IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
251 - 275 of 1546 Matches Previous Page  |  Next Page
On the Radar: Bayshore Networks Protects the Industrial Internet of Things
sponsored by Bayshore Networks
WHITE PAPER: This Ovum report details how to get the network security you need to combat the dangers the Industrial Internet of Things presents.
Posted: 24 May 2017 | Published: 22 Feb 2016

Bayshore Networks

Choosing a Unified Mobile and Cloud Security Platform
sponsored by MobileIron
RESOURCE: Discover how to secure email and mobile apps and learn about MobileIron's EMM platform that was built from the ground up to secure mobile, cloud, and desktop devices, regardless of their OS.
Posted: 24 May 2017 | Published: 24 May 2017

MobileIron

How to Battle Ransomware as Attacks Increase in Health IT
sponsored by Cisco Umbrella
EGUIDE: IDC Health Insights predicts that ransomware attacks on healthcare orgs will double by 2018. In this e-guide, uncover the top trends for healthcare IT in 2017, and take a closer look at strategies for combatting ransomware attacks with health IT security expert Mark Dill.
Posted: 19 May 2017 | Published: 19 May 2017

Cisco Umbrella

How SD-WAN now benefits deployment and app delivery
sponsored by SearchSDN.com
EBOOK: Deploying SD-WAN technology can solve a lot of problems in the wide area network, but networking pros still need to do their homework before they buy. This TechTarget guide to SD-WAN deployment has the info you need to pick the right SD-WAN for your organization.
Posted: 17 May 2017 | Published: 17 May 2017

SearchSDN.com

SD-WAN 101: What It Is, What It Does, Why You Need to Know Now
sponsored by Windstream Communications
WHITE PAPER: Learn what you need to know about SD-WAN in this resource, including what it is, what it does and the benefits it can offer your enterprise.
Posted: 16 May 2017 | Published: 01 Feb 2017

Windstream Communications

Securing Digital Healthcare Communities — Addressing 10 Common Security Challenges
sponsored by Cisco Umbrella
WHITE PAPER: In this whitepaper, uncover 10 common security challenges that healthcare organizations are facing today, including malware, legacy applications support, IoT, and more.
Posted: 16 May 2017 | Published: 16 May 2017

Cisco Umbrella

Countering Evolving Cybersecurity Challenges
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about an intelligent, new approach to network security that can seamlessly follow and protect data, provide actionable threat intelligence and close gaps left by legacy point products and platforms.
Posted: 11 May 2017 | Published: 23 Jan 2017

Fortinet, Inc.

Digital Transformation and Network Security
sponsored by Forcepoint
RESEARCH CONTENT: In this ESG white paper, learn how digital transformation is changing the security landscape, and how pros are adapting to meet these new challenges.
Posted: 11 May 2017 | Published: 31 Jan 2017

Forcepoint

Testing NGFW: Three Points of Value Critical to your Enterprise
sponsored by Forcepoint
WEBCAST: In this webcast learn about a next generation firewall (NGFW) offering that can give you the ability to scale to over 2,000 devices form a single console, multi-link business continuity for transparent failover, and more.
Posted: 11 May 2017 | Premiered: May 11, 2017

Forcepoint

The IoT Explosion's Impact on Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Find out what's driving the IoT explosion and how you can prepare your network for the potential security risks that accompany
Posted: 10 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

Network Management and Operational Efficiency: How the Right NGFW Makes It Possible
sponsored by Forcepoint
WHITE PAPER: Learn about how you can find a next-gen firewall (NGFW) system that is built to fit the strength and scalability your business needs, with the simplicity and efficiency that you want in this white paper.
Posted: 10 May 2017 | Published: 10 May 2017

Forcepoint

The Challenges of Managing SSL/TLS Encrypted Traffic
sponsored by Gigamon
RESEARCH CONTENT: Just 31% of companies say they have a plan in place to protect both their security sockets layer (SSL) and transport layer security (TLS) traffic in their network. In this SC Media survey, learn why it's so imperative to have a SSL/TLS plan.
Posted: 05 May 2017 | Published: 05 May 2017

Gigamon

Businesses Blame Rivals for DDoS Attacks& The Importance of Cloud WAF
sponsored by F5 Networks
EGUIDE: More than 40% of businesses hit by a DDoS attack believe their competitors were behind it, according to research by Kaspersky Lab and B2B International. But is there truth behind this suspicion? In this expert e-guide, learn ]about the real culprits behind DDoS attacks, and get some insight into the emergence of cloud WAF for application security.
Posted: 04 May 2017 | Published: 01 May 2017

F5 Networks

End Web Application Security Risks with WAF
sponsored by F5 Networks
EGUIDE: In this expert e-guide, educate yourself on all things WAF by discovering how a WAF works, the best WAF features and more. Additionally, learn how to further resolve web application vulnerabilities.
Posted: 04 May 2017 | Published: 01 May 2017

F5 Networks

Silver Peak Enhances its SD-WAN Edge Device to Improve the Branch Experience
sponsored by Silver Peak
RESOURCE: Learn about the functionality SD-WAN boasts that MPLS just can't match, including access to 4G LTE and broadband and increased application performance for mobile and remote users.
Posted: 04 May 2017 | Published: 14 Apr 2017

Silver Peak

Enterprise Vulnerability: Expert Tips and Product Reviews
sponsored by TechTarget
RESOURCE: Explore a 3-step process for ranking enterprise vulnerabilities, learn how to calculate a vulnerability's risk score, and discover the best risk assessment and management tools for your enterprise with the expert advice found in our exclusive e-guide, Prioritize and Manage Enterprise Vulnerability.
Posted: 03 May 2017 | Published: 30 Nov 2015

TechTarget

SIEM in 2016: Spruce Up Your Technology
sponsored by TechTarget
RESOURCE: In Resolve to Revitalize Your SIEM, our experts discuss new SIEM product offerings, how you can best use the data that a SIEM collects, and even how to make an old SIEM work better for your organization.
Posted: 03 May 2017 | Published: 30 Nov 2015

TechTarget

Buyer's Guide: Network Monitoring Tools
sponsored by TechTarget
RESOURCE: In this complimentary e-guide, learn more about monitoring tools, how network monitoring works, and the difference between nice-to-have and need-to-have features in order to determine the best tool to monitor your network's performance.
Posted: 03 May 2017 | Published: 30 Nov 2015

TechTarget

Tech to Protect Against Ransomware, Ensure Hospital Data Security
sponsored by Cisco Umbrella
EGUIDE: Keith Jennings, CIO at Mass General Hospital in Boston, and Andrew Rosenberg, M.D., interim CIO at the University of Michigan Health System in Ann Arbor, discuss key technology and strategies to prevent ransomware attacks.
Posted: 24 May 2017 | Published: 24 May 2017

Cisco Umbrella

Healthcare Ransomware Attack: Prevention and Backups Are Critical
sponsored by Cisco Umbrella
EGUIDE: In this e-guide, explore 6 pointers for preventing ransomware attacks according to Harun Rashid, VP of Global Health Services and CIO of Children's Hospital of Pittsburgh of UPMC.
Posted: 24 May 2017 | Published: 24 May 2017

Cisco Umbrella

Ten Ways to Stop a Ransomware Threat Targeting Healthcare Data
sponsored by Cisco Umbrella
EGUIDE: Ransomware attacks are up across the board, but not many organizations are as vulnerable to targeted ransomware attacks as healthcare organizations. Uncover 10 ways that you can stop a ransomware threat from targeting your healthcare data, as shared by health IT expert Reda Chouffani.
Posted: 24 May 2017 | Published: 24 May 2017

Cisco Umbrella

Protect Against Ransomware and Ensure Hospital Data Security
sponsored by Cisco Umbrella
EGUIDE: Uncover a Q&A with Keith Jennings, CIO at Mass General Hospital in Boston, and Andrew Rosenberg, M.D., interim CIO at the University of Michigan Health System in Ann Arbor, as they discuss essential strategies and technology for preventing ransomware attacks on healthcare organizations.
Posted: 18 May 2017 | Published: 18 May 2017

Cisco Umbrella

SD-WAN's Impact on Routers, and Riverbed Upgrades SteelConnect
sponsored by Riverbed Technology, Inc.
EGUIDE: This expert e-guide explains how SD-WAN is ending the need for stand-alone enterprise routers and optimization technology in the WAN. Additionally, learn what Riverbed's SD-WAN upgrade means for SteelConnect.
Posted: 17 May 2017 | Published: 11 May 2017

Riverbed Technology, Inc.

Threat Hunting For Dummies
sponsored by Carbon Black
EBOOK: It's time to get proactive with threat hunting. In this Threat Hunting for Dummies e-book learn how to optimize your tools for endpoint visibility and threat intelligence and uncover 10 tips for creating effective threat hunting strategies.
Posted: 09 May 2017 | Published: 08 May 2017

Carbon Black

Fast-Forward Business with IT Infographic
sponsored by VMware and Circle IT
RESOURCE: In this infographic, learn how you can make your IT processes 87% faster by cutting out time-consuming and labor-intensive manual processes.
Posted: 04 May 2017 | Published: 31 Jan 2017

VMware and Circle IT
251 - 275 of 1546 Matches Previous Page    9 10 11 12 13 14    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement