IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network SecurityReports
76 - 100 of 1194 Matches Previous Page  | Next Page
Why threat intelligence is critical for next generation firewalls
sponsored by Dell Software
WHITE PAPER: A top-tier threat intelligence network is the foundation of an effective next-generation firewall (NGFW). This white paper examines three criteria for judging threat intelligence networks: completeness, accuracy and speed, and discusses how one such network works in practice.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

Overcoming exploits that use advanced evasion techniques and SSL encryption
sponsored by Dell Software
WHITE PAPER: To defend against today's advanced attacks, next-generation firewalls must be effective in overcoming obfuscation and advanced evasion techniques, as well as performing comprehensive SSL decryption and inspection.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

How SMBs can stop Malvertising
sponsored by Dell Software
WHITE PAPER: Computer users want to find a deal, read celebrity gossip or share personal details with friends. Cybercriminals know how to leverage it. This white paper explains malvertising, and offers five measures for blocking these threats.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

Beyond next gen firewalls
sponsored by Dell Software
WHITE PAPER: This ebook explains the differences in stateful firewalls and next generation firewalls, while giving you resources and other research to help you find the best defense against cyberattacks.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

A Guide to Disaster Recovery in the Cloud
sponsored by Avnet Technology Solutions
WHITE PAPER: Most organizations know they need to protect their business critical information so that downtime is reduced and people can work.  Buti n the event of outages or failures, many are left in the dark.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Avnet Technology Solutions

2013 Threat Report
sponsored by Dell Software
WHITE PAPER: This report extensively details and categorizes recent global trends in network threats.
Posted: 19 Aug 2014 | Published: 23 Jan 2014

Dell Software

Control Network Security with a New Approach to Malware Defense
sponsored by Hewlett-Packard Company
WHITE PAPER: This brief highlights a solution that integrates next-generation firewalls with intrusion prevention to create a barrier against harmful malware.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Company

EMM Challenges: Three Ways to Balance IT Needs With User Demands
sponsored by BlackBerry
WHITE PAPER: End-users for mobility rapidly demand more from their network providers.  This puts stress on IT professionals who are already busy dealing with complex security issues and day-today tasks. Read this whitepaper to see how enterprise mobility management is changing.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

A Guide to Improving Your Network Security in 30 Days
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource highlights a NGFW solution combined with intrusion prevention to cure your network security issues.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Company

Everything you need to know about MDM, MAM, & BYOD
sponsored by CA Technologies.
BOOK: This e-book gives you an expert look at many of the hot mobility trends in organizations today.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

CA Technologies.

Security School: Defending Against DDoS Attacks
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson reviews recent cases of DOS attacks, what happened and why, and the lessons you can learn in devising the best DoS defense.
Posted: 15 Aug 2014 | Premiered: 15 Aug 2014

SearchSecurity.com

Get Ready to Halt Cyber Attacks With IPS In Place
sponsored by HP and Intel
CASE STUDY: This case study highlights an intrusion prevention system (IPS) solution that is designed to secure network and critical data with intelligent and adaptive security measures.
Posted: 15 Aug 2014 | Published: 30 Jun 2014

HP and Intel

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EGUIDE: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com

The New Advantages in BES10: What the Latest Update (v10.2) Delivers
sponsored by BlackBerry
DATA SHEET: As BYOD and workforce mobility continue to gain traction in today's business world, a unified platform for managing a robust set of devices, applications, and content accross multiple operating systems is a must-have.  This exclusive paper takes a look at one platform that may solve your mobility worries.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

BlackBerry

Mitigating Security & Compliance Risks with EMM
sponsored by BlackBerry
WHITE PAPER: Due to potential threats to enterprise security that come along with workforce mobility, companies are discovering pitfalls from legal, competitive, and productivity standpoints.
Posted: 13 Aug 2014 | Published: 31 May 2014

BlackBerry

Firewall Buyers Guide: Evaluate Options Before the Big Decision
sponsored by Sophos, Inc.
WHITE PAPER: This firewall buyer's guide can help you to identify the right solution for your organization, whether you're looking for an alternative to a network firewall to add enhanced functionality, want to reduce the number of network security products you currently manage, or are in need of more visibility and control over your web users.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

Sophos, Inc.

Securing the Internet of Things
sponsored by SearchSecurity.com
EBOOK: In this Insider Edition, InfoSec pros will learn all about securing the Internet of Things, from determining the nature of the threats to creating an effective IoT security policy.
Posted: 13 Aug 2014 | Published: 12 Aug 2014

SearchSecurity.com

Ballarat Grammar secures BYOD with HP Network Protector SDN Application
sponsored by HP
CASE STUDY: BYOD has been a huge trend for industries worldwide, but what about students in schools?  Backed by a protected SDN application, this case study proves its usefulness in education.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

HP

Case Study: FIS Global Partners with Asigra to Provide Clients Enhanced Secure Data Protection that Meets Compliance Mandates
sponsored by Asigra
WHITE PAPER: For financial services business, it's critical that client data remains accessible and securely stored. As business grows, you will need to upgrade your backup service portfolio with an advanced solution – but there are questions you should ask before choosing.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Asigra

Secure Mobile Access
sponsored by Dell Software
WHITE PAPER: Discover how to enhance mobile productivity among employees by using converged technology that combines the best of management and security capabilities.
Posted: 06 Aug 2014 | Published: 01 Mar 2014

Dell Software

Simplified & Agile Networks: A Platform for Innovation
sponsored by HP
WHITE PAPER: Your network has always been a fundamental to business, but as cloud computing and mobility gain traction it becomes more important than ever to maintain and keep it flexible and agile.
Posted: 05 Aug 2014 | Published: 05 Aug 2014

HP

Application Delivery Optimization Tools: Evaluating Solutions and the Market
sponsored by F5 Networks
EGUIDE: This expert e-guide highlights 18 questions that will help you pinpoint the best fit tools for your application delivery optimization needs. Additionally, read on to learn how the application delivery controller (ADC) market is changing as enterprises adopt cloud services.
Posted: 05 Aug 2014 | Published: 05 Aug 2014

F5 Networks

Evaluación comparativa de eficacia y rendimiento: Sistema de prevención de intrusiones para seguridad de redes GX7800 de IBM
sponsored by IBM
PRODUCT REVIEW: Lea este reportaje para aprender los resultados de las pruebas de eficacia y rendimiento de IBM Security Network Intrusion Prevention System GX7800, además de las características y funcionalidad.
Posted: 02 Aug 2014 | Published: 02 Aug 2014

IBM

Why the World's Leading Businesses Trust BlackBerry
sponsored by BlackBerry
WHITE PAPER: Enterprise Mobility Management (EMM) is no easy task. However, with the right tools and a trusted partner any problem can be solved.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

BlackBerry

Network Evolution – July/August 2014
sponsored by SearchNetworking.com
EZINE: Learn how context-aware security makes network security policy smarter -- but only with a solid foundation. We also cover hybrid SDN and programming for network engineers.
Posted: 31 Jul 2014 | Published: 01 Aug 2014

SearchNetworking.com
76 - 100 of 1194 Matches Previous Page    2 3 4 5 6 7    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement