IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
76 - 100 of 1521 Matches Previous Page  |  Next Page
IT Security Threats Facing Retail in 2016
sponsored by Verizon
RESEARCH CONTENT: This report reveals the 3 top IT security threats facing retail businesses in 2016. You'll see how you're vulnerable and what steps to take to begin improving your security strategy.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Verizon

Research Report: Security Threats Facing the Public Sector
sponsored by Verizon
RESEARCH CONTENT: Discover the 3 most prevalent security risks facing IT in the public sector, and how you can go about mitigating your vulnerability.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Verizon

Best Practices to Contain Cyberattacks
sponsored by Illumio
WHITE PAPER: As cyberattacks become more sophisticated, it is time to make a shift in your IT security strategy. One that involves redefining how to contain and handle the inevitable attack. Uncover the 7 best practices you must take to gain control over your enterprise security.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Illumio

2016 Report on Network Security in the Hospitality Industry
sponsored by Verizon
RESEARCH CONTENT: Learn about the network security vulnerabilities facing the hospitality industry in 2016. By identifying which issues are most prevalent in your industry, you'll have a head start in heading them off in your own enterprise.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Verizon

Cybersecurity for Banking and Financial Institutions
sponsored by Delta Risk
WHITE PAPER: Follow this primer for IT professionals who are looking to protect their organization and secure their networks from attack while remaining in compliance with evolving regulations. In addition to discussing the nature of the modern cyberthreat, it also discusses the numerous extra burdens specifically for banking and financial firms.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Delta Risk

How to Decide on Next-Gen Firewalls
sponsored by Fortinet, Inc.
EGUIDE: Firewalls are must-have network security tools and a new generation of firewalls is emerging. This comprehensive guide examines next-generation firewalls, how to evaluate vendors and what to consider before making a purchase.
Posted: 07 Jun 2016 | Published: 06 Jun 2016

Fortinet, Inc.

Secure your mobile devices, data and apps
sponsored by Verizon
WHITE PAPER: This white paper teaches you how to assess your existing security policies, giving you advice on potential weaknesses and best practices to strengthen your mobile security. Get better peace of mind with policies that keep data, devices and apps in line no matter where your workforce roams.
Posted: 07 Jun 2016 | Published: 01 May 2016

Verizon

Understand the Business Impact and Cost of a Breach
sponsored by MASERGY
ANALYST REPORT: This Forrester Report will help security and risk leaders build a case for investment to show business leaders what kind of investment it'll take to adequately protect their organization.
Posted: 07 Jun 2016 | Published: 12 Jan 2015

MASERGY

Embracing the Digital Workplace
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Organizations across all industries recognize the need to embrace digital transformation or risk being left behind in today's mobile world. Transform your business by embracing digital and discover the key trends driving the transformation as well as, the impact these trends are having on the underlying mobile networks.
Posted: 07 Jun 2016 | Published: 07 Jun 2016

Hewlett Packard Enterprise

The Threats Facing Financial Service Institutions in 2016
sponsored by Verizon
RESOURCE: Understand the nature of the security threat facing financial enterprises in 2016. Inside this paper you will find a quick, granular discussion of the sorts of attacks your network will be facing this year, and ways to inoculate your data from harm or theft.
Posted: 06 Jun 2016 | Published: 29 Apr 2016

Verizon

Rapid Response Retainer Services
sponsored by Verizon
VIDEO: Discover the multiple functionalities and protections available to enterprises that embrace security retainer services for IT security.
Posted: 06 Jun 2016 | Premiered: 28 May 2015

Verizon

Next Generation Cybersecurity: The Age of Artificial Intelligence
sponsored by MASERGY
WEBCAST: Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.
Posted: 06 Jun 2016 | Premiered: May 1, 2016

MASERGY

Masergy UES Offers Unique Approach to Network Defense
sponsored by MASERGY
ANALYST REPORT: Instead of applying a one-size-fits-all approach, multi-stage machine learning analysis detects events differently on different networks. Learn how this security strategy can find predictable patterns on your network and methods that work best for it.
Posted: 06 Jun 2016 | Published: 11 Nov 2015

MASERGY

Increase productivity in a mobile world
sponsored by HPE and Intel®
WEBCAST: Supporting mobility is the key ingredient to increase employee productivity. Discover the challenges you face in implementing an effective mobile strategy and the 4 key steps to increase productivity.
Posted: 03 Jun 2016 | Premiered: Jun 3, 2016

HPE and Intel®

Five simple strategies to help enable a more productive mobile workforce
sponsored by HPE and Intel®
RESOURCE: How do you keep your mobile workforce productive? Explore best practices and five strategies to make sure that your workers are making the most of mobility.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

HPE and Intel®

Make Behavioral Analytics Part of Your Security Strategy
sponsored by MASERGY
RESOURCE: Discover how behavioral analysis work and learn how it can benefit your network security. Shift your focus from blocking and preventing breaches to detecting and rapidly responding to attacks.
Posted: 03 Jun 2016 | Published: 05 Aug 2015

MASERGY

Vendor Comparison for Web Application Firewalls
sponsored by Dimension Data
WHITE PAPER: Imperva, a leading provider of cyber security solutions is once again the only leader in Gartner's Magic Quadrant for Web Application Firewall—the only company positioned in the leader's quadrant by Gartner in each of the two years this report has been published.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Dimension Data

Top 10 Database Security Threats
sponsored by Dimension Data
WHITE PAPER: Read this paper to understand the top 10 database threats and how you can protect your most valuable assets.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Dimension Data

HBR paper: The Danger from Within
sponsored by Dimension Data
WHITE PAPER: The biggest threat to enterprise security is the people organizations hire and fire. Read this article from the Harvard Business Review, "Danger from Within" to learn why the number of insider cyberattacks is growing and what are 5 ways to tackle the problem.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Dimension Data

MobileIron Named a Leader in Enterprise Mobile Management Report
sponsored by MobileIron
RESOURCE: Find out how the top 11 enterprise mobile management (EMM) vendors stack up against each other when compared against an expert 25-criteria evalutaion.
Posted: 02 Jun 2016 | Published: 04 Dec 2015

MobileIron

A Unified View of the Enterprise Network for Proactive Security
sponsored by Fortinet, Inc.
WHITE PAPER: Trends in mobility and cloud-host enterprise applications are prompting enterprises to reconsider how they deploy enterprise networks. Find out how these trends are changing approaches to network management, the need for more unified, proactive security and the challenges this all presents.
Posted: 08 Jun 2016 | Published: 31 Mar 2016

Fortinet, Inc.

Wireless Security Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 08 Jun 2016 | Published: 02 May 2016

Fortinet, Inc.

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
EBOOK: As IoT blooms, it's introducing new security challenges. Challenges that access layer security strategies can help you combat. Read on to learn about new approaches and choosing secure WLAN solutions.
Posted: 08 Jun 2016 | Published: 01 Jun 2016

Fortinet, Inc.

The Top 7 Criteria for Cloud Wi-Fi
sponsored by Fortinet, Inc.
WHITE PAPER: The vision of an all-wireless enterprise has been in sight for years, but it has finally come within grasping range. Cloud-managed Wi-Fi is the way to achieve the goals of a more agile enterprise at lower IT costs. Read on to learn about the top seven requirements to look for in cloud Wi-Fi.
Posted: 07 Jun 2016 | Published: 12 May 2016

Fortinet, Inc.

The Future of PC Security and Management
sponsored by MobileIron
WHITE PAPER: Enterprise mobility management (EMM) is one big key to unlocking mobility's full potential. We had previously required a variety of solutions to deal with every aspect of mobile management. Now there is an EMM solution that does it all. Read on to learn more about EMM and this simplifying solution.
Posted: 03 Jun 2016 | Published: 31 May 2016

MobileIron
76 - 100 of 1521 Matches Previous Page    2 3 4 5 6 7    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement