IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network Security Reports
26 - 50 of 1283 Matches Previous Page  |  Next Page
The State of Enterprise Mobile Threats
sponsored by Lookout
WHITE PAPER: Access this white paper to learn everything you need to know about the current state of mobile security threats for both iOS and Android.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Lookout

Unlock Your Customer Identities: Virtualize SQL to Deliver Better Security and Services
sponsored by Radiant Logic, Inc.
WEBCAST: This webinar explains how a common identity service for all constituents can improve security and deliver better services to your customers.
Posted: 25 Jun 2015 | Premiered: Mar 9, 2015

Radiant Logic, Inc.

Five Things You Must Know About Microsoft BitLocker
sponsored by WinMagic
WHITE PAPER: This white paper presents a 5 step strategy to resolve all BitLocker security issues.
Posted: 25 Jun 2015 | Published: 17 Jun 2015

WinMagic

Verizon Enterprise Solutions Overview
sponsored by Verizon
VIDEO: Access this short video to see an introduction to a networking alternative that will let you expand your reach, increase your agility and maintain longevity.
Posted: 25 Jun 2015 | Premiered: 19 Sep 2013

Verizon

The Peripheral You're Not Managing, and The Risk It Poses
sponsored by Nuance
WEBCAST: This webcast discusses the hidden security risk multi-function printers and other devices pose and gives advice for mitigating that risk.
Posted: 25 Jun 2015 | Premiered: Jun 9, 2015

Nuance

Enabling Competitive Advantage in the Digital Experience
sponsored by Verizon
VIDEO: This short, lighthearted video serves as an introduction to a digital experience service that can help you grown and prevent disruptions.
Posted: 25 Jun 2015 | Premiered: 22 Jan 2015

Verizon

Benefits And Criteria For Selecting The Right SSL VPN Products
sponsored by Pulse Secure
EGUIDE: Access this eGuide to learn the 4 key criteria for choosing the right SSL VPN for your business needs, and the key security benefits they can give you.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Pulse Secure

Special Report: Detailed Reviews of 7 IPS Platforms
sponsored by IBM
WHITE PAPER: This report presents detailed reviews of seven IPS platforms to help you decide which one meets your specific needs.
Posted: 24 Jun 2015 | Published: 29 Dec 2014

IBM

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

Systems and Tips for Improving Enterprise Email Security
sponsored by Rackspace
EGUIDE: In order to protect on-premises email systems, your organization needs to bring network security strategies up to speed. This expert e-guide provides several practical tips to improve enterprise email security.
Posted: 23 Jun 2015 | Published: 18 Jun 2015

Rackspace

The 5 Questions Mobile Businesses Are Asking
sponsored by Lookout
WHITE PAPER: In this white paper, you'll discover the 5 key questions that are most concerning to the lack of visibility in a mobile business.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Lookout

Gain Control of Sensitive Documents
sponsored by Nuance
VIDEO: Take a look at this brief video to discover just how dangerous an insecure printer can be, and to learn what you can do to protect your sensitive documents.
Posted: 22 Jun 2015 | Premiered: 03 Apr 2015

Nuance

BYOD Challenges that Lurk Beyond Network Security
sponsored by Dell, Inc. and Intel®
EGUIDE: In this expert guide, discover five BYOD challenges that go beyond security.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

Dell, Inc. and Intel®

Detect Fake SSL Certificates and Understand Network Security Risks
sponsored by Blue Coat Systems
EGUIDE: Read this e-Guide to learn about the new SSL security threats and how most enterprise wireless networks are likely vulnerable to Cupid, a proof-of-concept based on the Heartbleed attack.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

Blue Coat Systems

Staying Secure with the New PCI Standards
sponsored by Blue Coat Systems
EGUIDE: Access this expert e-Guide to learn how TLS 1.3 ensures secure internet communications and discover the ins and outs of complying with PCI DSS 3.1's new SSL security management plan requirement.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

Blue Coat Systems

How to Create the Secure Mobile Enterprise
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 18 Jun 2015 | Published: 27 Apr 2015

Dell, Inc.

BYOD: In a Maturing Market, Employee Satisfaction Is The Top Priority
sponsored by Intel
WHITE PAPER: Access this white paper to learn how IT leaders in conservative markets can develop a sophisticated approach to managing the risks associate with mobile device proliferation within the enterprise.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Intel

Make Your Move to The Cloud with Confidence
sponsored by Verizon
PRODUCT LITERATURE: Inside this brief fact sheet you'll learn about solution that lets you safely connect to a variety of leading cloud providers through an advanced network services.
Posted: 16 Jun 2015 | Published: 31 Dec 2014

Verizon

Security Solutions Designed to Keep Your Business Up and Running
sponsored by Verizon
PRODUCT OVERVIEW: Inside this fact sheet you will find a short description about a way to keep your networks working quickly, while remaining secure.
Posted: 16 Jun 2015 | Published: 16 Jun 2015

Verizon

Moving Toward Endpoint Antivirus Alternatives And Three Ways to Prioritize Endpoint Security
sponsored by Malwarebytes Corporation
EGUIDE: Access this exclusive e-guide to discover three tips that will help you prioritize the weakest point in network security – the endpoint – over perimeter defenses. Also, learn how to move toward endpoint antivirus alternatives after antimalware.
Posted: 16 Jun 2015 | Published: 16 Jun 2015


In the Cloud Life Sciences Teams Can Confidently Collaborate
sponsored by Verizon
CASE STUDY: This use case shows how secure cloud can be used to safely and quickly access all of your important enterprise information.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Verizon

Advanced Persistent Threat Detection and How to Prevent Drive-By Download Attacks
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide explains what you can do to detect and stop even the most advanced threats.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


Eight Questions You Must Ask When Considering an SD-WAN
sponsored by Talari Networks
WHITE PAPER: Access this white paper to learn the 6 key benefits of a software-defined WAN that make it exactly what you need for modern business networking, as well as 8 questions to ask before when considering the change.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Talari Networks

Enterprise Mobility Management Without Investing in a New Solution
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how you can activate the EMM capabilities of your existing virtual private network (VPN) so that you can successfully manage mobile devices without migrating to a new system.
Posted: 11 Jun 2015 | Published: 29 May 2015

Pulse Secure

Manage Remote, Mobile and Campus Access to the Data Center and Cloud from a Single Console
sponsored by Pulse Secure
WHITE PAPER: Access this white paper and discover how you can centrally manage remote, mobile and campus access policies, report on appliance health and endpoint compliance and update appliances by group.
Posted: 11 Jun 2015 | Published: 30 Apr 2015

Pulse Secure
26 - 50 of 1283 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement