IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
276 - 300 of 1428 Matches Previous Page  |  Next Page
Secure your mobile devices, data and apps
sponsored by Verizon
WHITE PAPER: This white paper teaches you how to assess your existing security policies, giving you advice on potential weaknesses and best practices to strengthen your mobile security. Get better peace of mind with policies that keep data, devices and apps in line no matter where your workforce roams.
Posted: 07 Jun 2016 | Published: 01 May 2016

Verizon

Windows 10, EMM, and the Future of PC Security and Management
sponsored by MobileIron
WHITE PAPER: Enterprise mobility management (EMM) is one big key to unlocking mobility's full potential. We had previously required a variety of solutions to deal with every aspect of mobile management. Now there is an EMM solution that does it all. Read on to learn more about EMM and this simplifying solution.
Posted: 03 Jun 2016 | Published: 31 May 2016

MobileIron

Increase productivity in a mobile world
sponsored by HPE and Intel® Xeon
WEBCAST: Supporting mobility is the key ingredient to increase employee productivity. Discover the challenges in implementing an effective mobile strategy and the 4 key steps you can take to increase productivity.
Posted: 03 Jun 2016 | Premiered: Jun 3, 2016

HPE and Intel® Xeon

Five simple strategies to help enable a more productive mobile workforce
sponsored by HPE and Intel® Corporate
RESOURCE: How do you keep your mobile workforce productive? Explore best practices and five strategies to make sure that your workers are making the most of mobility.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

HPE and Intel® Corporate

Detect Compromised Credentials with Behavioral Analytics
sponsored by Exabeam
WHITE PAPER: User behavior intelligence and security session assembly can help enterprises root out attackers that impersonate employees. Discover how the right solution can help you give more complex tasks to junior security analysts while speeding up data analysis.
Posted: 20 May 2016 | Published: 31 Dec 2014

Exabeam

Six Steps to Buying Data Loss Prevention Products
sponsored by Intel Security
EGUIDE: Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

Mastering the Top Enterprise Mobility Challenges
sponsored by Microsoft
EGUIDE: Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Microsoft

Masergy Unified Enterprise Security Demo
sponsored by MASERGY
WEBCAST: Access this webcast to discover how machine learning combined with continuous human monitoring can harden your defenses and improve your advanced threat detection capabilities.
Posted: 09 Jun 2016 | Premiered: May 1, 2016

MASERGY

McKenna Long & Aldridge Chose Masergy's Managed Cloud Networking
sponsored by MASERGY
WEBCAST: With these Managed Cloud Networking solutions, the firm could open new offices quicker than ever before. Learn how you can leverage analysis tools to monitor network traffic and application usage patterns to gain predictive insights for strategic IT initiatives.
Posted: 09 Jun 2016 | Premiered: May 1, 2016

MASERGY

Understand the Business Impact and Cost of a Breach
sponsored by MASERGY
ANALYST REPORT: This Forrester Report will help security and risk leaders build a case for investment to show business leaders what kind of investment it'll take to adequately protect their organization.
Posted: 07 Jun 2016 | Published: 12 Jan 2015

MASERGY

Next Generation Cybersecurity: The Age of Artificial Intelligence
sponsored by MASERGY
WEBCAST: Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.
Posted: 06 Jun 2016 | Premiered: May 1, 2016

MASERGY

Masergy UES Offers Unique Approach to Network Defense
sponsored by MASERGY
ANALYST REPORT: Instead of applying a one-size-fits-all approach, multi-stage machine learning analysis detects events differently on different networks. Learn how this security strategy can find predictable patterns on your network and methods that work best for it.
Posted: 06 Jun 2016 | Published: 11 Nov 2015

MASERGY

Make Behavioral Analytics Part of Your Security Strategy
sponsored by MASERGY
RESOURCE: Discover how behavioral analysis work and learn how it can benefit your network security. Shift your focus from blocking and preventing breaches to detecting and rapidly responding to attacks.
Posted: 03 Jun 2016 | Published: 05 Aug 2015

MASERGY

Managed Security
sponsored by MASERGY
WEBCAST: The threat landscape is growing and network security is already a full-time job. Watch this 2 minute webcast to learn about a managed security service and how it bolsters your defenses, preparing you to handle whatever attacks come your way.
Posted: 02 Jun 2016 | Premiered: Jun 1, 2016

MASERGY

3 Reasons to Move to a Managed Security Service Provider
sponsored by MASERGY
MICROSITE: The cyberthreat landscape is growing with every technological advance. Learn how managed security service providers (MSSPs) can help bring the manpower to your constrained IT department by bringing new innovative services and approaches.
Posted: 27 May 2016 | Published: 17 Jun 2015

MASERGY

Five Reasons to Adopt an MSSP
sponsored by MASERGY
WHITE PAPER: Security breaches cost an average of $3.4 million per incident. This cost, coupled with the number of breaches that occurring in the past few years, is reason enough to seriously invest in managed security service providers (MSSPs). Discover the top five reasons why an MSSP is right for your business.
Posted: 27 May 2016 | Published: 11 May 2016

MASERGY

Facing Network Breach Threats, Visibility Is Key
sponsored by Intel
EGUIDE: If the past three years have taught network managers anything, it's that everyone is vulnerable to a network breach by cybercriminals. Andy McInerney, data network and voice manager at Penn Mutual, one of the oldest mutual life insurance companies in the US, reveals what his business is doing to stop it.
Posted: 26 May 2016 | Published: 17 May 2016

Intel

Obey these 10 BYOD golden rules
sponsored by IBM MaaS360
WHITE PAPER: Bring your own device (BYOD) is the facet of mobility that is leaving many organizations feeling vulnerable. Here are ten rules, each broken down, to keep you on the right track to taking full advantage of all that mobility has to offer.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Why Visibility Is More Important Than Stopping an Attack
sponsored by Intel
EGUIDE: Visibility into what is happening on your network may matter more than stopping an attack. Can technology keep up with advanced threats? Find out in this expert resource from searchSecurity.com.
Posted: 18 May 2016 | Published: 13 May 2016

Intel

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

TechTarget's Top 6 Security Measures for the Enterprise Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover a next-generation security model that moves away from traditional security tools. Learn how you can bring together all critical network security elements to provide an integrated security framework for your cloud-enabled enterprise.
Posted: 11 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

blinkbox Remediates Cloud App Security Challenges
sponsored by Barracuda Networks
VIDEO: In this video, you will learn about a VOD service called blinkbox and their struggles finding solid security for their cloud platform. See how they remediated their cloud application security issues and how they now operate without breach concerns.
Posted: 11 May 2016 | Premiered: 28 Oct 2014

Barracuda Networks

Five Critical Rules for Firewall Management: Lessons from the Field
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
Posted: 11 May 2016 | Published: 08 Jun 2011

Dell SecureWorks

Information Security Magazine: Insider Edition
sponsored by SearchSecurity.com
EZINE: Attaining truly 21st century security requires new thinking. Learn how to deal with a vanishing network perimeter and bring on board the best new security tools to protect your enterprise.
Posted: 10 May 2016 | Published: 10 May 2016

SearchSecurity.com
276 - 300 of 1428 Matches Previous Page    10 11 12 13 14 15    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement