IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
251 - 275 of 1435 Matches Previous Page  |  Next Page
Cyber Security Trends ASEAN 2016
sponsored by ComputerWeekly.com
EGUIDE: As cyber security becomes a top priority for policy makers and IT leaders, this guide looks at some of the issues facing government and private sector organizations in South-East Asia.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

ComputerWeekly.com

Cyber Security Trends ANZ 2016
sponsored by ComputerWeekly.com
EGUIDE: As cyber security becomes a top priority for policy makers and IT leaders, this e-guide looks at some of the issues facing government and private sector organisations in Australia and New Zealand.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

ComputerWeekly.com

Advanced Endpoint Protection for Windows Server 2003 After End-of-Support
sponsored by Palo Alto Networks
WHITE PAPER: Identify how you can maintain security in your network, despite the fact that Windows Server 2003 has reached its End-of-Support.
Posted: 01 Jul 2016 | Published: 01 Jul 2016

Palo Alto Networks

IT Battles the Top Three Mobile Security Threats
sponsored by Hewlett Packard - Intel Xeon
EGUIDE: Learn about 3 mobile security threats facing IT managers and security experts today. Access now to learn what best practices are being deployed to face the rapidly growing danger to your mobile devices.
Posted: 16 Aug 2016 | Published: 11 Aug 2016

Hewlett Packard - Intel Xeon

SD-WAN Helps Secure Hybrid Networks
sponsored by Citrix
EGUIDE: SD-WAN enables enterprises to create hybrid networks. But many network engineers eyeing hybrid WAN architectures are asking themselves the question: It can't be as safe as running on MPLS, right? Access this expert e-guide to learn about SD-WAN platforms' security features that finally make hybrid networks secure enough for widespread use.
Posted: 15 Aug 2016 | Published: 12 Aug 2016

Citrix

Five Essential Elements of Mobile Security
sponsored by vmware airwatch
WHITE PAPER: End users want access to data anytime, anywhere, but enterprise mobility creates increased opportunities for cyberattacks. In this trend brief, you'll review the essential elements of building a mobile security strategy. Access now to learn about ways to construct your strategy and protect data.
Posted: 15 Aug 2016 | Published: 29 Apr 2016

vmware airwatch

How to Handle the IoT from the Data Center to Security
sponsored by Xively by LogMeIn
EGUIDE: In this e-guide, learn how experts ensure IoT devices can stand up to the scope of modern security challenges, and what IT pros are doing to help the data center support IoT data from numerous sources.
Posted: 10 Aug 2016 | Published: 08 Aug 2016

Xively by LogMeIn

Enterprise Mobility: How Mobile Device Management Exploded to Include Devices, Apps and Content
sponsored by IBM MaaS360
WHITE PAPER: Today, nearly every enterprise works with mobile devices, but few know how to maximize their potential. So, how do you turn mobility into a valued asset? Access this white paper to learn about workplace mobility and how to successfully implement a unified mobile policy.
Posted: 09 Aug 2016 | Published: 31 Mar 2016

IBM MaaS360

The Threat Defense Lifecycle: Intelligent Endpoint Threat Defense
sponsored by Intel Security
WHITE PAPER: Adopt a threat defense lifecycle that will allow you to discover threats faster, respond quicker and overall outsmart attackers, driving business efficiency forward. Learn how to then apply these insights to an automated policy that can block similar attack attempts up front.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

Software-Defined Network Security: A 'No-Touch' Approach
sponsored by VMware
EGUIDE: Despite its difficult-to-define nature, SDN security is an achievable goal if you can extend SDN's role beyond enhanced network capability. But to do this, a new touchless configuration policy may be necessary. In this expert e-guide, we discuss what it takes to make this "no-touch" approach a reality.
Posted: 02 Aug 2016 | Published: 01 Aug 2016

VMware

Microsegmentation Strategies for Smarter Security
sponsored by VMware
EGUIDE: In this expert e-guide, we discuss the potential benefits of the microsegmentation approach to virtual networking. Discover why this security method is driving deployment momentum across enterprises and find out what questions you should be asking before you get started on your own transformation.
Posted: 02 Aug 2016 | Published: 01 Aug 2016

VMware

Healthcare CIOs Address Cybersecurity Vulnerabilities
sponsored by Optum
EGUIDE: As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum

Time to Toughen Up for IoT
sponsored by SearchSecurity.com
EBOOK: This 3-part guide is filled with best practices for Internet-enabled device security, looking at such things as raising awareness of potential security threats wrought by IoT and how to test your defenses in the IoT era.
Posted: 26 Jul 2016 | Published: 20 Jul 2016

SearchSecurity.com

Is UTM Ready for the Big Leagues?
sponsored by SearchSecurity.com
EBOOK: This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

SearchSecurity.com

Is UTM Ready for the Big Leagues?
sponsored by SearchSecurity.com
EBOOK: This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.
Posted: 11 Jul 2016 | Published: 10 Jul 2014

SearchSecurity.com

The Cost of Change: A Network Perspective on How Rigidity Limits Agility
sponsored by Avaya TSG
ANALYST REPORT: For most organizations, the network is now the single biggest inhibitor to achieving business agility. Access this exclusive report to examine the challenges associated with achieving total network agility, and in it, Zeus Kerravala of ZK Research demonstrates the challenge with legacy change management models.
Posted: 06 Jul 2016 | Published: 30 Apr 2015

Avaya TSG

New Cloud Networking Provides the Best of Both Worlds
sponsored by AT&T
PRODUCT OVERVIEW: Cloud networking can provide the best of both worlds: performance and security of your MPLS virtual private network coupled with the speed and capabilities. This white paper details how new cloud networking can provide benefits that simplify management, enable bandwidth flexing, and more.
Posted: 01 Jul 2016 | Published: 30 Jun 2016

AT&T

Maximize Your VPN to Enhance Cloud Connectivity
sponsored by AT&T
WHITE PAPER: This white paper evaluates the impact of cloud on various enterprise applications; which is, in turn, driving the demand for secure private network connectivity to cloud. Also explained are the business benefits of deploying an integrated MPLS VPN and cloud solution.
Posted: 01 Jul 2016 | Published: 31 Mar 2016

AT&T

Infographic: Health IT Networking Insights, Trends
sponsored by Avaya TSG
WHITE PAPER: How do new and emerging networking technologies affect health IT specifically? Access this infographic to learn how telemedicine, mobile, cloud computing, virtualization, and more, are being used in a healthcare setting to benefit patients, as well as medical professionals.
Posted: 30 Jun 2016 | Published: 31 May 2016

Avaya TSG

Top Reasons for Implementing App Delivery on Hyperconverged Infrastructure
sponsored by Array Networks
WHITE PAPER: Whether you're refreshing your current infrastructure or scaling for new growth, make your infrastructure invisible. Learn the top 10 reasons for deploying an invisible infrastructure at your business.
Posted: 29 Jun 2016 | Published: 28 Jun 2016

Array Networks

South Carolina Federal Credit Union Uses an ADC to Implement an SSL Environment
sponsored by Array Networks
CASE STUDY: When converting to an SSL-secured environment, your business must have the correct application delivery controller (ADC) employed to ensure server performance. Make an informed decision when selecting your ADC, by reading this case study which explains how one business benefitted from an ADC implementation.
Posted: 29 Jun 2016 | Published: 28 Jun 2016

Array Networks

The Pros and Cons of Microsegmentation for your Virtualized Environments
sponsored by NTT Com Security (UK) Ltd
EGUIDE: Microsegmentation is said to improve usability and security by establishing "zero trust" zones where more granular access controls can be enforced. In this e-guide learn from information security expert, Kevin Beaver, as he dives into the pros and cons of microsgmentation to determine if it can help your virtualization security needs.
Posted: 28 Jun 2016 | Published: 24 Jun 2016

NTT Com Security (UK) Ltd

Open Sandwich Architecture Provides Scalable Performance and High Availability for Next-Generation Firewalls
sponsored by Array Networks
RESOURCE: As network speeds and network security requirements continue to evolve, meeting your next-generation firewall's (NGFW) requirements by scaling up hardware capabilities becomes more difficult. Read this white paper to discover how employing application delivery controllers can help you meet your NGFW's requirements without scaling hardware.
Posted: 28 Jun 2016 | Published: 31 Aug 2015

Array Networks

Cloud Agility with Performance
sponsored by Array Networks
WHITE PAPER: As enterprises adopt cloud and virtualization, many will deploy application delivery and security functions in cloud environments. Read this white paper that explains how to successfully deploy models for application delivery controllers and secure access gateways in cloud environments.
Posted: 28 Jun 2016 | Published: 02 May 2016

Array Networks

How to Implement Network Microsegmentation
sponsored by NTT Com Security (UK) Ltd
EGUIDE: Discover how microsegmentation can break up your data center into logical elements and reduce its susceptibility to catastrophic lateral movement of malicious activity once a breach occurs.
Posted: 21 Jun 2016 | Published: 14 Jun 2016

NTT Com Security (UK) Ltd
251 - 275 of 1435 Matches Previous Page    9 10 11 12 13 14    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement