IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
26 - 50 of 1413 Matches Previous Page  |  Next Page
Use a web app firewall to halt app attacks
sponsored by SearchSecurity.com
EBOOK: Web application firewalls are more essential than ever when it comes to halting app attacks. Learn what features and functions you should look for when choosing a new WAF.
Posted: 07 Feb 2017 | Published: 05 Feb 2017

SearchSecurity.com

How the Houston Astros Protected their Network from Internet Threats
sponsored by ContentKeeper
CASE STUDY: Explore how the Houston Astros implemented a multi-layered approach to web security to protect against malware, botnets, phishing scams and other online threats. Discover how they unlocked real-time monitoring and reporting of Internet activity for mobile users connecting to their VPN and gained more granular control of SSL encrypted web traffic.
Posted: 07 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

Do You Trust Your Network Security?
sponsored by Ixia
WHITE PAPER: Protecting your network requires a deeper strategy than simply buying security inspection tools, integrating them, and expecting them to comprehensively inspect all of your traffic. Learn how to test your network elements before you go live in order to provide your organization the confidence that your network can survive an attack.
Posted: 06 Feb 2017 | Published: 30 Dec 2016

Ixia

Navigating the Data Center Networking Architecture and the Relevance of Composable Infrastructure
sponsored by Hewlett-Packard Enterprise
EGUIDE: Download this guide to overcome the complexity modern data center networking architectures create, including the impact of hybrid cloud on workload segregation, service-policy enforcement, and security. Additionally, experts highlight composable infrastructure as a new method for server simplification.
Posted: 03 Feb 2017 | Published: 02 Feb 2017

Hewlett-Packard Enterprise

10 Things Your Next Firewall Must Do
sponsored by Palo Alto Networks
WHITE PAPER: Uncover the 10 things your next firewall must do in order to strike the balance between blocking attacks and allowing mission-critical apps to run when and where you need them.
Posted: 03 Feb 2017 | Published: 31 Dec 2016

Palo Alto Networks

Towards more robust internetworks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

ComputerWeekly.com

Are You Ready to Monitor the Internet of Things?
sponsored by Paessler
WHITE PAPER: The Internet of Things (IoT) promises to launch a new era in network monitoring, where the number of things that are connected to the network and the amount of data they generate will grow exponentially. Learn 10 tips to anticipate and prepare for network monitoring in the IoT enabled future.
Posted: 01 Feb 2017 | Published: 29 Apr 2015

Paessler

New Year, New WAN
sponsored by SearchNetworking.com
EZINE: In this edition of Network Evolution, we explore three diverse SD-WAN deployment stories to illustrate the growing trend and offer insight into how SD-WAN adoption plays out on the ground.
Posted: 01 Feb 2017 | Published: 01 Feb 2017

SearchNetworking.com

9 Ways to Avoid Common Network Issues Before They Occur
sponsored by Paessler
WHITE PAPER: In today's mobile, work-around-the-clock culture, just one minute of network downtime can cost an organization, on average, $5,600 and can significantly impair productivity. Learn the 9 tips to avoid common network issues and ensure the daily health of your systems.
Posted: 31 Jan 2017 | Published: 16 Mar 2015

Paessler

Cybersecurity Essentials for 2017
sponsored by Neustar
VIDEO: In this webinar, Scott Crawford, Research Director for Information Security with 451 Research, and Rodney Joffe with Neustar will examine essential cybersecurity trends and highlight key tactics to better prepare you for what the coming year may bring.
Posted: 30 Jan 2017 | Premiered: 25 Jan 2017

Neustar

Blended IT and Security Operations: Where's The Balance?
sponsored by ServiceNow
EGUIDE: There are benefits to eliminating the distance between IT and security operations. But there are challenges as well. In this expert e-guide, learn about the risks and benefits of integrating IT and security operations.
Posted: 25 Jan 2017 | Published: 30 Sep 2016

ServiceNow

Make Your Enterprise Network a Top Priority for Hybrid IT
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Discover new research that sheds light on the symbiotic relationship between hybrid IT and enterprise networks. Access now, to see what your peers are saying.
Posted: 20 Jan 2017 | Published: 30 Dec 2016

Level 3 Communications, Inc.

Security Everywhere: A Growth Engine for the Digital Economy
sponsored by Cisco
WHITE PAPER: Learn how security can become an enabler for businesses to take full and secure advantage of opportunities presented by new digital business models and the growing pervasiveness of the IoE.
Posted: 19 Jan 2017 | Published: 19 Jan 2017

Cisco

Reengineering The Internet for Stronger Network Security
sponsored by Neustar
WHITE PAPER: Discover how to make the internet safer, faster, and more efficient by tackling today's threats and mitigating website downtime, keeping your team calm and efficient.
Posted: 19 Jan 2017 | Published: 19 Jan 2017

Neustar

Managed DNS Evaluation Guide: Understanding What Matters Most When Selecting Managed DNS
sponsored by Dyn
WHITE PAPER: This guide explains how a cloud-based DNS service can help you improve business results and provides guidelines for choosing a managed DNS service provider.
Posted: 17 Jan 2017 | Published: 30 Nov 2016

Dyn

Wi-Fi is Easy, Secure Wi-Fi is the Challenge.
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this eBook, learn about the increasing demand for Wi-Fi, and more importantly, how to secure your wireless network.
Posted: 13 Jan 2017 | Published: 10 Oct 2016

WatchGuard Technologies, Inc.

Navigating Market Complexity to Fulfill Network Security Requirements
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper explores how to take a strategic approach to selecting the right tools for modern network security. Discover how SMBs can tackle the challenge of navigating the market to make sure they're putting pragmatic, streamlined, and effective security measures in place.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

WatchGuard Technologies, Inc.

Improve Network Security Speed and Performance
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this data sheet, you'll learn about security technology that upholds performance even as more security functions and features get added. Learn about these features, including agile firewall throughput, comprehensive network security services, and more.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

WatchGuard Technologies, Inc.

School District Ensures Data Protection with Network Security Appliance
sponsored by WatchGuard Technologies, Inc.
CASE STUDY: One school district, with over 1,200 students and 400 staff members, needed to protect confidential data, remain compliant with CIPA (Children's Internet Protection Act) and improve visibility and control over web applications. In this case study, learn how the school was able to meet their needs with one advanced, network security appliance.
Posted: 10 Jan 2017 | Published: 03 Mar 2016

WatchGuard Technologies, Inc.

IoT Strategy: 8 Key Questions to Ask
sponsored by Cisco Systems, Inc.
WHITE PAPER: IoT introduces tremendous risk if the connected products and services are not designed, deployed and supported properly. The 8 questions presented in this white paper provide a step-by-step approach for turning an IoT vision into reality.
Posted: 29 Dec 2016 | Published: 30 Nov 2016

Cisco Systems, Inc.

Capitalizing on The Internet of Things
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how transform a product business into a service business, the core benefits and challenges of IoT, as well as 5 fundamentals to consider when evaluating how your company can best leverage the internet of things.
Posted: 29 Dec 2016 | Published: 29 Dec 2016

Cisco Systems, Inc.

Achieving End-to-End Security in the Internet of Things
sponsored by Cisco Systems, Inc.
WHITE PAPER: Minimize risk and optimize operations for mission-critical connected devices using cellular IoT for secure connections. Learn how you can capitalize on the IoT's endless possibilities without becoming tomorrow's headline
Posted: 27 Dec 2016 | Published: 30 Jun 2016

Cisco Systems, Inc.

Innovative Monetization Approaches for Home Security and Automation Organizations
sponsored by Cisco Systems, Inc.
WHITE PAPER: Take an in-depth look at four innovative IoT approaches home security organizations are using to expand their services and grow their bottom line.
Posted: 27 Dec 2016 | Published: 30 Apr 2016

Cisco Systems, Inc.

Best Practices for Implementing Global IoT Initiatives
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how to successfully launch, secure and maintain your IoT service. Discover six best practices for managing IoT complexity and six crucial areas you must be prepared to address.
Posted: 23 Dec 2016 | Published: 31 Mar 2016

Cisco Systems, Inc.

Improving Patient Care With Secure Mobile Software
sponsored by BlackBerry
CASE STUDY: Learn how UHB used mobile technology to improve patient care while ensuring security and empowering staff. For example, UHB deployed applications which serve as on-call systems providing physicians with real-time assistance.
Posted: 21 Dec 2016 | Published: 21 Dec 2016

BlackBerry
26 - 50 of 1413 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement