its actual application is. Access now to learn about recent developments in machine learning-based security analytics capabilities.
Posted: 25 Apr 2016 | Published: 29 Jan 2016

Prelert
226 - 250 of 1436 Matches Previous Page    8 9 10 11 12 13    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement