IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
51 - 75 of 1502 Matches Previous Page  |  Next Page
Internet Disruption Study
sponsored by Oracle + Dyn
RESEARCH CONTENT: In this research report conducted by Spiceworks, you will find the quantifiable impact of Internet disruptions on network operations for organizations.
Posted: 25 Sep 2017 | Published: 31 Jan 2017

Oracle + Dyn

Leaving the Traditional Network WANosaurus Behind with SD-WAN
sponsored by Windstream Communications
WHITE PAPER: The biggest challenge for current WAN networks is the cloud. Explore this white paper to learn how SD-WAN technology provides its users with the flexibility to add/change bandwidth in near real-time, while enhancing security and user experience.
Posted: 22 Sep 2017 | Published: 01 Aug 2017

Windstream Communications

Understanding What Matters Most When Selecting Managed DNS
sponsored by Oracle + Dyn
EBOOK: This e-book discusses the most important criteria when selecting a managed DNS provider, the advantages of a cloud-based DNS provider, and the added benefits of a secondary DNS service.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Oracle + Dyn

Cloud Security Report
sponsored by Alert Logic
RESEARCH CONTENT: According to this Cloud Security report, application attacks account for 75% of verified security incidents beating out brute force attacks, DDoS and more. In this research report, explore an overview of these different types of attacks and how attackers choose their targets.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Alert Logic

Transitioning from Traditional IT to a Secure Cloud
sponsored by Alert Logic
CASE STUDY: This case study explores how Wilbur-Ellis transformed their network infrastructure and the immediate benefits received from leveraging an Amazon Wed Services (AWS) cloud platform and security-as-a-service (SaaS) provider.
Posted: 22 Sep 2017 | Published: 31 Dec 2015

Alert Logic

Why Fax over VoIP & SIP is Unreliable and How the Cloud can Help
sponsored by J2 Cloud Services
WHITE PAPER: In this white paper, learn the fundamentals of traditional telecommunications and how enterprises are making the switch to VoIP, SIP, and FoIP protocols and find out the immediate benefits of a cloud-faxing model.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

J2 Cloud Services

Interconnection: Fueling the Explosion of the Digital Economy
sponsored by Equinix
RESOURCE: In this resource, learn how your bandwidth compares to others with the help of the Global Interconnection Index. Recognize the trends, insights, and projections.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Equinix

Cisco Digital Network Architecture
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper demonstrates how Cisco's Digital Network Architecture (DNA) can help IT professionals learn and implements new techniques to response to changing business conditions faster.
Posted: 21 Sep 2017 | Published: 30 Jun 2017

Cisco Systems, Inc.

5 Benefits of a Digital Ready Network
sponsored by Cisco Systems, Inc.
RESOURCE: This resource highlights the 5 ways to prepare your enterprise's network infrastructure as IoT and mobile devices continue to grow.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

Cisco Systems, Inc.

Miercom Lab Tested Report: Cisco vs. HPE
sponsored by Cisco Systems, Inc.
WHITE PAPER: This research report compares Cisco and HPE's, competitive campus-wide network management, control, and monitoring infrastructures.
Posted: 21 Sep 2017 | Published: 28 Apr 2017

Cisco Systems, Inc.

Remote Access Redefined: Managing the Rise of Third-Party Users
sponsored by Akamai Technologies
WHITE PAPER: This white paper discusses the need for new access models that establish next-generation firewalls (NGFW) to manage the rise of third-party users while meeting security and usability demands.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

Akamai Technologies

Network as a Sensor Infographic
sponsored by Cisco Systems, Inc.
WHITE PAPER: Uncover how your organization can prevent a breach before it happens with proactive threat monitoring.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

Cisco Systems, Inc.

Reliability at all Levels
sponsored by Aruba Networks
WEBCAST: In this webinar, Peter Lane, Senior Director of Product Management, ArubaOS answers the common most ask questions about Aruba operating systems and what your organization should consider when evaluating mobility controllers.
Posted: 21 Sep 2017 | Premiered: Jun 8, 2017

Aruba Networks

How to Secure IoT and Mobile Devices with a Switch Series
sponsored by Aruba Networks
RESOURCE: Learn about benefits of Aruba's switch series for enterprises looking to increase bandwidth and keep up with the increasing demand for IoT-enabled mobile devices.
Posted: 21 Sep 2017 | Published: 13 Jun 2017

Aruba Networks

The Legal Aid Society of New York Overcomes Effects of Hurricane Sandy with Cloud Services Strategy
sponsored by J2 Cloud Services
CASE STUDY: This case study demonstrates how a cloud faxing model can help improve your everyday business needs with immediate and long-lasting benefits.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

J2 Cloud Services

Integrate Cloud Faxing with your Multi-function Printers
sponsored by J2 Cloud Services
WHITE PAPER: This white paper discusses the immediate benefits of a cloud faxing model with the integration of a multi-function printer (MFP).
Posted: 21 Sep 2017 | Published: 21 Sep 2017

J2 Cloud Services

Top 6 Reasons to Choose DNA
sponsored by Cisco Systems, Inc.
RESOURCE: This resource explores the top 6 reasons to consider an intent-based networking provider like Cisco's Digital Network Architecture to help deliver added security protection and automation of your network.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Cisco Systems, Inc.

What's on Your Network?
sponsored by Aruba Networks
RESOURCE: In this resource, find out how the closed-loop approach to network security allows IT professionals to deploy and retain control of IoT and BYOD devices to protect against security breaches.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Aruba Networks

Security Analytics: Putting Together an Effective Incident Response Plan
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, learn how to create and implement an effective incident response plan to detect security breaches and react before attacks wreak havoc on your network and reputation.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Cisco Systems, Inc.

Modernize your Network to Digitize your Business
sponsored by Aruba Networks
RESOURCE CENTER: In this article, learn how the changing network infrastructure and increase of IoT devices motivates organizations to implement new technologies like automation to boost capacity, reliability, and security.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Aruba Networks

How A Regional Bank Maintained Information Security with the Cloud
sponsored by J2 Cloud Services
CASE STUDY: In this case study, learn how a regional bank established the cloud faxing model that features redundancy and survivability to help prevent security breaches.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

J2 Cloud Services

IHS Technology: Network Monitoring Equipment
sponsored by Gigamon
WHITE PAPER: In this report, gain a stronger understanding of the top tools on the network monitoring market to help improve overall security and reliability.
Posted: 20 Sep 2017 | Published: 19 May 2017

Gigamon

Encrypted Traffic Analytics
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to learn about the current state of encryption technology, predictions, and how you can leverage it to turn your network into an advanced security sensor.
Posted: 20 Sep 2017 | Published: 30 Jun 2017

Cisco Systems, Inc.

Disrupt the Machine-to-Human Fight with a New Defender Lifecycle Model in Security Operations
sponsored by Gigamon
WHITE PAPER: In this white paper, learn how Gigamon's security delivery platform combats breaches and cyberattacks by integrating machine learning, artificial intelligence (AI) and security workflow automation.
Posted: 20 Sep 2017 | Published: 31 Jul 2017

Gigamon

Guide to Early Application Testing and Understanding Dev and Ops Responsibilities
sponsored by IBM
EGUIDE: Explore the importance of early application security testing. Learn from Owen Garrett, Head of Products for NGINX Inc., while he explains the security risks with containers and developing microservices.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM
51 - 75 of 1502 Matches Previous Page    1 2 3 4 5 6    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement