IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network Security Reports
51 - 75 of 1262 Matches Previous Page  |  Next Page
Network Vulnerabilities Defended: Fighting Today’s Advanced Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper reveals the three phase strategy to defending your network against determined cybercriminals.  Read on to take a look into hackers' minds and learn how to improve data protection.
Posted: 04 May 2015 | Published: 22 Apr 2015

Fortinet, Inc.

The Printer Playbook: Strategy and Insight for the Enterprise
sponsored by Hewlett-Packard Company
WHITE PAPER: This Printer Playbook explains why printer security should be part of your overall information technology strategy. It offers suggestions and resources to help businesses begin securing their networks.
Posted: 04 May 2015 | Published: 04 May 2015

Hewlett-Packard Company

The Importance of Embedded Device Security
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this Red Tiger Security Paper, Printer and Embedded Device Security, and see where and how bad guys exploit print devices—and the measures you can take to stop them.
Posted: 04 May 2015 | Published: 07 Apr 2015

Hewlett-Packard Company

Self-Assessment: Discover if Your Printers are Insecure
sponsored by Hewlett-Packard Company
ASSESSMENT TOOL: Focus your print security strategy with the HP Secure Print Analysis tool. This quick assessment of your current print security infrastructure will tell you where to strengthen print security, using best practices in mobile print security, printer hard drive encryption, fleet management, and more.
Posted: 04 May 2015 | Published: 04 May 2015

Hewlett-Packard Company

Web App Security Top 10 Risk Mitigation Techniques
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper lays out the top 10 challenges of and threats to web app security. View now to learn the corresponding 10 risk mitigation techniques to protect web apps.
Posted: 01 May 2015 | Published: 05 Mar 2014

Fortinet, Inc.

Simplify, Unify Access with a Converged Campus Network
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores how converging wired and wireless access layers can help you gain the ability to meet the exploding demand for connectivity in a way that is not only sustainable, secure, and manageable, but can also deliver a better user experience.
Posted: 01 May 2015 | Published: 01 May 2015

Hewlett-Packard Company

uilding Layered Security to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER: In this white paper, discover how you can implement layered security for protection that is significantly stronger than what the average enterprise achieves.
Posted: 01 May 2015 | Published: 30 Nov 2014

Absolute Software

Information Security Magazine – May 2015 Issue
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we study perimeter network security in the mobile and cloud era, and strategies to secure access from application-layer protection to single sign-on technologies.
Posted: 01 May 2015 | Published: 30 Apr 2015

SearchSecurity.com

Viruses in the Queue: IT Pros Share Their Experiences Combating Printer Security Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, hear firsthand experience from three different IT pros who found out the hard way about document and network security—it only takes one unprotected printer to create major, long-lasting headaches.
Posted: 01 May 2015 | Published: 01 May 2015

Hewlett-Packard Company

Securing the Data Center - Advanced Threats Require Advanced Security
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper uncovers why traditional network architectures are failing to keep hackers out and offers seven best practices for securing your data center. View now to learn how to secure your network where it matters most.
Posted: 30 Apr 2015 | Published: 08 Apr 2015

Fortinet, Inc.

Track and Analyze the Impact of Mobile Apps, Platforms and Device Preferences
sponsored by Good Technology
WHITE PAPER: Access this white paper now to discover all of the latest mobile trends and learn why security is quickly becoming the greatest concern for decision makers.
Posted: 30 Apr 2015 | Published: 27 Feb 2015

Good Technology

Virtualized Network Services: SDN for Enterprise
sponsored by Alcatel-Lucent
WHITE PAPER: In this white paper, you'll learn how software-defined networking (SDN) helps you seamlessly link locations and unlock the true power of the cloud.
Posted: 30 Apr 2015 | Published: 28 Nov 2014

Alcatel-Lucent

Intralinks® Information Rights Management
sponsored by IntraLinks, Inc
DATA SHEET: Access this data sheet to learn about an Information Rights Management tool that can secure your content.
Posted: 30 Apr 2015 | Published: 31 Dec 2014

IntraLinks, Inc

Video: Converged Campus: Experience The Benefits Of A Unified Network
sponsored by Hewlett-Packard Company
VIDEO: This video explains how you can unify your business' wired and wireless networks and avoid the bottlenecks created by the adoption of 802.11ac devices.
Posted: 29 Apr 2015 | Premiered: 21 Jan 2015

Hewlett-Packard Company

Mobile Device Management Policy Best Practices
sponsored by IBM
WHITE PAPER: In this white paper, you'll discover the 10 best practices for developing a successful mobile device management plan.
Posted: 29 Apr 2015 | Published: 26 Dec 2014

IBM

Does Android Dream of Enterprise Adoption?
sponsored by IBM
WHITE PAPER: This white paper explains how you can protect yourself from common Android security holes with the proper MDM platform so that you can take advantage of the employee productivity benefits. If you're nervous about user management, data consumption, rooting and other issues, then this is the resource for you.
Posted: 29 Apr 2015 | Published: 26 Dec 2014

IBM

Mobile Device Management for Education
sponsored by IBM
WHITE PAPER: Access this white paper now and learn how mobility and BYOD strategies in all levels of education can make school districts and organizations more cost-effective with the right device and app management solution.
Posted: 29 Apr 2015 | Published: 26 Dec 2014

IBM

Securing the Mobile Enterprise Environment
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore best practices for addressing security issues for the mobile enterprise environment, including those for establishing secure mobile access and mobile device security. Discover solutions designed to help your organization maintain tight network and mobile device security while still enhancing employee productivity.
Posted: 29 Apr 2015 | Published: 30 Sep 2014

Dell, Inc. and Intel®

Podcast: Transform Your Customer‘s Infrastructure and Accelerate Your Profitability with HP Networking Converged Campus Offerings
sponsored by Hewlett-Packard Company
PODCAST: Access this Podcast now to discover the best ways to use software defined networking (SDN) to handle security threats and device management at a fraction of the cost and without any headache.
Posted: 28 Apr 2015 | Premiered: Apr 20, 2015

Hewlett-Packard Company

The Secure Mobile Enterprise
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Dell, Inc. and Intel®

Hyper-Connected Enterprise Infrastructure
sponsored by Hewlett-Packard Limited and Intel ®
WHITE PAPER: In this white paper, you'll learn about a mobile-first IT infrastructure approach that enables employees to use powerful apps on any device.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Hewlett-Packard Limited and Intel ®

Mobile Device Management for Everyone
sponsored by IBM
WHITE PAPER: Access this white paper now to learn how your company can implement a secure mobile strategy that won't cause headaches for your IT department to manage.
Posted: 27 Apr 2015 | Published: 26 Dec 2014

IBM

Transforming Your Customer‘s Infrastructure and Accelerating Your Profitability with Converged Networking
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this white paper now to discover the best ways to use software defined networking (SDN) to handle security threats and device management at a fraction of the cost and without any headache.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Hewlett-Packard Company

The Key to Smarter Enterprise Code Signing
sponsored by Symantec
WHITE PAPER: This white paper explores several alternative approaches to enterpise code signing to minimize mismanagement of keys. View now to learn more.
Posted: 24 Apr 2015 | Published: 04 Dec 2013

Symantec

Secure network traffic between hosts systems and remote PCs/web browsers
sponsored by OpenText
PRODUCT OVERVIEW: Access this informative resource to explore a comprehensive security solution that protects network traffic between host systems and remote PCs and web browsers by encrypting application traffic across networks. Learn how you can ensure zero disruption to users who remotely access data and applications from web browsers and desktop computers.
Posted: 24 Apr 2015 | Published: 31 Mar 2015

OpenText
51 - 75 of 1262 Matches Previous Page    1 2 3 4 5 6    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement