IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
26 - 50 of 1579 Matches Previous Page  |  Next Page
Five Essential Elements for an Effective Mobile Security Strategy
sponsored by VMware
WHITE PAPER: End users want access to data anytime, anywhere, but enterprise mobility creates opportunities for cyberattacks to grow. In this trend brief, you'll review the essential elements of building a mobile security strategy. Access now to learn about ways to construct your strategy and protect data.
Posted: 15 Aug 2016 | Published: 29 Apr 2016

VMware

Cyber Security Trends ASEAN 2016
sponsored by ComputerWeekly.com
EGUIDE: As cyber security becomes a top priority for policy makers and IT leaders, this guide looks at some of the issues facing government and private sector organizations in South-East Asia.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

ComputerWeekly.com

Cyber Security Trends ANZ 2016
sponsored by ComputerWeekly.com
EGUIDE: As cyber security becomes a top priority for policy makers and IT leaders, this e-guide looks at some of the issues facing government and private sector organisations in Australia and New Zealand.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

ComputerWeekly.com

Secure Access for Healthcare
sponsored by Fortinet, Inc.
RESOURCE: This resource discusses providing Wi-Fi in environments where reliability and security are key. When lives are on the line, and customer privacy needs the strictest protection, the security of the wireless environment need to be carefully accounted for.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Fortinet, Inc.

How CAME Group Protects Endpoints from Targeted Cyber-Attacks
sponsored by Palo Alto Networks
WHITE PAPER: Working with a trusted IT partner, CAME Group was able to deploy a security platform in their central data center and protect more than 1,600 endpoint devices. Discover ways you too can enable increased visibility and control of your network.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Palo Alto Networks

Secure Access for Retail
sponsored by Fortinet, Inc.
RESOURCE: The wireless network must become a springboard to exploit new technologies without adding to the security risks. This resource highlights how the retail industry can offer Wi-Fi internet to their customers without fear of security failures.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Fortinet, Inc.

Exposing the Unknown: How Sanboxing Technology Fights Modern Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper to examine the challenges enterprises face today, and the increasing need for comprehensive security solutions. Read on to also explore the emerging role of sandboxing as a powerful weapon in cyber security.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Check Point Software Technologies Ltd.

Solution Guide
sponsored by Fortinet, Inc.
RESOURCE: Learn the features of a tool which will work to secure your network, even as IT security becomes more complicated and vulnerable. By recognizing the danger presented by wireless networking, you can effectively prepare for the modern explosion of network connected wireless devices.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Fortinet, Inc.

Secure Access for K-12 Education
sponsored by Fortinet, Inc.
RESOURCE: Learn how classrooms and networks with specific needs can benefit from secure wireless networking without excessive cost or loss of features. Access now to learn how you can support BYOD, guard against malicious attacks, malware and viruses, and completely control application usage.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Fortinet, Inc.

Integrated Secure Access Deployment Guide
sponsored by Fortinet, Inc.
PRODUCT LITERATURE: This deployment guide shows how to unify the management of wired and wireless infrastructure and security on to one platform and negate the need for multiple separate appliances.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Fortinet, Inc.

Tranforming your Security
sponsored by Fortinet, Inc.
WHITE PAPER: Fortunately, we're entering into a new era of firewall technology for your modern, borderless network. Discover how to consolidate network security across your entire threat surface, thus increasing security effectiveness and reducing complexity. Gain central visibility and control of your network, managed through a single pane of glass.
Posted: 11 Aug 2016 | Published: 01 Jul 2016

Fortinet, Inc.

Future Focus: Is Your Enterprise Ready for IoT?
sponsored by BlackBerry
WHITE PAPER: Every part of the workplace may soon be connected to a digital network because of the emergence of the Internet of Things (IoT), making protecting corporate data increasingly difficult. Access this white paper that details IoT and one secure enterprise mobility management suite that can prepare you for it.
Posted: 11 Aug 2016 | Published: 25 Jul 2016

BlackBerry

How to Handle the IoT from the Data Center to Security
sponsored by Xively by LogMeIn
EGUIDE: In this e-guide, learn how experts ensure IoT devices can stand up to the scope of modern security challenges, and what IT pros are doing to help the data center support IoT data from numerous sources.
Posted: 10 Aug 2016 | Published: 08 Aug 2016

Xively by LogMeIn

Securing Cloud Environments: Policy-Based Security Automation and Microsegmentation Overview
sponsored by Nokia
WHITE PAPER: If you're not enabling your SDN with a virtualized services platform then you may not be able to meet the networking and security challenges imposed by the cloud. Access this white paper that highlights how you can extend the benefits of SDN from networking to security policy management and orchestration, ensuring success in the cloud.
Posted: 10 Aug 2016 | Published: 31 Dec 2015

Nokia

Secure Access for Large Public Venues
sponsored by Fortinet, Inc.
RESOURCE: Find out how you can implement fast, secure Wi-Fi, even in unusual and demanding environments. Access now to learn how to confront challenges of scaling, performance, and vulnerability in large buildings.
Posted: 09 Aug 2016 | Published: 09 Aug 2016

Fortinet, Inc.

The Most Important Things You Need to Know About Enterprise Mobility Management
sponsored by IBM MaaS360
WEBCAST: Today, employees are using their devices to access corporate data and using company devices to access personal data. This usage presents new security risks that call for an integrated, comprehensive policy for managing mobile devices. View this webinar that discusses the mobile workplace and how to construct an effective and secure mobile policy.
Posted: 09 Aug 2016 | Premiered: Jun 30, 2016

IBM MaaS360

Enterprise Mobility: How Mobile Device Management Exploded to Include Devices, Apps and Content
sponsored by IBM MaaS360
WHITE PAPER: Today, nearly every enterprise works with mobile devices, but few know how to maximize their potential. So, how do you turn mobility into a valued asset? Access this white paper to learn about workplace mobility and how to successfully implement a unified mobile policy.
Posted: 09 Aug 2016 | Published: 31 Mar 2016

IBM MaaS360

Common Hyper-Converged Network Concerns and Solutions
sponsored by NTT ICT
EGUIDE: Do your apps require either very high or very specific performance? Discover in this expert guide how to identify and resolve hyper-converged networking bottlenecks by implementing a dedicated storage network and examining how data is stored within your architecture.
Posted: 09 Aug 2016 | Published: 09 Aug 2016

NTT ICT

Facing up to Mobile Security Challenges
sponsored by IBM MaaS360
WEBCAST: Expectations for mobile access to corporate data have never been greater. But, how do you enable your company with mobility and ensure security? View this webcast that details mobile security challenges and how to best prepare for them with a complete mobile strategy.
Posted: 09 Aug 2016 | Premiered: May 31, 2016

IBM MaaS360

Why Micro-Segmentation Matters Now
sponsored by VMware
WHITE PAPER: Cybercriminals count on the fact that data center security is still based on a penetrable, hardware-centric model. Access this white paper to learn how the advent of network virtualization empowered by micro-segmentation changes the economics, ease and speed of data center security, eliminating long-standing vulnerabilities.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

VMware

Extend Security and Control from the Data Center Edge to the Core
sponsored by VMware
WHITE PAPER: How do you get your software-defined data center (SDDC) to extend its benefits to your network? Access this white paper to learn how network virtualization can empower your SDDC and provide your network with enhanced security, increased productivity and accelerated IT compliance, ultimately resulting in reduced costs.
Posted: 05 Aug 2016 | Published: 01 Jul 2016

VMware

A New Approach to Data Center Security
sponsored by VMware
WHITE PAPER: The persistent threats and coordinated attacks in today's environment call for a new model of data center security. But how do you implement this new model without incurring huge hardware and firewall costs? Access this white paper to learn how micro-segmentation empowered by a network virtualization platform delivers fine-grained security.
Posted: 05 Aug 2016 | Published: 01 Jul 2016

VMware

Network Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: This resource discusses access layer protection in enterprise WLANs, and why deploying ad hoc security is no longer enough to protect against threats in the IoT era. Further, you'll learn how secure access architecture gives enterprise networks the end-to-end protection needed to defend the enterprise in the future.
Posted: 05 Aug 2016 | Published: 05 Aug 2016

Fortinet, Inc.

Join the Citrix Ready Secure Remote Access Program
sponsored by Citrix Ready
WEBCAST: What is Citrix Ready Secure Remote Access Program? How does it help you showcase your products and solutions while highlighting the integration with Citrix products? This video explains this program, why you should join, and how you and your customers will benefit its implementation.
Posted: 03 Aug 2016 | Premiered: Aug 9, 2016

Citrix Ready

The Threat Defense Lifecycle: Intelligent Endpoint Threat Defense
sponsored by Intel Security
WHITE PAPER: Adopt a threat defense lifecycle that will allow you to discover threats faster, respond quicker and overall outsmart attackers, driving business efficiency forward. Learn how to then apply these insights to an automated policy that can block similar attack attempts up front.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security
26 - 50 of 1579 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement