IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network SecurityReports
26 - 50 of 1161 Matches Previous Page  | Next Page
TMG Replacement Guide
sponsored by Sophos, Inc.
WHITE PAPER: This TMG replacement guide covers a few key areas of Microsoft's TMG, and addresses a unified threat management system that can replace TMG and improve your network protection. Discover more about this system's interface that simply works, and why you don't need to panic without Microsoft's TMG.
Posted: 11 Aug 2014 | Published: 31 Jul 2013

Sophos, Inc.

Case Study: FIS Global Partners with Asigra to Provide Clients Enhanced Secure Data Protection that Meets Compliance Mandates
sponsored by Asigra
WHITE PAPER: For financial services business, it's critical that client data remains accessible and securely stored. As business grows, you will need to upgrade your backup service portfolio with an advanced solution – but there are questions you should ask before choosing.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Asigra

Miercom Report: How to Enable Firewall Security without Hurting Performance
sponsored by Sophos, Inc.
WHITE PAPER: This Miercom report focuses on tests that measure firewall performance in the most common day-to-day scenarios. Read on to learn how 5 different appliances match up regarding firewall throughput, application control throughput, and more.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

Sophos, Inc.

Use Case: Secure Internet Access for 71,000 Australian Students
sponsored by Websense, Inc.
WHITE PAPER: This white paper describes a use case involving an Australian educational in need of a centralized, scalable solution in order to distribute materials to 45,000 users per day in safe, easily accessible manner.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Websense, Inc.

Secure Mobile Access
sponsored by Dell Software
WHITE PAPER: Discover how to enhance mobile productivity among employees by using converged technology that combines the best of management and security capabilities.
Posted: 06 Aug 2014 | Published: 01 Mar 2014

Dell Software

McAfee Next Generation Firewall
sponsored by McAfee, Inc.
WHITE PAPER: This resource provides an inside glance at McAfee's next generation firewall (NGFW) solution that stands apart from the crowd.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

McAfee, Inc.

The McAfee Next Generation Firewall Revolutionizes Network Security
sponsored by McAfee, Inc.
DATA SHEET: This white paper highlights a next-generation firewall (NGFW) solution that is up to speed with the latest technological advancements, and stands apart from your traditional firewall solutions.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

McAfee, Inc.

Simplified & Agile Networks: A Platform for Innovation
sponsored by HP
WHITE PAPER: Your network has always been a fundamental to business, but as cloud computing and mobility gain traction it becomes more important than ever to maintain and keep it flexible and agile.
Posted: 05 Aug 2014 | Published: 05 Aug 2014

HP

Application Delivery Optimization Tools: Evaluating Solutions and the Market
sponsored by F5 Networks
EGUIDE: This expert e-guide highlights 18 questions that will help you pinpoint the best fit tools for your application delivery optimization needs. Additionally, read on to learn how the application delivery controller (ADC) market is changing as enterprises adopt cloud services.
Posted: 05 Aug 2014 | Published: 05 Aug 2014

F5 Networks

Advanced Attacks Demand New Defenses
sponsored by McAfee, Inc.
WHITE PAPER: Find out how your business should fight back against cyber-criminals utilizing APTs.
Posted: 04 Aug 2014 | Published: 28 Feb 2014

McAfee, Inc.

Next-Gen Firewall for Network Security
sponsored by McAfee, Inc.
CASE STUDY: Find out about the next generation firewall for network security that helps Fusion Media Networks better protect their customers data.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

McAfee, Inc.

Evaluación comparativa de eficacia y rendimiento: Sistema de prevención de intrusiones para seguridad de redes GX7800 de IBM
sponsored by IBM
PRODUCT REVIEW: Lea este reportaje para aprender los resultados de las pruebas de eficacia y rendimiento de IBM Security Network Intrusion Prevention System GX7800, además de las características y funcionalidad.
Posted: 02 Aug 2014 | Published: 02 Aug 2014

IBM

Next Generation Firewall Solutions Aid Research-oriented Institutions
sponsored by McAfee, Inc.
CASE STUDY: Access this case study to learn about a university that used a next generation firewall solution for complete network security.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

McAfee, Inc.

The ABCs of Mobile Device Management
sponsored by IBM
WHITE PAPER: Securely managing mobile devices, apps and docs can be difficult without the right tools. However, with so many options employees have when a BYOD campaign is set in place, differences in operating systems and hardware create even more trouble.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

IBM

Protect Against Advanced Evasion Techniques
sponsored by McAfee, Inc.
WHITE PAPER: This white paper explores a next generation firewall (NGFW) solution that takes on the challenges of network security.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

McAfee, Inc.

Why the World's Leading Businesses Trust BlackBerry
sponsored by BlackBerry
WHITE PAPER: Enterprise Mobility Management (EMM) is no easy task. However, with the right tools and a trusted partner any problem can be solved.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

BlackBerry

Network Evolution – July/August 2014
sponsored by SearchNetworking.com
EZINE: Learn how context-aware security makes network security policy smarter -- but only with a solid foundation. We also cover hybrid SDN and programming for network engineers.
Posted: 31 Jul 2014 | Published: 01 Aug 2014

SearchNetworking.com

Mitigating Security & Compliance Risks with EMM
sponsored by BlackBerry
WHITE PAPER: Due to potential threats to enterprise security that come along with workforce mobility, companies are discovering pitfalls from legal, competitive, and productivity standpoints.
Posted: 31 Jul 2014 | Published: 31 May 2014

BlackBerry

The Top 20 Critical Security Controls for Effective Cyber Defense
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper outlines how LogRhythm's Security Intelligence Platform maps directly to each of the 20 Critical Security Controls, developed by the SANS Institute to help prioritize the most effective methods and policies to safeguard assets, information, and infrastructure.
Posted: 31 Jul 2014 | Published: 31 Jan 2014

LogRhythm, Inc.

LogRhythm's Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm's Security Intelligence Platform, which combines enterprise-class SIEM, Log Management, File Integrity Monitoring, and Machine Analytics with Host and Network Forensics to provide profound visibility into threats and risks to which organizations are otherwise blind.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Identity Analytics: Exposing the "Who" in Anonymous Log and Machine Data
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper discusses LogRhythm's Identity Inference Engine™, which combines already-collected machine data with advanced analytics to automatically identify who is responsible for activities in your IT environment, a critical component of maintaining a secure network.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

LogRhythm Labs Embedded Expertise
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm Labs, an organization within LogRhythm that performs dedicated research to continually enhance the Security Intelligence Platform with embedded machine data intelligence, real-time threat detection, and automated compliance assurance.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Get the most from the move to a next-generation firewall
sponsored by McAfee, Inc.
WHITE PAPER: This white paper will help network and cybersecurity teams understand the things they can and should demand from next-generation firewalls.
Posted: 30 Jul 2014 | Published: 31 Dec 2013

McAfee, Inc.

Advanced Evasion Techniques For Dummies
sponsored by McAfee, Inc.
EBOOK: In this in-depth eBook, you'll learn about the different kinds of cybercrime organizations are up against today, and the best strategies to protect yourself from these advanced evasions and attacks.
Posted: 30 Jul 2014 | Published: 31 Dec 2013

McAfee, Inc.

From BlackBerry to BYOD
sponsored by Citrix
WHITE PAPER: This white paper discusses mobile device management tools and other solutions for enterprises in the era of BYOD and mobile device diversity.
Posted: 30 Jul 2014 | Published: 31 Dec 2013

Citrix
26 - 50 of 1161 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement