IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
276 - 300 of 1541 Matches Previous Page  |  Next Page
Top 5 requirements for secure enterprise file sync and sharing
sponsored by Citrix
WHITE PAPER: The mobile data access challenge poses both risk and opportunities for IT. The use of personal file sharing makes it hard to maintain security of sensitive information. Discover how IT can help employees work and collaborate more effectively from anywhere while supporting the evolution of business mobility enterprise-wide.
Posted: 10 May 2016 | Published: 29 Apr 2016

Citrix

The Case for Intelligent Endpoint Security
sponsored by Intel Security
WHITE PAPER: EDR can mitigate threats before they impact your organization. Discover 5 key factors to look for when researching EDR to best determine which solutions are most proactive in helping to prevent attacks.
Posted: 10 May 2016 | Published: 31 Dec 2015

Intel Security

Schuberg Philis accelerates application deployment using network virtualization
sponsored by VMware
CASE STUDY: This case study presents an IT outsourcing company that sought to deploy new environments centrally using software APIs in order to guarantee its clients 100% functional uptime for their mission-critical applications. Access now to see how they were able to use network virtualization to make major strides toward this goal.
Posted: 10 May 2016 | Published: 31 Dec 2014

VMware

Operationalizing Threat Intelligence: Interrupt the Cyberattack Chain
sponsored by Intel Security
PRODUCT OVERVIEW: Learn how to leverage a collaborative platform for operationalizing threat intelligence—including real-time sharing of threat information across the IT infrastructure and delivery of adaptive protection. Discover how to interrupt the cyberattack chain and arming your enterprise with the latest cyberthreat intelligence insights.
Posted: 09 May 2016 | Published: 31 Dec 2015

Intel Security

How to Detect Advanced Threats on Endpoints
sponsored by Intel Security
PRODUCT OVERVIEW: Endpoint detection and response should be an indispensable supplement to your current defenses. Explore ways to evolve from a reactive mentality to a proactive one of continuous monitoring, and block advanced targeted attacks before it's too late.
Posted: 09 May 2016 | Published: 31 Dec 2015

Intel Security

Automation: Transforming the Enterprise Campus Network for SaaS, IaaS, Bandwidth, and Security
sponsored by Juniper Networks, Inc.
RESOURCE: Nearly all enterprises are using some form of SaaS, and bandwidth is on the rise. Discover how the growth of hybrid networking has made management and security more and more important.
Posted: 09 May 2016 | Published: 27 Apr 2016

Juniper Networks, Inc.

Considerations for Secure Enterprise File Sharing
sponsored by Citrix
VIDEO: File sharing becomes an issue when there is no one predetermined way to share within an enterprise, especially when taking cloud and mobile computing into consideration. Watch this brief video to learn about how to spot and close security gaps.
Posted: 06 May 2016 | Premiered: 20 Aug 2013

Citrix

Micro-Segmentation Builds Security Into Your Data Center's DNA
sponsored by VMware
WHITE PAPER: Micro-segmentation is an adaptive technology that narrows your data center security's focus to overcome threats faster than ever. Access this white paper to learn more about the security and protection micro-segmentation will provide your data center.
Posted: 06 May 2016 | Published: 27 Apr 2016

VMware

Top Strategies to Automate Across Your Enterprise Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover the top methods for increasing network efficiency through automation. You'll see how you can begin reducing operational costs and growing the role of automation in the network.
Posted: 06 May 2016 | Published: 29 Apr 2016

Juniper Networks, Inc.

Extend Security and Control from the Data Center Edge to the Core
sponsored by VMware
EBOOK: The average total cost of a data breach for companies increased 23% on a year-over-year basis to a whopping $3.79 million in 2015. Micro-segmentation through network virtualization allows your security team to focus on the problem areas and minimize resource usage. Access this e-book to learn more about this strategy to better secure your data.
Posted: 05 May 2016 | Published: 29 Apr 2016

VMware

Enterprise Campus Architectures—Transformed
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover in this resource the benefits of collapsing your entire enterprise network into a single platform—including guarantees of increased agility and improved user satisfaction. Read now to deploy cloud network architecture that accommodates your unending need for more bandwidth.
Posted: 05 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Top 3 Ways to Modernize Your Enterprise Campus Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: When your organization moves to cloud-driven business models, you must decide upon the right technologies and partners to facilitate a successful transition. Read this white paper that examines the most important considerations when deciding upon a vendor to help you modernize and secure your enterprise campus and branch network infrastructure.
Posted: 04 May 2016 | Published: 04 May 2016

Juniper Networks, Inc.

Security From the Inside Out
sponsored by Fortinet, Inc.
EBOOK: This e-book discusses the failings of traditional perimeter-based security measures, and shows how specialized internal segmentation firewalls can help your network respond to modern threats.
Posted: 03 May 2016 | Published: 03 May 2016

Fortinet, Inc.

Case Study: Build Productivity and Security with Paperless Collaboration
sponsored by Citrix
MICROSITE: Mobility is becoming the business norm and requirement from employees. This resource highlights a solution that allows employees to collaborate, share files and data remotely without hindering security or taking visibility and control from IT.
Posted: 03 May 2016 | Published: 31 Dec 2013

Citrix

Is Your Network Too Flat? Prevent Data Breaches with Segmentation
sponsored by SearchSecurity.com
EZINE: How do you determine if your network is too flat? Without proper network segmentation attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure.
Posted: 02 May 2016 | Published: 02 May 2016

SearchSecurity.com

Data Centers at the Edge
sponsored by Schneider Electric
WEBCAST: In this webcast, you will discover the benefits and boons of localized data centers on the network edge—paving the way for new capabilities deployed into the network. Tune in now to power the digitization of your business, and learn the different data center localization offers now available.
Posted: 02 May 2016 | Premiered: May 2, 2016

Schneider Electric

Maximize Network Security and Simplify Operations with Automated Access Policies
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover in this paper how to leverage a next-generation cloud infrastructure that builds on advances in virtualization and automation to deliver greater agility, cost savings and enhanced security to your enterprise network.
Posted: 29 Apr 2016 | Published: 29 Apr 2016

Juniper Networks, Inc.

Case Study: Global Security Management Made Easier for Leading IT Service Provider
sponsored by Intel Security
CASE STUDY: Discover how to unify endpoint management with a centralized security platform thanks to this case study. Read on to learn how a leading IT service provider tamed their endpoint chaos, and see how you can boost the efficiency of your security operations with a unified security platform that eliminates centralized management pain points.
Posted: 10 May 2016 | Published: 10 May 2016

Intel Security

Nemertes Research: Re-Architecting the Enterprise Network For WLAN, Cloud, Mobility, Bandwidth, and Cybercrimes
sponsored by Juniper Networks, Inc.
WHITE PAPER: IT professionals continue to embrace new technologies but are they thinking about the infrastructure across which they're to delivering these technologies? Learn how to re-architect the enterprise network and security infrastructure, in light of the momentum towards cloud, mobility, bandwidth-hungry apps, and advanced security threats.
Posted: 09 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

IDC Research: 7 Trends Impacting Enterprise Campus Networks
sponsored by Juniper Networks, Inc.
WHITE PAPER: Reliance upon cloud applications for mission-critical business functions has heightened network requirements at the edge. Discover in this exclusive white paper 7 prevalent issues in today's enterprise campus networks, and how to leverage a cloud-enabled network to seamlessly glue your network edge to the cloud and optimize your cloud applications.
Posted: 06 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Discovering Security Analytics Use Cases
sponsored by Prelert
RESOURCE: In this resource, discover how to tailor your security analytics to detect certain behaviors associated with threats advancing on your organization. Select each threat indicator to examine its particular attack progression stages for data exfiltration activity, compromised endpoints, and more.
Posted: 05 May 2016 | Published: 05 May 2016

Prelert

Network Strategies that Will Help You Eliminate, Embrace, or Coexist with Shadow IT
sponsored by Juniper Networks, Inc.
WHITE PAPER: Shadow IT is here. Access this e-guide for the current trends driving the rise of shadow IT, explore the drawbacks and benefits it offers, and learn how designing and building the right network is essential for your preferred shadow IT strategy.
Posted: 05 May 2016 | Published: 05 May 2016

Juniper Networks, Inc.

What to Look for in Secure Sockets Layer
sponsored by SearchSecurity.com
EBOOK: This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
Posted: 04 May 2016 | Published: 04 May 2016

SearchSecurity.com

Top 3 Reasons Your Enterprise Network Matters More in the Cloud Era
sponsored by Juniper Networks, Inc.
WHITE PAPER: Traditional networks simply can't handle all the implications of the cloud. Explore the top 3 IT trends that will impact your cloud networking strategy, and learn how to build a network that's 100% cloud-ready.
Posted: 04 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

For Enterprise IT: Extend Your VPN to Bring Better Security, Performance, Reliability to the Cloud
sponsored by AT&T
WHITE PAPER: As more applications get delivered through cloud models, IT must ensure maximum performance and availability. Why should you look to extend the capabilities of a VPN that is already in place? Learn the benefits of VPN-based connectivity for the cloud inside.
Posted: 29 Apr 2016 | Published: 20 Apr 2016

AT&T
276 - 300 of 1541 Matches Previous Page    10 11 12 13 14 15    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement