IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network Security Reports
76 - 100 of 1272 Matches Previous Page  |  Next Page
Mobile Device Management Policy Best Practices
sponsored by IBM
WHITE PAPER: In this white paper, you'll discover the 10 best practices for developing a successful mobile device management plan.
Posted: 29 Apr 2015 | Published: 26 Dec 2014

IBM

Does Android Dream of Enterprise Adoption?
sponsored by IBM
WHITE PAPER: This white paper explains how you can protect yourself from common Android security holes with the proper MDM platform so that you can take advantage of the employee productivity benefits. If you're nervous about user management, data consumption, rooting and other issues, then this is the resource for you.
Posted: 29 Apr 2015 | Published: 26 Dec 2014

IBM

Mobile Device Management for Education
sponsored by IBM
WHITE PAPER: Access this white paper now and learn how mobility and BYOD strategies in all levels of education can make school districts and organizations more cost-effective with the right device and app management solution.
Posted: 29 Apr 2015 | Published: 26 Dec 2014

IBM

Securing the Mobile Enterprise Environment
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore best practices for addressing security issues for the mobile enterprise environment, including those for establishing secure mobile access and mobile device security. Discover solutions designed to help your organization maintain tight network and mobile device security while still enhancing employee productivity.
Posted: 29 Apr 2015 | Published: 30 Sep 2014

Dell, Inc. and Intel®

Podcast: Transform Your Customer‘s Infrastructure and Accelerate Your Profitability with HP Networking Converged Campus Offerings
sponsored by Hewlett-Packard Company
PODCAST: Access this Podcast now to discover the best ways to use software defined networking (SDN) to handle security threats and device management at a fraction of the cost and without any headache.
Posted: 28 Apr 2015 | Premiered: Apr 20, 2015

Hewlett-Packard Company

The Secure Mobile Enterprise
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Dell, Inc. and Intel®

Mobile Device Management for Everyone
sponsored by IBM
WHITE PAPER: Access this white paper now to learn how your company can implement a secure mobile strategy that won't cause headaches for your IT department to manage.
Posted: 27 Apr 2015 | Published: 26 Dec 2014

IBM

Transforming Your Customer‘s Infrastructure and Accelerating Your Profitability with Converged Networking
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this white paper now to discover the best ways to use software defined networking (SDN) to handle security threats and device management at a fraction of the cost and without any headache.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Hewlett-Packard Company

The Key to Smarter Enterprise Code Signing
sponsored by Symantec
WHITE PAPER: This white paper explores several alternative approaches to enterpise code signing to minimize mismanagement of keys. View now to learn more.
Posted: 24 Apr 2015 | Published: 04 Dec 2013

Symantec

Secure network traffic between hosts systems and remote PCs/web browsers
sponsored by OpenText
PRODUCT OVERVIEW: Access this informative resource to explore a comprehensive security solution that protects network traffic between host systems and remote PCs and web browsers by encrypting application traffic across networks. Learn how you can ensure zero disruption to users who remotely access data and applications from web browsers and desktop computers.
Posted: 24 Apr 2015 | Published: 31 Mar 2015

OpenText

Know What Third-Party App Developers Are Doing
sponsored by BalaBit
WHITE PAPER: This white paper discusses the convenience of using of monitoring software for external application management activities.
Posted: 24 Apr 2015 | Published: 24 Apr 2015

BalaBit

Best Practices for Securing Your Citrix Remote Access Against Hacker Intrusions
sponsored by Citrix Ready and SMS Passcode
WEBCAST: Join this live webcast on May 21, 2015 to learn the best practices for securing your remote access against sophisticated hackers.
Posted: 24 Apr 2015 | Premiered: Apr 24, 2015

Citrix Ready and SMS Passcode

Top 10 Reasons to Monitor Privileged Users
sponsored by BalaBit
WHITE PAPER: In this infographic, discover what IT pros really think about privileged activity monitoring, including stats on common security postures, the top ten reasons to adopt privileged identity monitoring, and more.
Posted: 23 Apr 2015 | Published: 23 Apr 2015

BalaBit

It's Time to Identify and Confront Today's Data Center Security Challenges
sponsored by VMware
WHITE PAPER: In this white paper, you will learn how to detect, isolate, and block dynamic threats with a granular security approach from inside your data center. Access now to learn why network security is a good start and how to enhance it.
Posted: 23 Apr 2015 | Published: 29 Dec 2014

VMware

Como definir uma referência de desempenho da rede para monitoramento de redes
sponsored by Ipswitch File Transfer
EGUIDE: Este documento discute formas de se criar uma referência para o desempenho da rede, a fim de possibilitar que gerentes de redes planejem o crescimento de uma rede corporativa e identifiquem padrões que indiquem possíveis problemas.
Posted: 23 Apr 2015 | Published: 20 Apr 2015

Ipswitch File Transfer

Integrating App Security into the Development Lifecycle
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores how to combat cybercriminals by integrating security into the software development lifecycle and offers strategies and best practices to ensure success.
Posted: 23 Apr 2015 | Published: 14 Jan 2015

Hewlett-Packard Company

Layered Cyber Defenses for Better Security
sponsored by Hewlett-Packard Company
WHITE PAPER: View this webcast to learn how to evolve your cyber security strategy into a four phase process to stop APT attacks. Read on now to learn the 12 critical capabilities of an adaptive protection process and how to move beyond a reactive architecture to an always-on monitoring model.
Posted: 22 Apr 2015 | Published: 04 Jun 2014

Hewlett-Packard Company

5 Best Practices to Reduce Incident Response Time
sponsored by Great Bay
WEBCAST: Join security guru Ty Powers as he explains the 5 best practices for reducing incident response (IR) time.
Posted: 22 Apr 2015 | Premiered: Apr 22, 2015

Great Bay

Case Study: Local Government Finds the Perfect Security Intelligence Solution
sponsored by IBM
VIDEO: In this video, discover how a local government found a security intelligence tool that met their needs.
Posted: 22 Apr 2015 | Premiered: 14 Jan 2015

IBM

Extend Security and Control from the Data Center Edge to the core
sponsored by VMware
WHITE PAPER: This white paper explores how to enable comprehensive data center security through network virtualization. Access now to learn how to overcome the three major issues with traditional network security and how to defend your data center from within.
Posted: 21 Apr 2015 | Published: 04 Mar 2015

VMware

Continuous Monitoring: A New Approach to Proactively Protecting your Global Perimeter
sponsored by Qualys
WHITE PAPER: This white paper examines the need for continuous monitoring. Access now to explore a blueprint to improving your network security strategy and how to identify and address potential threats enabled by vulnerabilities in software or systems.
Posted: 21 Apr 2015 | Published: 13 Aug 2014

Qualys

Market Study: 7 Security Forensics Platforms
sponsored by IBM
WHITE PAPER: In this research report, find detailed reviews and ratings for seven leading security forensics platforms.
Posted: 21 Apr 2015 | Published: 31 Jul 2014

IBM

Best Practices for Intelligent Security and File-Sharing
sponsored by Ipswitch File Transfer
EGUIDE: Take a look at this expert guide to discover how to enhance your data protection with stronger threat intelligence and more secure file sharing.
Posted: 20 Apr 2015 | Published: 10 Apr 2015

Ipswitch File Transfer

Advancing Cyber-security Measures from the Inside
sponsored by VMware
RESOURCE: This infographic teaches you how to secure your network and data center from the inside and add to your perimeter defenses.
Posted: 20 Apr 2015 | Published: 11 Dec 2014

VMware

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: Explore this white paper to learn how decryption is a necessary tool in network security and monitoring.
Posted: 16 Apr 2015 | Published: 20 Jan 2015

Blue Coat Systems
76 - 100 of 1272 Matches Previous Page    2 3 4 5 6 7    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement