IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
26 - 50 of 1531 Matches Previous Page  |  Next Page
Aruba Asset Tracking
sponsored by Aruba Networks
RESOURCE: In this resource, uncover the benefits of using real-time location systems (RTLS) to locate your assets to improve productivity in the workplace.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

Digital Documents, Compliance, and the Cloud
sponsored by J2 Cloud Services
WHITE PAPER: This white paper highlights the challenges associated with managing sensitive e-documents that possibly contain intellectual property. Learn best practices for tracking, reporting, and sharing e-documents in the cloud.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

J2 Cloud Services

eFax Corporate: Helping SAP Managers Find the best Cloud-based Fax Provider
sponsored by J2 Cloud Services
WHITE PAPER: In this white paper, eFax Corporate offers insight on finding the right cloud-hosted fax provider while learning the key advantages of moving legacy SAP fax processes into the cloud.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

J2 Cloud Services

Global Interconnection Index
sponsored by Equinix
WHITE PAPER: Evolving business models are placing more importance on real-time engagement, requiring you to scale your digital platforms or risk failing. Access this white paper to learn about a network infrastructure that gives your the power to transfer the entire printed content in the U.S. Library of Congress three times over in one second.
Posted: 18 Sep 2017 | Published: 31 Aug 2017

Equinix

Aruba Campus Switching: The Foundation for the Modern Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: In this white paper, learn the key benefits of different types of campus switching tools to prepare your network infrastructure for the increase of doing business on mobile.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

Improve End-to-end Security with Aruba Clearpass
sponsored by Aruba Networks
RESOURCE: In this resource, learn how to protect all devices corporate, IoT, BYOD- wired and wirelessly to tighten up end-to-end security from unauthorized users.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

The Total Economic Impact Of xMatters
sponsored by xMatters, Inc.
RESEARCH CONTENT: In this research report, Forrester Consulting shares the ROI from organizations that used xMatters as their communications and notifications platform.
Posted: 15 Sep 2017 | Published: 31 Jan 2017

xMatters, Inc.

The Total Economic Impact™ Of Microsoft Windows Defender Advanced Threat Protection
sponsored by Microsoft
RESEARCH CONTENT: This Forrester Consulting report examines the ROI for organizations that used Windows Defender ATP to detect and respond to data breaches on their networks.
Posted: 15 Sep 2017 | Published: 31 Jul 2017

Microsoft

Five Risk Points To Avoid In Enterprise Security
sponsored by Microsoft
WHITE PAPER: Hackers have found sophisticated methods to breach the network undetected.In this white paper, guide yourself through the 5-step course to detect and prevent advance cyberattacks.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Microsoft

How to Build a SOC with Limited Resources
sponsored by LogRhythm, Inc.
WHITE PAPER: Read this white paper to discover the knowledge needed to successfully build your own security operations center (SOC).
Posted: 15 Sep 2017 | Published: 15 Sep 2017

LogRhythm, Inc.

Windows Defender: Advanced Threat Protection (ATP)
sponsored by Microsoft
RESOURCE: In this resource, learn how Windows Defender ATP can help the ability to detect and remediate advanced attacks and data breaches on your networks.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Microsoft

Location Services: Bridging the Physical and Digital Divide
sponsored by Aruba Networks
WHITE PAPER: In this white paper, learn how you can take advantages of BLE-based asset tags and BLE-enabled access points to meet the required accuracy and latency demands for enterprise mobile initiatives.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Aruba Networks

The Top 10 Reasons Companies Continue to Fax in 2017
sponsored by J2 Cloud Services
RESOURCE: In this resource, IT professionals share the top 10 reasons why fax continues to grow and how implementing a cloud fax model allows you to send/receive secure communications with the ease of use of a desktop email.
Posted: 14 Sep 2017 | Published: 19 May 2017

J2 Cloud Services

IT Managers Survival Guide for Moving Your Fax Infrastructure to the Cloud Webinar
sponsored by J2 Cloud Services
WEBCAST: In this webinar, listen to Michael Flavin, Senior Product Marketing Manager, j2 Cloud Services about common misconceptions about cloud computing and the 10 key questions your organization should be asking when evaluating cloud providers.
Posted: 14 Sep 2017 | Premiered: Jun 4, 2015

J2 Cloud Services

The Case for Cloud Faxing
sponsored by J2 Cloud Services
RESOURCE: In this online resource, discover how cloud faxing technology is improving legal performance through reduced costs and tighter security to prevent data breaches of sensitive documentation.
Posted: 13 Sep 2017 | Published: 19 Apr 2017

J2 Cloud Services

How Cloud Faxing Protects Confidential Customer Information
sponsored by J2 Cloud Services
RESOURCE: In this resource, recognize the risks associated with traditional faxing and learn how cloud faxing can help prevent big data breaches.
Posted: 13 Sep 2017 | Published: 23 Dec 2016

J2 Cloud Services

France: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
RESOURCE: Which industries in France are attacked most for malware, phishing and spam?
Posted: 12 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

Study on the Cyber Resilient Organization: United Arab Emirates
sponsored by IBM Resilient
WHITE PAPER: Take an in-depth look at this Ponemon study to reveal factors effecting cyber resilience. Learn more about activities to improve it, barriers, and threats.
Posted: 12 Sep 2017 | Published: 30 Jun 2017

IBM Resilient

The Total Economic Impact of Security-as-a-Service: Alert Logic
sponsored by Alert Logic
RESEARCH CONTENT: This Forrester Consulting report examines the ROI for organizations that used Alert Logic services for cloud security.
Posted: 11 Sep 2017 | Published: 31 Jul 2017

Alert Logic

Why the Automotive Finance Industry is Upgrading to Cloud Faxing
sponsored by J2 Cloud Services
WHITE PAPER: On this website, learn how new compliance regulations influenced automotive finance businesses are now outsourcing their entire process to a trusted cloud fax provider.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

J2 Cloud Services

9 Considerations for Securing Web Apps in the Cloud
sponsored by Alert Logic
WHITE PAPER: Organizations need to re-think their IT security strategies to meet the growing demand for web applications. In this white paper, learn the 9 key considerations for securing web apps in the cloud to prevent data breaches and application-layer attacks.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Alert Logic

Security Threats to the Real Estate Industry
sponsored by J2 Cloud Services
WHITE PAPER: Firms that fail to improve the security and regulatory compliance of their operations will likely face legal and industry consequences. Read this white paper to uncover security benefits of cloud faxing in order to prevent such consequences.
Posted: 11 Sep 2017 | Published: 02 Dec 2016

J2 Cloud Services

Cloud Fax Can Shift your Business into Overdrive
sponsored by J2 Cloud Services
WHITE PAPER: Empower your employees to send and receive faxes by email, anywhere, anytime. Read this white paper to discover how to save your company money by outsourcing your business faxing to the cloud.
Posted: 11 Sep 2017 | Published: 14 Aug 2017

J2 Cloud Services

Top 3 Reasons to Rethink DNS
sponsored by Oracle + Dyn
WEBCAST: Your domain name system (DNS) platform can have a significant impact on digital – and business – performance. Listen to this webinar to discover approaches to improve your DNS.
Posted: 11 Sep 2017 | Premiered: Sep 11, 2017

Oracle + Dyn

Why Traditional Fax Technology is Bad for Business
sponsored by J2 Cloud Services
WHITE PAPER: In this white paper, learn how cloud faxing is a safe, secure, and simple data transmission process that requires no expensive hardware or software updates.
Posted: 11 Sep 2017 | Published: 08 Sep 2017

J2 Cloud Services
26 - 50 of 1531 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement