IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network SecurityReports
76 - 100 of 1166 Matches Previous Page  | Next Page
Next-Generation Security: Intrusion Prevention Systems
sponsored by CDW Corporation
WHITE PAPER: This white paper describes how an intrusion prevention system (IPS) works and why it's more effective than traditional firewalls in analyzing your network activity to detect and prevent problems.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation

Keeping Advanced Persistent Threats in Check
sponsored by CDW Corporation
WHITE PAPER: This white paper provides valuable information on APTs and proposes one company's comprehensive next-generation security solution.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation

Your Guide to the Biggest Security Trends of 2014
sponsored by CDW Corporation
EGUIDE: This guide discusses the security-related trends that you need to know about in 2014.
Posted: 17 Jul 2014 | Published: 28 Feb 2014

CDW Corporation

Solitaire Interglobal-Platform Security Report-Tracked, Hacked, and Attacked
sponsored by IBM
WHITE PAPER: This white paper provides insight on the main behavioral characteristics of hardware and software used for security purposes.
Posted: 16 Jul 2014 | Published: 31 Dec 2013

IBM

Security Solutions for Every Layer of Your IT Environment
sponsored by CDW Corporation
RESOURCE: View this infographic now to learn about critical security concerns within every layer of your IT environment and the steps that you can take to prevent these dangerous threats.
Posted: 16 Jul 2014 | Published: 16 Jul 2014

CDW Corporation

The Devices Are Coming! How the "Internet of Things" Will Affect IT
sponsored by Cox Communications, Inc.
WHITE PAPER: This informative report provides insight into what others are (or aren't) doing to prepare for the invasion of internet-connected devices in the workplace, as well as the changes that your enterprise should anticipate in the coming years.
Posted: 16 Jul 2014 | Published: 31 May 2014

Cox Communications, Inc.

Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security
sponsored by Imperva
WEBCAST: This on-demand webinar, Gartner Research Director Adam Hils discusses how IPS and NGFWs leave dangerous gaps in enterprise security, explains why web application firewalls (WAFs) are worth the investment for enterprises, and reviews the major features of WAF technology, deployment options and selection guidelines.
Posted: 15 Jul 2014 | Premiered: Jul 15, 2014

Imperva

Multi-Layered Security
sponsored by GFI Cloud
WHITE PAPER: Discover several key controls for robust SMB malware defenses and learn about several popular attacks that cybercriminals have been known to use.
Posted: 14 Jul 2014 | Published: 31 Dec 2013

GFI Cloud

2014 Gartner Magic Quadrant for Web Application Firewalls
sponsored by Imperva
ANALYST REPORT: Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Imperva

Fundamentals of the PKI Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This article reviews the basics of PKI, which increases data security through the use of advanced access methods and ensures that the authenticity of the data flow is preserved.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

Is UTM Ready for the Big Leagues?
sponsored by SearchSecurity.com
EBOOK: This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.
Posted: 10 Jul 2014 | Published: 10 Jul 2014

SearchSecurity.com

How to easily configure antivirus policies in GFI Cloud
sponsored by GFI Cloud
VIDEO: This short video demonstrates – by walking you through, step by step – how to easily configure antivirus policies in GFI Cloud. Watch now to discover how to achieve improved network security in the cloud.
Posted: 10 Jul 2014 | Premiered: 09 Jul 2014

GFI Cloud

Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This informative whitepaper explores survival tactics in the event of a web attack.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Imperva

GFI CloudTM Case Study - Central Bank & Trust
sponsored by GFI Cloud
CASE STUDY: This case study examines a cloud solution that has improved network security for a banking organization.
Posted: 07 Jul 2014 | Published: 31 Dec 2013

GFI Cloud

Network protection and UTM Buyers Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Data Security Checklist: Tips for Managing the Mobile Enterprise
sponsored by Accellion, Inc.
WHITE PAPER: This document presents a checklist of data security features to consider when establishing an enterprise mobility management strategy.
Posted: 01 Jul 2014 | Published: 30 Nov 2013

Accellion, Inc.

Secure Your Mobile Content While Increasing Productivity
sponsored by Accellion, Inc.
WHITE PAPER: This report provides key survey findings indicating how important mobile access is to users, how likely they are to bypass authorized systems, how compliant current collaboration practices are, and what collaboration functionality user expect on their mobile devices.
Posted: 01 Jul 2014 | Published: 31 Dec 2013

Accellion, Inc.

Competitive Testing of Web Security Devices
sponsored by Websense, Inc.
WHITE PAPER: This informative whitepaper compares various market-leading web security tools and outlines some common threats looking to infiltrate your system.
Posted: 30 Jun 2014 | Published: 23 Jan 2014

Websense, Inc.

MidWestern Community Bank Defends Againts Online Attacks
sponsored by Juniper Networks, Inc.
CASE STUDY: This case study examines a Midwestern community bank that has experienced DDoS attacks coming from a foreign country.
Posted: 27 Jun 2014 | Published: 31 Jan 2014

Juniper Networks, Inc.

Firewalls and IPS: Deploying Web Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative resource takes an in-depth look at internet edge firewall and intrusion prevention system (IPS) security services that protect your organization's gateway to the internet, providing helpful tips and guidance for ensuring your web presence is safe and secure.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Cisco Systems, Inc.

Defending Against Application-Layer DDoS Attacks
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper explains the serious problem that DDoS threats present, and how it impacts your business.
Posted: 25 Jun 2014 | Published: 31 Dec 2013

Juniper Networks, Inc.

Insights and Recommendations for Top Security Concerns; Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.

The Definitive Guide to Next Generation Firewalls: Which One is Right for You?
sponsored by Fortinet, Inc.
WEBCAST: This exclusive webcast takes an in-depth look at NGFWs, discussing five crucial "must-haves" for firewall success. Tune in now to find out more.
Posted: 23 Jun 2014 | Premiered: Jun 23, 2014

Fortinet, Inc.
76 - 100 of 1166 Matches Previous Page    2 3 4 5 6 7    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement