IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network SecurityReports
251 - 275 of 1195 Matches Previous Page  | Next Page
Automation: The Future of Network Visibility
sponsored by Ixia
WHITE PAPER: Gain an understanding of how monitoring switch automation fits your organization, and discover how different security tools can help boost your compliance initiatives.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

DDoS Mitigation: Best Practices for a Rapidly Changing Threat Landscape
sponsored by Verisign, Inc.
WHITE PAPER: This guide explores one company's set of best practices that enables organizations to keep pace with DDoS attacks while minimizing impact on business operations.
Posted: 28 Feb 2014 | Published: 31 Dec 2012

Verisign, Inc.

PCI DSS compliance 101
sponsored by Dell, Inc.
WHITE PAPER: This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Dell, Inc.

Ixia’s Visibility Architecture
sponsored by Ixia
VIDEO: Learn more about the importance of your access to and control of data at every point in the physical and virtual network, and how to enable end-to-end visibility and security.
Posted: 27 Feb 2014 | Premiered: 27 Feb 2014

Ixia

Meet the Campus
sponsored by Dell, Inc.
WEBCAST: Networks are always influx and tackling these complexities can be difficult, especially with a growing mobile landscape. This brief video highlights a unique solution to all these networking concerns and how you can easily and effectively overcome them.
Posted: 27 Feb 2014 | Premiered: Feb 27, 2014

Dell, Inc.

Unified Threat Management: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK: To properly evaluate unified threat management (UTM) products, you must understand what each vendor offers and how well it fits with your organization.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

SearchSecurity.com

Unified Threat Management: Decision Time
sponsored by SearchSecurity.com
EBOOK: Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

SearchSecurity.com

Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale
sponsored by Hewlett-Packard Limited
WHITE PAPER: This guide takes a look at the the wide-scale shift to an increased mobile world and some best practices for tackling challenges and optimizing wokplace efficiency.
Posted: 26 Feb 2014 | Published: 31 Aug 2013

Hewlett-Packard Limited

Unified Threat Management: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK: Learn how unified threat management (UTM) systems can help you achieve a layered security defense.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

SearchSecurity.com

Next Generation Enterprise Network Security Solutions: The Importance of Incorporating Vulnerability Intelligence-
sponsored by Hewlett-Packard Company
WHITE PAPER: This crucial paper surveys today's network security threat landscape, discussing available tools, best practices, and the critical role that vulnerability intelligence must play in your security strategy.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

Hewlett-Packard Company

Network IPS Tested Against Latest Vulnerabilities and Attacks
sponsored by IBM
WHITE PAPER: This white paper serves as a guide to help you choose your intrusion prevention system (IPS) investment. Click through for information on a solution that passed essential test factors.
Posted: 20 Feb 2014 | Published: 18 Dec 2013

IBM

NSS Labs Network Intrusion Prevention System Product Analysis- IBM GX7800
sponsored by IBM
WHITE PAPER: This resource reveals the best-value features to look when making a network intrusion prevention system (IPS) by providing performance analysis of a top IPS solution.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

IBM

Supporting the Zero Trust Model of Information Security: The Important Role of Today's Intrusion Prevention Systems
sponsored by IBM
WHITE PAPER: This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Click through to learn how the intrusion prevention system (IPS) can be used to fulfill this model.
Posted: 20 Feb 2014 | Published: 30 Sep 2013

IBM

WAN Optimization and Application Acceleration from Soup to Nuts
sponsored by TechTarget
RESOURCE: To reduce corporate footprint and make the most of network purchases, many of your IT peers are turning to tactics that address WAN optimization, management, and security together. Access WAN Optimization and Application Acceleration from Soup to Nuts to uncover tips on how to bring the benefits of this comprehensive strategy to your organization.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

TechTarget

Why Protection and Performance Matter: Introducing Next-Generation Firewalls
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to discover the benefits of a next-generation firewall and how it offers top security without causing serious network latency.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

Dell, Inc.

Trust in Cyberspace
sponsored by (ISC)2 UK Ltd
WHITE PAPER: In this white paper, unveil a list of characteristics that define trusted software, which is critical to ensuring its quality and reliability as a secure product.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

(ISC)2 UK Ltd

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Sophos, Inc.

Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER: This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER: With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

Why You Need A Next-Generation Firewall
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Hewlett-Packard Limited

Chiayi City Tax Bureau Protects Intranet and Extranet from Unauthorized Access with Extreme Networks
sponsored by Extreme Networks
WHITE PAPER: This cast study takes a look at how one company successfully updated their network infrastructure and boosted network performance.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Extreme Networks

Enterprise Security with mobilEcho® : Enterprise Security from the Ground Up
sponsored by Acronis
WHITE PAPER: This white paper highlights a mobile file management (MFM) solution that ensures secure corporate file access for the mobile workforce.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Acronis

The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This guide takes a look at 10 things that every web application firewall should provide.
Posted: 19 Feb 2014 | Published: 31 Dec 2012

Imperva

Extreme Networks Physical Security Solution
sponsored by Extreme Networks
WHITE PAPER: This guide explores some significant benefits of networking for your physical security and how it can enhance your network performance.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Extreme Networks

Seagate NAS - What's Driving Data Security and Remote Access Inside
sponsored by Seagate Technology
WHITE PAPER: Check out this brief, 1-page resource that delivers a NAS solution that provides simple, scalable and cost-effective ways to store and serve files securely over the network.
Posted: 18 Feb 2014 | Published: 18 Feb 2014

Seagate Technology
251 - 275 of 1195 Matches Previous Page    9 10 11 12 13 14    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement