IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network SecurityReports
51 - 75 of 1195 Matches Previous Page  | Next Page
Securely Enabling Remote Workers at Lower Cost Than Traditional Approaches
sponsored by Imation Corp.
WHITE PAPER: Remote work is a growing trend, which is no surprise because of the great benefits it has.  However, what about the additional security risks that come along with it?
Posted: 15 Sep 2014 | Published: 15 Sep 2014

Imation Corp.

Presentation Transcript: Opportunities with VMware and VMware Horizon 6
sponsored by Avnet Technology Solutions
PRESENTATION TRANSCRIPT: This audio cast transcript talks about how VMware can lower overall costs while maintaining clouds for both public and private networks.
Posted: 15 Sep 2014 | Published: 15 Sep 2014

Avnet Technology Solutions

Improve Your Security in 30 Days with HP TippingPoint
sponsored by Hewlett-Packard Company
WHITE PAPER: This (slightly tongue-in-cheek) white paper shows how you can use HP TippingPoint to materially improve your security posture in 30 days.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Hewlett-Packard Company

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide offers unique insight and analysis into how network security professionals can better identify, manage, and contain the leading network security risk factors that arise from a mobile, always-on workforce.
Posted: 11 Sep 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

WAF or IPS - Why you need more than a Firewall and IPS to protect your applications
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains the importance of using more than just a firewall and IPS to protect your applications from malicious attacks.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Fortinet, Inc.

Security Concerns in the C-Suite and How Next-Generation Firewalls Can Help
sponsored by Fortinet, Inc.
WHITE PAPER: This resource highlights the danger behind APTs, leading to the need for heightened network security with the help of next-generation firewalls.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Fortinet, Inc.

Next generation firewall product analysis
sponsored by Fortinet, Inc.
WHITE PAPER: This resource contains a product analysis of a next generation firewall (NGFW) that discusses security, performance, TCO and several other categories that are not available anywhere else.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Fortinet, Inc.

Networking Evolution: Building the Infrastructure to Enable the Changing Face of IT
sponsored by Citrix
WHITE PAPER: This expert resource explores the top trends and challenges facing networks today. Topics include hybrid software-defined networking, context-aware security, unified communications, and more.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Citrix

Build the Infrastructure to Enable the Changing Face of IT
sponsored by Citrix
WHITE PAPER: Check out this expert resource to learn about the top trends and challenges facing your network today. Topics include hybrid software-defined networking, context-aware security, unified communications, and more.
Posted: 10 Sep 2014 | Published: 29 Aug 2014

Citrix

The HP IT Insights Series—Volume 9 - Get the facts about SDN: Debunk six myths standing in the way of network
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative paper will help you debunk 6 myths about software-defined networking (SDN) that stand in the way of network innovation.
Posted: 10 Sep 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

SDN Innovations in Campus
sponsored by Hewlett-Packard Company
WEBCAST: In this webcast, we will cover how SDN is impacting the campus environment and feature a location-aware SDN application providing WiFi Indoor positioning that enables context-aware location advertising for businesses and highlight how HP can unlock the business value of your network.
Posted: 10 Sep 2014 | Premiered: Sep 10, 2014

Hewlett-Packard Company

HP SDN in the Campus LAN
sponsored by Hewlett-Packard Company
WEBCAST: The network is transforming to adapt to trends such as cloud, big data, security & mobility. In this session, we will cover the technology components of the HP Network Protector and the HP Network Optimizer for Microsoft Lync.
Posted: 10 Sep 2014 | Premiered: Sep 10, 2014

Hewlett-Packard Company

Moving Beyond the Firewall for Complete Data Protection
sponsored by Fortinet, Inc.
WHITE PAPER: Check out this white paper to discover several new security threats and what solutions are available to mitigate those risks going forward.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

Fortinet, Inc.

Proven Practices for Securing Your Website Against DDoS Attacks
sponsored by Dyn
PRESENTATION TRANSCRIPT: This expert resource discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Dyn

Proven Practices for Securing Your Website Against DDoS Attacks
sponsored by Dyn
PODCAST: This expert podcast discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.
Posted: 05 Sep 2014 | Premiered: Aug 25, 2014

Dyn

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: Learn how identity and access management solutions from IBM Security can help organizations protect critical assets.
Posted: 04 Sep 2014 | Published: 01 Apr 2014

IBM

Mitigating Security Risks at the Network's Edge: Best Practices for Distributed Enterprises
sponsored by CradlePoint
WHITE PAPER: Access this white paper to discover the keys to preventing data breaches in distributed enterprises.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

CradlePoint

How Cisco Helped Pinellas County, FL to Integrate Wired and Wireless Networks
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper describes how Cisco helped Pinellas County, Florida to deliver unified wired and wireless services with bring-your-own-device convenience to all 111 buildings in 53 locations throughout the county.
Posted: 04 Sep 2014 | Published: 31 Jan 2014

Cisco Systems, Inc.

Deliver Simple and Secure Access to Behind-the-Firewall Business Resources
sponsored by IBM
WHITE PAPER: Learn the ins-and-outs of a solution capable of delivering simple and secure access to behind-the-firewall business resources such as Windows File Share content and intranet sites without requiring changes to your network, firewall security configuration or device VPN.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

IBM

Cloud Web Security Alleviates Network Congestion
sponsored by Cisco
CASE STUDY: This case study reveals how building supplies distributor MacArthur Corporation, secured internet use in the cloud in order to relieve network congestion, without adding any bandwidth.
Posted: 03 Sep 2014 | Published: 31 Dec 2012

Cisco

IBM Mobile First
sponsored by IBM
WHITE PAPER: Learn how to develop, test, run and manage hybrid and native multiplatform, mobile apps in a security-rich environment.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

IBM

Leveraging Network Infrastructure for Competitive Success in Midsize Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper now to learn how mid-market firms can leverage network infrastructure for success in the era of mobility and the cloud.
Posted: 29 Aug 2014 | Published: 30 May 2014

Cisco Systems, Inc.

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Mobile Device Management Checklist
sponsored by MobileIron
EGUIDE: A well thought-out mobile device management strategy is a key ingredient for any successful mobility deployment.  This expert E-Guide highlights a mobile device management checklist.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

MobileIron

Proven Practices for Securing Your Website Against DDoS Attacks
sponsored by Dyn
WEBCAST: This expert webcast discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.
Posted: 26 Aug 2014 | Premiered: Aug 25, 2014

Dyn
51 - 75 of 1195 Matches Previous Page    1 2 3 4 5 6    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement