IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
26 - 50 of 1517 Matches Previous Page  |  Next Page
The Critical Elements of IoT Security
sponsored by Fortinet, Inc.
WHITE PAPER: IoT devices are on the rise. Read this white paper to gain a stronger understanding of how to build an IoT security strategy to help increase your network performance and reliability.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Fortinet, Inc.

Welcome to the UCaaS Era
sponsored by Windstream Communications
WHITE PAPER: Access this white paper to learn how you can utilize UCaaS to improve your organization's productivity, drive innovation and help you stay ahead of the competition. Then, find out how to choose a UCaaS provider that can meet your needs for ongoing success.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Windstream Communications

Strategies for the Enterprise to Address Today's Top Security Vulnerabilities
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn the network security challenges organizations still need to overcome and methods for overcoming them.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Fortinet, Inc.

Preparing for the General Data Protection Regulation
sponsored by Fortinet, Inc.
WHITE PAPER: Gain a stronger understanding of GDPR compliance and implications for your network security.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Fortinet, Inc.

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, gain a stronger understanding of the network security challenges organizations still need to overcome.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Fortinet, Inc.

Why Network Monitoring is Important for Cybersecurity Readiness
sponsored by LiveAction
EGUIDE: Our experts explain how consolidating traffic through known secure gateways and watching traffic closely with a variety of monitoring tools can improve cybersecurity readiness.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

LiveAction

Uncover the Top SD-WAN Management Concerns
sponsored by LiveAction
EGUIDE: Our experts divide SD-WAN management concerns into 4 distinct areas for evaluation to help organizations improve their SD-WAN technology strategies and application QoS.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

LiveAction

IoT Botnets: The Stakes Have Changed. Have you?
sponsored by Arbor Networks
WEBCAST: The stakes have changed for IoT botnets and DDoS attacks, are you ready? In this webcast, learn how IoT devices attract DDoS security attacks. Then, find out how your organization can shift towards a more secure and reliable IoT future.
Posted: 25 Oct 2017 | Premiered: Nov 21, 2016

Arbor Networks

What you Need to Know About Cloud Security
sponsored by Arctic Wolf Networks, Inc.
EBOOK: In this e-book, gain a stronger understanding of the 3 most prominent types of cloud services and the questions your organization should ask when building a network security platform.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Arctic Wolf Networks, Inc.

How to Close Security Gaps to Stop Ransomware and other Threats
sponsored by Fortinet, Inc.
EBOOK: In this e-book, gain a stronger understanding on how protecting your enterprise starts with ensuring coverage across different attack vectors through coordinated Advanced Threat Protection (ATP). Then, find out how IT network pros strive to overcome network security challenges to help increase performance, reliability, and scalability.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Fortinet, Inc.

What is the Best Type of DDoS Protection for my Business?
sponsored by Arbor Networks
WHITE PAPER: Cisco predicts that by 2020, 17 million DDoS attacks will occur annually. In this white paper, learn which type of DDoS protection is best for your business.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Arbor Networks

5 questions to ask when considering a DDoS Managed Service
sponsored by Arbor Networks
WHITE PAPER: When evaluating DDoS protection for your business, what are the top questions you should ask? This white paper offers 5 questions to ask to ensure you are picking the best DDoS protection strategy for your enterprise.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Arbor Networks

Advantages of a Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: It is challenging to know which strategy is best for your enterprise protection. This white paper explores the differences between a fabric and a platform approach to your security framework, and reveals how you can protect your enterprise from security threats.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Fortinet, Inc.

IoT Botnets and DDoS Attacks: The Stakes Have Changed
sponsored by Arbor Networks
WEBCAST: The stakes have changed for IoT botnets and DDoS attacks, are you ready? In this webcast, learn how IoT botnets quickly spread. Then, find out how your organization can shift towards a more secure and reliable IoT future.
Posted: 24 Oct 2017 | Premiered: Apr 6, 2017

Arbor Networks

The Stakes Have Changed: No End in Sight for DDoS Attack Size Growth
sponsored by Arbor Networks
RESOURCE: In this resource, gain a better understanding of how IoT devices become vulnerable to the spread of IoT botnets, so your organization can move towards a more secure and reliable IoT future.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Arbor Networks

IOT Botnets & DDoS Attacks: The Stakes Have Changed
sponsored by Arbor Networks
RESOURCE: In this resource, gain a better understanding for DDoS mitigation best practices and learn how to prevent the growth of IoT botnets.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Arbor Networks

Why IPS Devices and Firewalls Fail to Stop DDoS Threats
sponsored by Arbor Networks
WHITE PAPER: According to data center respondents of Arbor's Worldwide Infrastructure Security report, 67% have experienced a multi-vector DDoS attack. In addition, 45% of respondents experienced firewall or IPS device failure during an attack. This white paper reveals why IPS devices and firewalls can't stop DDoS attacks.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Arbor Networks

DDoS Emerges as Primary Threat Vector for IoT
sponsored by Arbor Networks
RESEARCH CONTENT: In this Frost & Sullivan research report, learn about the growing threat of IoT-based DDoS attacks and see how many organizations are defending against them.
Posted: 20 Oct 2017 | Published: 11 Nov 2016

Arbor Networks

The 6 Phases of a DDoS Incident Response Plan
sponsored by Arbor Networks
WHITE PAPER: Incident response is too often an afterthought in the case of DDoS attacks. So, what does an effective incident response program look like? Inside uncover the 6 phases of a DDoS incident response plan and how to put them into place.
Posted: 20 Oct 2017 | Published: 20 Oct 2017

Arbor Networks

A Smarter Approach For Combating Distributed Denial-of-Service Attacks
sponsored by Windstream Communications
RESOURCE CENTER: In this article, learn how to build a modernized DDoS mitigation strategy for your organization without compromising network performance and reliability.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Windstream Communications

Economics of DDoS Attacks
sponsored by Arbor Networks
WHITE PAPER: DDoS attacks are cheaper than ever for the perpetrator, extremely lucrative for the attack service provider, and financially devastating for the target. Read this white paper to gain insight into DDoS attacks as a service to prevent your company from having to pay the steep downtime costs and potential legal fees.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Arbor Networks

Research Report: IoT DDoS Attacks Show the Stakes Have Changed
sponsored by Arbor Networks
WHITE PAPER: How can IT network pros defend against DDoS attacks on IoT devices? In this white paper, uncover the recommendations on how to design your DNS infrastructure for stronger security against botnets. Then find out how Forrester Research believes the business technology ecosystem is changing.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Arbor Networks

SIEM Analyst Research Bundle
sponsored by AlienVault
WHITE PAPER: No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

AlienVault

DDoS Mitigation: Types of DDoS Attacks and Security Considerations
sponsored by Arbor Networks
EGUIDE: Our experts discuss various DDoS mitigation services and what your organization should consider before implementing cloud DDoS protection. Then, uncover the various types of DDoS attacks and the steps to take towards a more secure and reliable future.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Arbor Networks

Verizon IT Leverages Secure Cloud Interconnect to Migrate Applications to Cloud Providers
sponsored by Verizon
WEBCAST: In this webcast, listen to representatives from Verizon and Amazon Web Services (AWS) as they discuss the cloud migration experience with Secure Cloud Interconnect (SCI). Then, uncover the benefits of this partnership.
Posted: 23 Oct 2017 | Premiered: Sep 25, 2017

Verizon
26 - 50 of 1517 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement