IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
276 - 300 of 1579 Matches Previous Page  |  Next Page
3 Areas Where Healthcare Providers Need Your MSP Expertise
sponsored by Solarwinds N-able
EBOOK: The healthcare market represents a huge opportunity for managed services providers (MSPs), and analysts predict this trend will continue to expand for years to come. Access this eBook to learn about healthcare information technology needs and how to meet them.
Posted: 19 Apr 2016 | Published: 06 Apr 2016

Solarwinds N-able

Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: This white paper takes a deeper look at recent attacks on the government, Aramaco, Sony and others and breaks down what type of malware it was and how it works, measures you can take to mitigate the risk of an attack and considerations for protecting your data on file shares, endpoints and collaborative systems.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Turn iOS, Android or BlackBerry Devices into Security Tokens
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will learn about two-factor user authentication by leveraging passwords and users' devices. Access now and learn how to reduce associated operational costs and increase productivity with a modern authentication system.
Posted: 18 Apr 2016 | Published: 02 Mar 2016

BlackBerry

Next-Generation Security Platform for Manufacturing
sponsored by Palo Alto Networks
WHITE PAPER: Vulnerabilities to cyberattacks have made the challenge of ensuring strong security in industries like manufacturing a formidable one. Discover ways a platform approach to security can protect networks, improve your ability to meet regulation, and more.
Posted: 13 Apr 2016 | Published: 31 Dec 2014

Palo Alto Networks

Case Study: Industry’s Largest NFV Deployment
sponsored by Big Switch Networks
CASE STUDY: NFV deployments represent some of the most demanding workloads in OpenStack clouds, yet the economic and operational promise of NFV makes this a high-value technical challenge worldwide. Access this case study to see how three major companies came together for the industry's largest NFV deployment.
Posted: 13 Apr 2016 | Published: 30 Mar 2016

Big Switch Networks

A Path Towards Secure Banking IT
sponsored by Palo Alto Networks
WHITE PAPER: This paper discusses a security blueprint particularly focused on enabling financial institutions to detect and prevent threats to their networks. This new detection capacity does not need to add complexity and overhead, indeed, it can improve network capability.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

Palo Alto Networks

Deploying Apps Within a Hybrid Infrastructure
sponsored by F5 Networks
WHITE PAPER: This white paper demonstrates how to optimize your network and app performance with a comprehensive suite of services. Learn now about ways to eradicate the need for your teams to search and find the components they require.
Posted: 11 Apr 2016 | Published: 11 Apr 2016

F5 Networks

Time to reboot your SIEM? Probably.
sponsored by TechTarget
RESOURCE: Learn about the latest advances in SIEM and how to best use existing technology from our experts. Reading this guide will help you spruce up your security and make your SIEM more effective than ever.
Posted: 11 Apr 2016 | Published: 19 Mar 2014

TechTarget

Addressing PCI Compliance Through Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: With much of today's successfully executed breaches involving privileged users or credentials, mitigating risk has never been more pressing. Learn how meeting the requirements of Payment Card Industry Data Security Standard version 3 can lead to victory over privileged access violators.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Guide to Flexible Working
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.
Posted: 07 Apr 2016 | Published: 07 Apr 2016

ComputerWeekly.com

Innovative Cloud-Based SIEM Deployment Delivers Actionable Security Intelligence
sponsored by Splunk
CASE STUDY: This case study explores how Equinix, a global cloud interconnection provider, overcame security blind spots and the burden of manually extracting and correlating data by turning to cloud-based SIEM.
Posted: 06 Apr 2016 | Published: 24 Feb 2016

Splunk

Meaningful Measurement
sponsored by LogicNow
WHITE PAPER: This white paper teaches you how to measure the true impact of cybercrime and mitigate it moving forward. Access now to better understand methods used to commit cyber attacks and what they are costing your organization and organizations around the world.
Posted: 06 Apr 2016 | Published: 01 Mar 2016

LogicNow

Pervasive Security Enabled by Next Generation Monitoring Fabric
sponsored by Big Switch Networks
WHITE PAPER: As organizations become more reliant on their networks for critical functions, hackers are honing their focus on networks to increase the effectiveness of their attacks. Access this white paper to learn how to best protect your network.
Posted: 05 Apr 2016 | Published: 29 Dec 2015

Big Switch Networks

Big Monitoring Fabric 5.5
sponsored by Big Switch Networks
DATA SHEET: Network security and traffic monitoring are highly important to business. Review this data sheet to see the benefits this product can provide for your business's network.
Posted: 05 Apr 2016 | Published: 27 Jan 2016

Big Switch Networks

How to Raise your Organization's Security Maturity Level
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

LogRhythm, Inc.

The Human Factor Report
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.
Posted: 29 Mar 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

Q4 Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: This report outlines next-generation security approaches to better fortify mobile enterprise deployments against malicious attacks. Access now to learn about the current mobile threat landscape and learn how you can better protect against new, evolving mobile malware.
Posted: 28 Mar 2016 | Published: 31 Dec 2015

MobileIron

Rapidly Detect and Respond to the Advanced and Evasive Threat
sponsored by Dell SecureWorks
WHITE PAPER: This white paper explores the benefits of combining advanced network and endpoint detection technology with the right people, processes and intelligence for greater visibility of threats.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Understand How to Implement DLP that fits your Organization
sponsored by Digital Guardian
EGUIDE: This e-guide shows you different levels of DLP tools that you'll need depending on the size of your organization. Continue reading and make an assessment based on the four DLP categories: Knowing where your data is, understanding where it goes, knowing how it's used and educating employees and blocking unwanted activities.
Posted: 24 Mar 2016 | Published: 22 Mar 2016

Digital Guardian

Video: Advanced Endpoint Protection & Forensics
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video invites you to uncover key strategies for continuously preventing even the most sophisticated attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.
Posted: 24 Mar 2016 | Premiered: 08 Feb 2016

Check Point Software Technologies Ltd.

Meeting PCI DSS v3.1 Merchant Requirements with Watchguard UTM and Wireless Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper clearly outlines how firewall deployment impacts PCI DSS standards for a PCI DSS merchant. Access now for tables that include descriptions of PCI DSS standards and how you can achieve these requirements.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

WatchGuard Technologies, Inc.

We’ve Been Breached- Now What?
sponsored by eSentire
WHITE PAPER: This white paper teaches you how to respond after a cyber threat becomes a cyber attack. Access now to learn how to eradicate cyber threats, repair infected systems and restore operations to normal after an attack occurs.
Posted: 14 Apr 2016 | Published: 31 Dec 2015

eSentire

Cyber Liability: Risks, Ramifications, and Mitigation
sponsored by eSentire
WHITE PAPER: Find out how you can better defend your organization against external attack and limit exposure by reducing your attack profile available to attackers by accessing this resource.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

eSentire

Growing Security Concerns Across Industries
sponsored by Dell, Inc.
EGUIDE: This e-guide illustrates the survey results of more than 1,300 business and IT decision makers across seven countries. They found that, while the C-suite is more invested in data security than in the past, executives are still not allocating the energy and resources to properly address data security.
Posted: 12 Apr 2016 | Published: 07 Apr 2016

Dell, Inc.

Advanced Zero Day Protection with APT Blocker
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper shows you four key characteristics your detection software must have to adequately secure your organization. Access now to go beyond simple signatuer-based antivirus detection and gain a cloud-based sandbox with full system emulation to detect the most advanced threats.
Posted: 12 Apr 2016 | Published: 01 Feb 2016

WatchGuard Technologies, Inc.
276 - 300 of 1579 Matches Previous Page    10 11 12 13 14 15    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement