IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
51 - 75 of 1288 Matches Previous Page  |  Next Page
Five Things You Must Know About Microsoft BitLocker
sponsored by WinMagic
WHITE PAPER: This white paper presents a 5 step strategy to resolve all BitLocker security issues.
Posted: 25 Jun 2015 | Published: 17 Jun 2015

WinMagic

Verizon Enterprise Solutions Overview
sponsored by Verizon
VIDEO: Access this short video to see an introduction to a networking alternative that will let you expand your reach, increase your agility and maintain longevity.
Posted: 25 Jun 2015 | Premiered: 19 Sep 2013

Verizon

The Peripheral You're Not Managing, and The Risk It Poses
sponsored by Nuance
WEBCAST: This webcast discusses the hidden security risk multi-function printers and other devices pose and gives advice for mitigating that risk.
Posted: 25 Jun 2015 | Premiered: Jun 9, 2015

Nuance

Enabling Competitive Advantage in the Digital Experience
sponsored by Verizon
VIDEO: This short, lighthearted video serves as an introduction to a digital experience service that can help you grown and prevent disruptions.
Posted: 25 Jun 2015 | Premiered: 22 Jan 2015

Verizon

Special Report: Detailed Reviews of 7 IPS Platforms
sponsored by IBM
WHITE PAPER: This report presents detailed reviews of seven IPS platforms to help you decide which one meets your specific needs.
Posted: 24 Jun 2015 | Published: 29 Dec 2014

IBM

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

The 5 Questions Mobile Businesses Are Asking
sponsored by Lookout
WHITE PAPER: In this white paper, you'll discover the 5 key questions that are most concerning to the lack of visibility in a mobile business.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Lookout

Gain Control of Sensitive Documents
sponsored by Nuance
VIDEO: Take a look at this brief video to discover just how dangerous an insecure printer can be, and to learn what you can do to protect your sensitive documents.
Posted: 22 Jun 2015 | Premiered: 03 Apr 2015

Nuance

BYOD Challenges that Lurk Beyond Network Security
sponsored by Dell, Inc. and Intel®
EGUIDE: In this expert guide, discover five BYOD challenges that go beyond security.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

Dell, Inc. and Intel®

Software-Defined Security and the Agile Data Center
sponsored by CloudPassage
WEBCAST: On this webinar, you'll hear from Neil MacDonald, VP Distinguished Analyst from Gartner Research, and CloudPassage's Co-founder and Chief Strategy Officer, Carson Sweet. They'll share insights into the changes required for security and compliance in the new, more agile data center.
Posted: 22 Jun 2015 | Premiered: Jun 22, 2015

CloudPassage

How to Create the Secure Mobile Enterprise
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 18 Jun 2015 | Published: 27 Apr 2015

Dell, Inc.

BYOD: In a Maturing Market, Employee Satisfaction Is The Top Priority
sponsored by Intel
WHITE PAPER: Access this white paper to learn how IT leaders in conservative markets can develop a sophisticated approach to managing the risks associate with mobile device proliferation within the enterprise.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Intel

Make Your Move to The Cloud with Confidence
sponsored by Verizon
PRODUCT LITERATURE: Inside this brief fact sheet you'll learn about solution that lets you safely connect to a variety of leading cloud providers through an advanced network services.
Posted: 16 Jun 2015 | Published: 31 Dec 2014

Verizon

Security Solutions Designed to Keep Your Business Up and Running
sponsored by Verizon
PRODUCT OVERVIEW: Inside this fact sheet you will find a short description about a way to keep your networks working quickly, while remaining secure.
Posted: 16 Jun 2015 | Published: 16 Jun 2015

Verizon

In the Cloud Life Sciences Teams Can Confidently Collaborate
sponsored by Verizon
CASE STUDY: This use case shows how secure cloud can be used to safely and quickly access all of your important enterprise information.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Verizon

Eight Questions You Must Ask When Considering an SD-WAN
sponsored by Talari Networks
WHITE PAPER: Access this white paper to learn the 6 key benefits of a software-defined WAN that make it exactly what you need for modern business networking, as well as 8 questions to ask before when considering the change.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Talari Networks

World's first Cloud-enabled G20 Leaders' Summit
sponsored by Dimension Data
CASE STUDY: This case study explains how they deployed a fully consumptive solution for network, including WiFi, security, BYOD management, and a bespoke virtualized desktop to provide a seamless user experience.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

Dimension Data

The Answers to Your Mobile App Delivery Issues
sponsored by Citrix
WHITE PAPER: In this white paper, you'll learn why the right network infrastructure is essential to ensuring high quality app delivery across different devices securely, while preparing for future expansion.
Posted: 08 Jun 2015 | Published: 29 May 2015

Citrix

Putting the “Secure” in Secure Remote Access
sponsored by Citrix
WHITE PAPER: In this white paper, you'll learn about the core strengths of Citrix NetScaler paired with Unified Gateway for secure remote access consolidation.
Posted: 05 Jun 2015 | Published: 29 May 2015

Citrix

An E-Guide to Online Security
sponsored by Melbourne IT
WHITE PAPER: The following white paper examines several ways to develop and implement long-term security strategies to proactively defend against evolving security risks. Access now and learn what it takes to beef up your online security quick and efficiently.
Posted: 05 Jun 2015 | Published: 05 Jun 2015

Melbourne IT

Delivering Secure Remote Access for the Modern Enterprise
sponsored by Citrix
WHITE PAPER: This white paper takes a closer look at wireless network security challenges. Read on and discover how you can provide secure remote access for the modern, mobile enterprise.
Posted: 04 Jun 2015 | Published: 29 May 2015

Citrix

Enabling the Mobile Workforce in the Wake of Consumerization
sponsored by Calero Software
WHITE PAPER: In this white paper you'll learn how to gain a competitive advantage by outsourcing mobile support to providers that offer world class service desk capabilities and economies of scale for maximizing the value of mobility.
Posted: 04 Jun 2015 | Published: 26 Dec 2014

Calero Software

SaaS - Simplifying Network Security and Compliance
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper examines the benefits of migrating to a SaaS security model.
Posted: 02 Jun 2015 | Published: 13 May 2015

BAE Systems Applied Intelligence (formerly SilverSky)

Think You are Safe from DDoS Attacks?
sponsored by Neustar®
WHITE PAPER: This white paper examines the repercussions of relying solely on firewalls and IPS/IDS to attempt blocking DDoS attacks. View now to learn the steps to take to protect sensitive data stored in the cloud.
Posted: 02 Jun 2015 | Published: 06 May 2015

Neustar®

4 Ways To Strengthen Your DNS Security
sponsored by Neustar®
WHITE PAPER: This white paper presents the four steps to strengthening DNS security to block today's constant dynamic attacks.
Posted: 02 Jun 2015 | Published: 27 May 2015

Neustar®
51 - 75 of 1288 Matches Previous Page    1 2 3 4 5 6    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement