IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
76 - 100 of 1533 Matches Previous Page  |  Next Page
VoIP Adoption Leads to Free PCI Upgrades for Major Quick Service Restaurant
sponsored by Hughes Network Systems
CASE STUDY: The case study uncovers how VoIP adoption helped a quick service restaurant address growing cyber challenges and increase their bandwidth for the best network connection.
Posted: 01 Sep 2017 | Published: 31 Mar 2017

Hughes Network Systems

Ddos Jumpstart: 11 Best Practices for Mitigating the DDoS of Things
sponsored by A10 Networks
WHITE PAPER: Learn how to proactively detect and mitigate even advanced, multi-vector DDoS attacks. Plus, find out how to protect your network and key business apps by implementing 11 best practices.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

A10 Networks

SD-WAN Case Study: M&T Bank Coporation
sponsored by Hughes Network Systems
CASE STUDY: The case study explores how switching to an SD-WAN helped M&T Bank Corporation experience more reliability and security within their network.
Posted: 31 Aug 2017 | Published: 30 Apr 2017

Hughes Network Systems

DDos of Things: Survival Guide
sponsored by A10 Networks
WHITE PAPER: To learn more about prevention techniques for DDoS attacks on the IoT, explore this white paper that explains the how DDoS attacks have evolved in terms of both network and application layer attacks.
Posted: 31 Aug 2017 | Published: 30 Jun 2017

A10 Networks

Improve Endpoint Security with Advanced Tools and Techniques
sponsored by OPSWAT inc
EGUIDE: Better endpoint security protection is possible with NAC, DLP and other tools and techniques. Access this expert e-guide to learn how they fit together to improve enterprise endpoint protection.
Posted: 31 Aug 2017 | Published: 29 Aug 2017


3 Keys to Unlocking the Bank of the Future
sponsored by Hughes Network Systems
EGUIDE: Discover the tools to meet digitally-savvy customers' expectations for reliable network connections and security.
Posted: 30 Aug 2017 | Published: 30 Apr 2017

Hughes Network Systems

What is a Network Packet Broker?
sponsored by Ixia
EGUIDE: Learn how to improve your ROI with specialized network security and monitoring tools with the help of Network Packet Broker's (NPBs).
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Ixia

Interroll Deploys a Broadband WAN with Unity EdgeConnect
sponsored by Silver Peak
WEBCAST: Learn how Interroll updated their WAN architecture with EdgeConnect to improve application performance, and uncover the top functional features SD-WAN creates for your company.
Posted: 30 Aug 2017 | Premiered: Aug 30, 2017

Silver Peak

Provide Quality of Service for UC Platforms
sponsored by Nectar Corp
WEBCAST: Watch this brief video to learn how to deliver quality of service (QoS) and positive user experiences for the key UC apps and devices that power your organization's collaboration.
Posted: 29 Aug 2017 | Premiered: Aug 29, 2017

Nectar Corp

How to Find the Best DDoS Attack Prevention and Dection Tools
sponsored by SearchSecurity.com
EBOOK: Explore this expert handbook on how to evaluate DDoS prevention tools and services to identify the best ones for you.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

SearchSecurity.com

2017 Network Security Report
sponsored by Ixia
WHITE PAPER: Read this network security report to gain some insight into how the landscape has changed over the past year, and learn some tips as to how you can better secure your network.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Ixia

Digital Transformation Obstacles and How to Overcome Them
sponsored by Verizon
RESEARCH CONTENT: This IDC white paper reveals networking obstacles to achieving digital success. Access the survey results inside to learn what network leaders are doing to overcome these challenges and support digital transformation.
Posted: 28 Aug 2017 | Published: 31 Jul 2016

Verizon

Increase Network Security Resilience
sponsored by Ixia
WHITE PAPER: Is your overall security architecture resilient enough to limit the risk of downtime to your network? Explore how you can build a more resilient IT security architecture to complement your firewall.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Ixia

Network Visibility for Dummies
sponsored by Ixia
EBOOK: You can't monitor what you can't see. When it comes to establishing strong security, visibility across all your network traffic is essential. This 77-page e-book, Network Visibility for Dummies, describes how you can achieve truly resilient and effective network security.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Ixia

How mobile and IoT connectivity is shaping the network of the future
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about the concept of autonomous self-driving networks, how the IoT connectivity wars are playing out and why Asia is set to dominate industry conversations on 5G.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

ComputerWeekly.com

Ellie Mae & Juniper Networks
sponsored by Juniper Networks, Inc.
WHITE PAPER: Learn how Ellie Mae was able to combine the AWS Cloud with their on-premises environment while using Juniper Networks security and networking solutions to meet their workload requirements while keeping their networks secure.
Posted: 25 Aug 2017 | Published: 25 Aug 2017

Juniper Networks, Inc.

Network Cloud Visibility for Dummies
sponsored by Ixia
EBOOK: You need to ensure the reliability, security, and performance of mission-critical services, but the cloud presents a challenge to network visibility. This e-book, Cloud Visibility For Dummies, will help to answer your top questions when it comes to network management in the cloud era.
Posted: 25 Aug 2017 | Published: 25 Aug 2017

Ixia

Virtual Network Services: Simplify Your Network
sponsored by Verizon
PRODUCT LITERATURE: A software-defined network enables you to manage your network as a single ecosystem instead of a group of individual systems. Access this white paper to learn about a virtual network service that helps address the problems of disparate devices, while controlling costs, responding quickly to changing needs, and more.
Posted: 25 Aug 2017 | Published: 25 Aug 2017

Verizon

Why Digital Signing and Verification is Paramount in Cross Domain Environments
sponsored by OPSWAT inc
WEBCAST: Malware targets USB keys and 1 out of every 8 attacks comes via USB. Watch this webcast to uncover how to protect your critical networks against recent portable media threats.
Posted: 22 Aug 2017 | Premiered: Aug 22, 2017


Networking Checklist: Follow the Steps of Industry Peers
sponsored by Spectrum Enterprise
WHITE PAPER: When networking technology challenges are daunting and you need a new strategy, some of the best guidance comes from those who've been there. Learn from industry peers on how to overcome technology challenges and enable business growth.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Spectrum Enterprise

Protecting Data in the Healthcare Industry
sponsored by Mimecast
WHITE PAPER: The healthcare industry finds itself under cyberattack from many vectors, including ransomware, malware and targeted attacks. Read this white paper to determine strategies to secure your data.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Mimecast

Investigate attacks like never before
sponsored by Cisco Umbrella
RESOURCE: Dive into this interactive resource and learn about a truly innovative approach to security that allows you to drastically cut down on the noise from alerts. Access now and see for yourself how this system delivers an intuitive, single source of security intelligence that can allow you to investigate and eliminate the most critical threats.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Cisco Umbrella

Cyber security solutions from IBM
sponsored by IBM
WHITE PAPER: Government agencies rely on the Internet to store large amounts of data. As a result, internal and external threats are a growing concern for personal and valuable information. This informative white paper offers cyber security solutions to ensure protection.
Posted: 28 Aug 2017 | Published: 20 Jul 2012

IBM

Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network
sponsored by nCircle
WHITE PAPER: This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact.
Posted: 28 Aug 2017 | Published: 02 Aug 2010

nCircle

Web Hacking - Network Security Secrets & Solutions
sponsored by Bit9, Inc.
WHITE PAPER: This chapter seeks to outline the scope of the webhacking phenomenon and show you how to avoid becoming just another statistic in the litter of web properties that have been victimized over the past few years.
Posted: 28 Aug 2017 | Published: 09 Jun 2009

Bit9, Inc.
76 - 100 of 1533 Matches Previous Page    2 3 4 5 6 7    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement