IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
51 - 75 of 1554 Matches Previous Page  |  Next Page
The State of Mobile Application Insecurity - Ponemon Institute Research Report
sponsored by IBM MaaS360
RESOURCE: This Ponemon Institute study, which encapsulates 640 individuals involved in the application development and security process, will help you understand how organizations are reducing the risk of unsecured mobile apps used in their business practices.
Posted: 18 May 2016 | Published: 28 Feb 2015

IBM MaaS360

Wireless Security Trends: State of the Market
sponsored by Fortinet, Inc.
RESEARCH CONTENT: Understand the key security challenges faced by enterprise IT today, including wireless LAN vulnerability, IoT applications, and the continued adoption of cloud-managed Wi-Fi, by reading this survey report.
Posted: 18 May 2016 | Published: 18 May 2016

Fortinet, Inc.

SDN network security: Building a safer architecture
sponsored by VMware
EGUIDE: As mobile devices and IoT increase the number of network connections, organizations can no longer rely on a hardened network perimeter to prevent cyberattacks. Software-defined networking (SDN) technology enables networks to better secure themselves and provide capabilities to enhance the network's ability to identify and remediate cyberattacks.
Posted: 17 May 2016 | Published: 04 May 2016

VMware

Read this Before Attempting Network Micro-Segmentation
sponsored by VMware
EGUIDE: Micro-segmentation is emerging as an essential networking, data center and security tool, but it's a difficult tool to master. This expert guide reveals the technology's benefits and disadvantages, considerations to take into account during the adoption process and what kind of services vendors are offering.
Posted: 17 May 2016 | Published: 04 May 2016

VMware

Scaling Security Alongside Your Business Growth
sponsored by Verizon
WHITE PAPER: See how you can extend your WAN while you grow, and do so without being concerned about opening up your enterprise to unseen vulnerability.
Posted: 17 May 2016 | Published: 31 Dec 2015

Verizon

Market Focus Double Vision
sponsored by Gigamon
WHITE PAPER: It's time to get real with security realities. Understand how to achieve greater visibility into your network traffic and learn where other organizations stand in the cyber security war.
Posted: 17 May 2016 | Published: 01 Feb 2016

Gigamon

Five Tips to Make your Data Protection Strategy more proactive
sponsored by Intel Security
WEBCAST: Gain critical albeit little-known tips & tactics to make your data protection strategy more proactive as analysts from the Foundstone Services' Detection and Response team deliver and an in-depth technical discussion on data loss prevention (DLP) policies, implementations, and deployments.
Posted: 17 May 2016 | Premiered: Apr 1, 2016

Intel Security

Enterprise Mobile Management
sponsored by IBM MaaS360
RESOURCE: Are you sure that your mobility solution is keeping you competitive? The future of business is becoming increasingly focused on mobility and shaping the mobile worker's experience. Access this report to compare the top eleven enterprise mobile management vendors and gain an understanding of what to look for in a solution.
Posted: 17 May 2016 | Published: 04 Dec 2015

IBM MaaS360

Data Exfiltration in Depth
sponsored by Intel Security
WEBCAST: Data exfiltration and data loss prevention experts go in-depth into common data exfiltration techniques and how to detect a possible attack. They'll provide quantitative research about data loss attempts and detail data loss prevention processes and tools.
Posted: 17 May 2016 | Premiered: Apr 1, 2016

Intel Security

The Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: Trends in mobility, IoT, BYOD, cloud-based computing and more are changing the way that business is done. This poses a lot of network and security issues. Access this resource to explore four steps that will guide you through this evolutionary phase and into a digital workplace.
Posted: 16 May 2016 | Published: 29 Feb 2016

Aruba Networks

How to Create a Culture of Compliance in IT
sponsored by Verizon
WHITE PAPER: Navigating compliance issues is no easy task – and the cost of noncompliance is high. Learn how to create a culture of compliance at your enterprise, and get tips on balancing your mobile strategy with compliance, protecting customer data, and more.
Posted: 16 May 2016 | Published: 31 Dec 2015

Verizon

Definitive Guide: Securing The Mobile Enterprise
sponsored by Aruba Networks
WHITE PAPER: Mobility, BYOD and cloud computing are changing the way people do work and this can quickly become a nightmare for security and IT managers. Access this white paper to learn how to handle the increasingly mobile workforce and turn mobility into a business advantage.
Posted: 16 May 2016 | Published: 04 May 2016

Aruba Networks

Spot Risks Before They Become Real Threats
sponsored by Verizon
WHITE PAPER: Discover how you can – and why you should – shift from simply reacting to threats to proactively managing risk in order to quickly identify attacks heading to your network.
Posted: 16 May 2016 | Published: 31 Dec 2015

Verizon

Where Network Virtualization Fits Into Data Center Initiatives
sponsored by VMware
WHITE PAPER: The software-defined data center (SDDC) is an integral part of network virtualization. Discover ways network virtualization fits in with today's priorities, whether that's closing dangerous gaps in data center security, automating processes, or supporting application continuity.
Posted: 16 May 2016 | Published: 16 May 2016

VMware

Where Network Virtualization Fits Into Data Center Initiatives
sponsored by VMware
WHITE PAPER: Network virtualization is what is going to enable you to keep up with the constant advances in technology without having to sweat over too many details. See how it fits into your existing physical network, your plans for software-defined data center and much more.
Posted: 16 May 2016 | Published: 29 Jan 2016

VMware

What You Want To Know (But Haven’t Asked) About Micro-Segmentation
sponsored by VMware
TECHNICAL ARTICLE: Perimeter security is no longer enough to meet data center security requirements. Micro-segmentation is an important security aspect that you need to fully understand. Explore this technical brief to learn about facets of micro-segmentation that many resources don't cover.
Posted: 16 May 2016 | Published: 30 Dec 2015

VMware

The Zero Trust data center in action
sponsored by VMware
WHITE PAPER: Micro-segmentation is the key to securing your data center from the inside out. Read on to learn more about how micro-segmentation works, how to incorporate it, the role network virtualization plays and the benefits it brings.
Posted: 16 May 2016 | Published: 27 Apr 2016

VMware

Barracuda NextGen Firewalls protect the ever-expanding operation ofGeorgia’s leading telecoms provider, Geocell
sponsored by Barracuda Networks
RESOURCE: Geocell chose a next-generation firewall that fit every criteria and beyond. Within only two months, business-critical apps were running smoothly and network management controls were centralized. Learn more about how Geocell's experiences could benefit your network.
Posted: 16 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Security and availability in extremely adverse environments
sponsored by Barracuda Networks
RESOURCE: Exalo Drilling chose a next-generation firewall to protect their growing infrastructure. The centralized management, application awareness and overall efficiency exceeded their expectations. Learn more about how their experience could benefit your organization's IT infrastructure.
Posted: 16 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Barracuda NextGen Firewall F Boosts Wireless Network Security for5,000 Users During the 2015 European Youth Olympics
sponsored by Barracuda Networks
RESOURCE: Zurab Tuskia, head of IT infrastructure of the Festival, chose Wi-Fi secured by a next-generation firewall for its ease of deployment and cost effectiveness over other, more complex solutions. Learn more about their decision that provided them live traffic monitoring and rejection capabilities unwanted of p2p traffic.
Posted: 16 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Prevent Data Loss with Exabeam
sponsored by Exabeam
WHITE PAPER: User behavior analytics (UBA) provides the context needed to evaluate user behavior accurately and efficiently. It focuses on the user handling the data rather than the data itself. Learn how you can pair your DLP tools with UBA to best prevent data loss and exfiltration.
Posted: 16 May 2016 | Published: 01 Apr 2016

Exabeam

Total Mobility Management Video
sponsored by CDW
VIDEO: 86% of employees use their phones for both work and personal use. There are over 1.3 billion mobile workers and that number is growing. Watch this video to learn about a three-pillar total mobility management approach that will keep you ahead of the competition.
Posted: 13 May 2016 | Premiered: 04 May 2016

CDW

Advanced Security through Micro-segmentation and Cryptographic Cloaking for Highly Sensitive Data, Networks, and Systems
sponsored by Unisys
WHITE PAPER: Traditional network security hardware and software are becoming less effective and increasingly susceptible to advanced threats. Discover a different approach to mitigating risks by securing data-in-motion across any public or private network.
Posted: 13 May 2016 | Published: 13 May 2016

Unisys

Give your connections a boost.
sponsored by Verizon
WHITE PAPER: Never before has there been a greater need for performance-based solutions that offer the support for today's IP applications. Access this fact sheet to see how you can realize agile Internet connections that provide the speed your business needs.
Posted: 13 May 2016 | Published: 30 Sep 2015

Verizon

What does mobility really mean?
sponsored by Citrix
VIDEO: Watch this video to learn the current perceived meaning of mobility and what it should mean. You'll also find a joint mobility solution that utilizes cloud storage and safety best practices to enable your employees to share data, collaborate, and much more.
Posted: 13 May 2016 | Premiered: 06 Oct 2014

Citrix
51 - 75 of 1554 Matches Previous Page    1 2 3 4 5 6    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement