IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network SecurityReports
26 - 50 of 1195 Matches Previous Page  | Next Page
How to Protect Your Business From Today's Security Threats
sponsored by Optus Business
WHITE PAPER: This white paper highlights the importance of maintaining robust network security within your enterprise, especially with an evolving threat landscape.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Optus Business

Intrusion Detection and Protection: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK: Learn how IDS/IPS help you thwart attacks and mitigate post-attack damage.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SearchSecurity.com

The Hidden Costs of Self-Signed SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Security is not usually one of the first places companies look to trim expenses, but some IT professionals believe that they can easily lower costs by eliminating third-party Secure Sockets Layer (SSL) Certificate Authorities (CAs) from the budget equation. However, this kind of reasoning can backfire – badly.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

Cloud Adoption in Asia Pacific: Overcoming Security Concerns with SSL
sponsored by Symantec Corporation
WHITE PAPER: Cloud computing offers unprecedented opportunities for businesses to cut IT costs while improving their ability to respond to changing strategic demands. Concerns about security, however, are a barrier to adoption.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

Next-generation guest network access for GenMobile
sponsored by Aruba Networks
WHITE PAPER: Users today expect to connect from anywhere and giving them high-performance guest access is absolutely essential.  Weak security on the guest network can expose your business to external threats and could cause serious liablility issues.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Aruba Networks

Outsider Threat Protection: Building a Kill Chain Defense
sponsored by Digital Guardian
WHITE PAPER: This white paper reveals the story behind outsider threats and how to defend against these attacks that steal sensitive data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

DDos Survival Handbook
sponsored by Singlehop
WHITE PAPER: This handbook is the survival guide to fight off cyber attackers and mitigate the risk of DDoS attacks.
Posted: 29 Sep 2014 | Published: 31 Dec 2013

Singlehop

Mobility Customer Success Stories: BYOD and Mobility
sponsored by Cisco Systems, Inc.
WHITE PAPER: Let's face it; Employees bring their own devices into work and want to be able to connect to corporate networks. There are a lot of vendors in mind when deciding on a BYOD strategy, and the best fit depends on your company.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Cisco Systems, Inc.

Managing SSL Certificates in Pan-Asia Pacific Enterprises
sponsored by Symantec Corporation
WHITE PAPER: Businesses around the world face an array of threats to information security.  Enterprised in Pan-Asia face the same threats while contending with region-specific challenges associated with trade across diverse cultures.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Symantec Corporation

Website Security Threat Report 2014
sponsored by Symantec Corporation
WHITE PAPER: In 2013, attention was focused on threats to privacy and acts of malicious insiders.  However, the end of the year provideded a painful remind that cybercime remains prevalent today.
Posted: 26 Sep 2014 | Published: 30 Jun 2014

Symantec Corporation

Avoiding BYO Policy and Security Pitfalls
sponsored by Citrix
WHITE PAPER: When employees use their own technology for business purposes, they gain mobility and productivity but pose a new threat for IT security, as well as other policy pitfalls.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Citrix

Data Loss Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

Data Loss Prevention: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

The Definitive Guide to Secure Enterprise Mobility
sponsored by Aruba Networks
WHITE PAPER: Enterprise organizations today are allowing a new generation of users - known as the mobile generation - to maximize productivity by relying on mobile devices for every aspect of work and personal communication.  However, networking security concerns are emerging.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Aruba Networks

3 Ways to Secure Your Critical Data in the Cloud
sponsored by CipherCloud
WEBCAST: This webcast exposes the three steps needed to secure data in the cloud: cloud discovery, data discover, and data protection.
Posted: 24 Sep 2014 | Premiered: Sep 24, 2014

CipherCloud

Five Questions to Ask Every Vendor: SDN Evaluation Guide
sponsored by Extreme Networks
WHITE PAPER: With all of the great benefits of SDN, there's no doubt any organization is looking into it.  But is your company the right fit?
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Extreme Networks

SMS Alert System Boosts Service for Rasa Sentosa Resort
sponsored by TalariaX
CASE STUDY: Dive into this case study to learn about the SMS alert system that Rasa Sentosa Resort in Singapore chose to alert their network engineers, equipped with a filter to allow only important messages to be sent as SMS, reducing unnecessary SMS disturbances.
Posted: 18 Sep 2014 | Published: 31 Dec 2012

TalariaX

Transforming Resiliency and TCO
sponsored by Riverbed Technology, Inc.
WHITE PAPER: The branch office has always been a dilemma for IT teams.  They're a critical point of productivity and revenue, but come with a tremendous amount of overhead and risk.
Posted: 18 Sep 2014 | Published: 30 Apr 2014

Riverbed Technology, Inc.

How a service city improved their SMS alert system
sponsored by TalariaX
CASE STUDY: Access this case study to learn about an SMS alert system that was deployed in a California service city that was complementary to the existing fire department infrastructure but also enhanced communication capabilities for a more efficient and reliable notification system, while maintaining a low capital investment.
Posted: 17 Sep 2014 | Published: 31 Dec 2012

TalariaX

CradlePoint Enablers for PCI Compliant Systems
sponsored by CradlePoint
WHITE PAPER: Explore this informative paper that will help you better understand how to create and maintain a Payment Card Industry (PCI) compliant network. Read on to learn about PCI security standards, and what one player in the network connectivity market recommends for PCI compliance.
Posted: 16 Sep 2014 | Published: 08 Jan 2014

CradlePoint

Security for the Mobile First Era
sponsored by MobileIron
RESOURCE: Along with the great benefits of mobility came the daunting security risks.  As mobile networks becoming increasingly more diverse, it's important to have a security plan that can keep up.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

MobileIron

5 Tips for Guest BYOD Use
sponsored by North Sydney IT and Cisco
WHITE PAPER: If your midsize company welcomes guests and their mobile devices, read this white paper. Get five tips for guest BYOD use.
Posted: 15 Sep 2014 | Published: 15 Sep 2014

North Sydney IT and Cisco

Rightsize for the Midsize: Leverage the Network Infrastructure for Competitive Success
sponsored by Cisco
WHITE PAPER: This IDC report examines the opportunity midmarket firms have in leveraging network infrastructure for competitive success in the new cloud and mobility era. Inside, learn how midmarket firms can improve their competitive position by providing more efficient access to advanced productivity resources.
Posted: 15 Sep 2014 | Published: 31 May 2014

Cisco

Podcast: Opportunities with VMware and VMware vCHS
sponsored by Avnet Technology Solutions
PODCAST: The mobile-cloud era brings with it an increase in business and end-user expectations, and IT pays the price
Posted: 15 Sep 2014 | Premiered: Sep 5, 2014

Avnet Technology Solutions

A New Set of Network Security Challenges
sponsored by Icomm Technologies
WHITE PAPER: Today, workers demand access from devices beyond the firewall.  Smart phones, tablets, and laptops of all types.  However, the biggest challenge is finding a balance between productive and security.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Icomm Technologies
26 - 50 of 1195 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement