IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network Security Reports
51 - 75 of 1272 Matches Previous Page  |  Next Page
Integrating MDM and NAC for Mobile Success
sponsored by Pulse Secure
WHITE PAPER: Read this white paper to discover how integrated VPN, access control, and mobile device management solutions deliver superior network security and BYOD productivity so that you can gain a competitive edge in the mobile business world.
Posted: 09 Jun 2015 | Published: 28 Aug 2015

Pulse Secure

Empowering Mobile Productivity
sponsored by Pulse Secure
WHITE PAPER: Access this white paper now to learn how you can enable authenticated, authorized mobile users with fast, seamless access to necessary network resources that is also completely secure.
Posted: 09 Jun 2015 | Published: 29 Aug 2014

Pulse Secure

Moving Beyond Your Mobile Blind Spot: An App Centric Approach to Enterprise Mobility
sponsored by Pulse Secure
WHITE PAPER: In this white paper, you'll learn how shifting the focus of a mobile strategy from device management to app-centric can improve user experience and workforce productivity while improving security.
Posted: 09 Jun 2015 | Published: 28 Mar 2014

Pulse Secure

Securely Leveraging Internet of Things Data
sponsored by Aruba Networks
WHITE PAPER: This white paper explores how to build a trust-based IoT web for business-critical applications using a new methodology. Continue reading to learn how to exploit IoT data without incurring unacceptable levels of risk.
Posted: 08 Jun 2015 | Published: 06 May 2015

Aruba Networks

The Answers to Your Mobile App Delivery Issues
sponsored by Citrix
WHITE PAPER: In this white paper, you'll learn why the right network infrastructure is essential to ensuring high quality app delivery across different devices securely, while preparing for future expansion.
Posted: 08 Jun 2015 | Published: 29 May 2015

Citrix

Putting the “Secure” in Secure Remote Access
sponsored by Citrix
WHITE PAPER: In this white paper, you'll learn about the core strengths of Citrix NetScaler paired with Unified Gateway for secure remote access consolidation.
Posted: 05 Jun 2015 | Published: 29 May 2015

Citrix

An E-Guide to Online Security
sponsored by Melbourne IT
WHITE PAPER: The following white paper examines several ways to develop and implement long-term security strategies to proactively defend against evolving security risks. Access now and learn what it takes to beef up your online security quick and efficiently.
Posted: 05 Jun 2015 | Published: 05 Jun 2015

Melbourne IT

Delivering Secure Remote Access for the Modern Enterprise
sponsored by Citrix
WHITE PAPER: This white paper examines the evolution of secure remote access requirements and the resulting challenges facing today's IT departments.
Posted: 04 Jun 2015 | Published: 29 May 2015

Citrix

Enabling the Mobile Workforce in the Wake of Consumerization
sponsored by Calero Software
WHITE PAPER: In this white paper you'll learn how to gain a competitive advantage by outsourcing mobile support to providers that offer world class service desk capabilities and economies of scale for maximizing the value of mobility.
Posted: 04 Jun 2015 | Published: 26 Dec 2014

Calero Software

SaaS - Simplifying Network Security and Compliance
sponsored by SilverSky
WHITE PAPER: This white paper examines the benefits of migrating to a SaaS security model.
Posted: 02 Jun 2015 | Published: 13 May 2015

SilverSky

Think You are Safe from DDoS Attacks?
sponsored by Neustar®
WHITE PAPER: This white paper examines the repercussions of relying solely on firewalls and IPS/IDS to attempt blocking DDoS attacks. View now to learn the steps to take to protect sensitive data stored in the cloud.
Posted: 02 Jun 2015 | Published: 06 May 2015

Neustar®

4 Ways To Strengthen Your DNS Security
sponsored by Neustar®
WHITE PAPER: This white paper presents the four steps to strengthening DNS security to block today's constant dynamic attacks.
Posted: 02 Jun 2015 | Published: 27 May 2015

Neustar®

A10 Networks Thunder ADC Provides Protection from Encrypted Threats
sponsored by A10 Networks
VIDEO: Access this short video to see a visualization of the threat posed by encrypted data traffic, and what a solution looks like.
Posted: 02 Jun 2015 | Premiered: 02 Jun 2015

A10 Networks

Wireless Network Security - Next Gen Firewalls
sponsored by Dell Software
WHITE PAPER: In this white paper, examine the infrastructure of one next-gen wireless firewall.
Posted: 01 Jun 2015 | Published: 18 Dec 2014

Dell Software

New Capabilities of Next-Gen Firewalls
sponsored by Dell Software
VIRTUAL ENVIRONMENT: This virtual environment explores why firewalls that are only 2-3 years old are failing to protect organizations from malware and other cybercrime attacks.
Posted: 01 Jun 2015 | Premiered: 10 Dec 2014

Dell Software

A10 Networks ACOS for Better End User Experience and Superior ROI
sponsored by A10 Networks
VIDEO: Access this short video to see why traditional network solutions won't stand up to increased pressure, and how you can use high speed shared memory in an ADC to improve your business.
Posted: 01 Jun 2015 | Premiered: 01 Jun 2015

A10 Networks

Consolidate Your Secure Remote Access Delivery Infrastructure with One URL
sponsored by Citrix
WHITE PAPER: Access this white paper to how you can unify your secure remote access infrastructure.
Posted: 01 Jun 2015 | Published: 29 May 2015

Citrix

10 IPS Platforms Reviewed and Compared
sponsored by IBM
WHITE PAPER: This report examines ten different IPS platforms and reviews them based on block rate, anti-evasion capabilities and more.
Posted: 01 Jun 2015 | Published: 31 Dec 2013

IBM

Current DDoS Attack and Security Landscape
sponsored by Neustar®
RESOURCE: This white paper report outlines the state of DDoS attack trends and the defensive approaches organizations are using. View now to learn why traditional DDoS defenses are allowing hidden malware to sneak through and the new approaches to mitigate DDoS attacks.
Posted: 29 May 2015 | Published: 25 Mar 2015

Neustar®

Network Intrusion Prevention Systems Product Analysis Report
sponsored by Dell Software
WHITE PAPER: This analyst white paper takes an in-depth look at the strengths and weaknesses of one firewall. View now to examine the analyst's scorecard for the product's performance and what you need to know about it.
Posted: 29 May 2015 | Published: 18 Dec 2013

Dell Software

Critical Role of DNS Calls for Vulnerability Mitigation
sponsored by Neustar®
WHITE PAPER: This white paper explores the current state of DNS threats, vulnerabilities, and 3 most common attacks.
Posted: 29 May 2015 | Published: 13 May 2015

Neustar®

Research Study: Top Network Technology Purchasing Concerns
sponsored by Dell, Inc.
WHITE PAPER: This resource details the key networking technologies that IT executives and professionals sought to upgrade in 2014.
Posted: 29 May 2015 | Published: 30 May 2014

Dell, Inc.

Secure Mobile Access: Overcoming Today's BYOD Obstacles
sponsored by Dell Software
WHITE PAPER: This white paper examines the need for a holistic security strategy to address the end-to-end mobility and BYOD challenges.
Posted: 28 May 2015 | Published: 19 May 2015

Dell Software

Today's Top 8 Cybersecurity Threats
sponsored by Dell Software
WHITE PAPER: This informative white paper presents and details the top cybersecurity threats and attacks to help your organization re-evaluate your security strategy.
Posted: 28 May 2015 | Published: 01 Apr 2015

Dell Software

Uncover Threats in SSL Traffic: The Ultimate Guide to SSL Inspection
sponsored by A10 Networks
WHITE PAPER: Access this white paper to see all the features you should have in a SSL inspection platform.
Posted: 28 May 2015 | Published: 31 Dec 2014

A10 Networks
51 - 75 of 1272 Matches Previous Page    1 2 3 4 5 6    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement