IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
51 - 75 of 1376 Matches Previous Page  |  Next Page
Get Your Network and Security Digital-Ready
sponsored by Aruba Networks
WHITE PAPER: This white paper explores how to get your network ready to handle the demands of a digital workplace for modern user experiences, security, and innovation. Learn how to update your enterprise mobility and IoT strategies and uncover 6 steps for prepping your network.
Posted: 16 May 2017 | Published: 16 May 2017

Aruba Networks

Maximize Productivity with Secure Delivery of Apps to Mobile Devices
sponsored by Citrix
WHITE PAPER: Explore a simple, secure, and unified way to deliver all types of apps to any device that employees use to execute critical functions. Learn how Citrix NetScaler makes it easy for users to access apps from any device – including mobile platforms like laptops or smartphones – without sacrificing security or increasing complexity.
Posted: 15 May 2017 | Published: 31 Dec 2016

Citrix

Digital Transformation Requires a New WAN
sponsored by Citrix
RESOURCE: Find out how to prep your network for the increasing adoption of hybrid cloud environments, mobile, and IoT by replacing managed WAN services and adding internet connectivity. Plus, learn about the benefits of SD-WAN for optimizing app performance, cloud migration, and more.
Posted: 15 May 2017 | Published: 31 Jul 2016

Citrix

Achieve Centralized Visibility and Management for Multivendor Access Networks
sponsored by Aruba Networks
WHITE PAPER: In order to proactively optimize network performance, strengthen network security, and improve end-user experiences, find out how to leverage Aruba AirWave to achieve centralized visibility and control for multivendor access networks.
Posted: 15 May 2017 | Published: 15 May 2017

Aruba Networks

Why Outsource your DNS
sponsored by Dyn
WHITE PAPER: Learn the top four reasons to outsource your DNS in this resource.
Posted: 12 May 2017 | Published: 30 Dec 2016

Dyn

Policy Management for IoT, Mobile, and Network Security
sponsored by Aruba Networks
WHITE PAPER: With mobility and IoT redefining today's security perimeter, this white paper explores how to expand the view of your network beyond the walls of your office. Find out what devices and how many are accessing your network with a centralized policy management platform.
Posted: 12 May 2017 | Published: 12 May 2017

Aruba Networks

Dyn Secondary DNS
sponsored by Dyn
WHITE PAPER: This resource highlights the benefits of adding a secondary DNS to your current DNS infrastructure.
Posted: 12 May 2017 | Published: 01 Jul 2016

Dyn

SD Wan is the Right Path for Better Branch Network Performance
sponsored by Citrix
RESEARCH CONTENT: If you rely on third-party cloud and SaaS-based apps, traditional WAN might not be able to keep up. Find out how a SD WAN-based approach can cut down on unnecessary traffic and help users access the apps they need more efficiently.
Posted: 12 May 2017 | Published: 31 May 2016

Citrix

The Number 1 Question You Should Ask Any Potential DNS Vendor
sponsored by Dyn
WHITE PAPER: Learn the number one question you should ask any potential DNS vendor to ensure you employ a managed DNS that improves Internet performance, user experiences and business results.
Posted: 12 May 2017 | Published: 30 Dec 2016

Dyn

Rethink DNS
sponsored by Dyn
EBOOK: This e-book details why you need to rethink DNS from several different perspectives, including your DNS choices, the importance of DNS for digital resilience and the overall value you place on DNS.
Posted: 11 May 2017 | Published: 30 Dec 2016

Dyn

Digital Transformation and Network Security
sponsored by Forcepoint
RESEARCH CONTENT: In this ESG white paper, learn how digital transformation is changing the security landscape, and how pros are adapting to meet these new challenges.
Posted: 11 May 2017 | Published: 31 Jan 2017

Forcepoint

Testing NGFW: Three Points of Value Critical to your Enterprise
sponsored by Forcepoint
WEBCAST: In this webcast learn about a next generation firewall (NGFW) offering that can give you the ability to scale to over 2,000 devices form a single console, multi-link business continuity for transparent failover, and more.
Posted: 11 May 2017 | Premiered: May 11, 2017

Forcepoint

Network Management and Operational Efficiency: How the Right NGFW Makes It Possible
sponsored by Forcepoint
WHITE PAPER: Learn about how you can find a next-gen firewall (NGFW) system that is built to fit the strength and scalability your business needs, with the simplicity and efficiency that you want in this white paper.
Posted: 10 May 2017 | Published: 10 May 2017

Forcepoint

Extending Global Load Balancing to the Cloud with Secondary DNS
sponsored by Dyn
WHITE PAPER: Learn why many organizations are adding secondary DNS to their on-premise GLB capabilities.
Posted: 10 May 2017 | Published: 13 Jul 2016

Dyn

Managed DNS Technical Overview
sponsored by Dyn
WHITE PAPER: Learn about Dyn Managed DNS and how it can provide your organization with consistent network performance, DDoS mitigation and advanced API.
Posted: 10 May 2017 | Published: 30 Dec 2016

Dyn

DYN Traffic Director
sponsored by Dyn
WHITE PAPER: Learn about Dyn's traffic director to see how it stacks up against the competition. Discover functionality that can benefit your network like geolocation load balancing, ratio load balancing and content delivery network integration.
Posted: 10 May 2017 | Published: 30 Dec 2016

Dyn

Understanding What Matters Most When Selecting Managed DNS
sponsored by Dyn
WHITE PAPER: In this DNS evaluation guide, learn about the critical role DNS plays in the user experience, the advantages of a cloud-based managed DNS service and key criteria for evaluating a managed DNS service provider.
Posted: 09 May 2017 | Published: 30 Dec 2016

Dyn

Simpler, Smarter Networking With Secure Vector Routing
sponsored by 128 Technology
WHITE PAPER: Learn how secure vector routing can provide simpler, smarter networking with functionality like context for breakthroughs, easier management and extensibility for easier scaling.
Posted: 09 May 2017 | Published: 30 Dec 2016

128 Technology

Revation Systems Revolutionizes Managed Connectivity Services With 128 Technology's Networking Platform
sponsored by 128 Technology
CASE STUDY: Learn how Revation Systems was able to deliver reliable, secure connectivity to their geographically dispersed customers and enjoy benefits such as improved voice quality, enhanced security, high-quality experience, and more.
Posted: 08 May 2017 | Published: 30 Dec 2016

128 Technology

Hypersegmentation Under the Hood
sponsored by 128 Technology
WHITE PAPER: This white paper discusses a new, entirely distinct approach to segmenting traffic, hypersegmentation. Hypersegmentation introduces a whole new set of tools for network design intended to allow operators to build the network around the services it is meant to deliver.
Posted: 08 May 2017 | Published: 20 Apr 2017

128 Technology

Strengthen Your Security Posture by Mapping Network Traffic to Users
sponsored by Palo Alto Networks
WHITE PAPER: This white paper explores how to leverage a User-ID security platform with next-generation firewall capabilities. Find out how to easily integrate user information into your security infrastructure and with features like user authentication and user-based policy control and reporting.
Posted: 08 May 2017 | Published: 31 Dec 2016

Palo Alto Networks

The Challenges of Managing SSL/TLS Encrypted Traffic
sponsored by Gigamon
RESEARCH CONTENT: Just 31% of companies say they have a plan in place to protect both their security sockets layer (SSL) and transport layer security (TLS) traffic in their network. In this SC Media survey, learn why it's so imperative to have a SSL/TLS plan.
Posted: 05 May 2017 | Published: 05 May 2017

Gigamon

Re-Thinking The Network: Delivering Transformation With Simplicity
sponsored by 128 Technology
WHITE PAPER: Overly complex networks are barely meeting today's business requirements. How will they meet the demands of tomorrow? Learn how you can remove the barrier of network complexity from the way you do business.
Posted: 05 May 2017 | Published: 30 Dec 2016

128 Technology

Businesses Blame Rivals for DDoS Attacks& The Importance of Cloud WAF
sponsored by F5 Networks
EGUIDE: More than 40% of businesses hit by a DDoS attack believe their competitors were behind it, according to research by Kaspersky Lab and B2B International. But is there truth behind this suspicion? In this expert e-guide, learn ]about the real culprits behind DDoS attacks, and get some insight into the emergence of cloud WAF for application security.
Posted: 04 May 2017 | Published: 01 May 2017

F5 Networks

Threat Hunting For Dummies
sponsored by Carbon Black
EBOOK: It's time to get proactive with threat hunting. In this Threat Hunting for Dummies e-book learn how to optimize your tools for endpoint visibility and threat intelligence and uncover 10 tips for creating effective threat hunting strategies.
Posted: 09 May 2017 | Published: 08 May 2017

Carbon Black
51 - 75 of 1376 Matches Previous Page    1 2 3 4 5 6    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement