IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 
Definition continues below.
Network Security Reports
76 - 100 of 1517 Matches Previous Page  |  Next Page
High Availability DNS Reduces Downtime Risk and Improves End-User Experience
sponsored by Oracle + Dyn
WHITE PAPER: Learn the benefits of implementing a high availability DNS infrastructure using redundant DNS services to help increase your online performance and reliability without negatively impacting user experience.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

Oracle + Dyn

How Redundant DNS Services Improve the Security, Reliability and Performance of your IT Environment
sponsored by Oracle + Dyn
RESOURCE: Explore the most common methods to add a secondary DNS service (Traditional Primary-Secondary, Hidden Master Secondary, and Primary-Primary) as we evaluate and explain the advantages of each to help improve the performance, security, and reliability of your DNS infrastructure.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

Oracle + Dyn

How SD-WAN can take on Branch Office Security Challenges
sponsored by Windstream Communications
RESOURCE: In this resource, learn how to recognize and then overcome the common security challenges SD-WAN faces by leveraging SD-WAN's inherent virtual capabilities.
Posted: 25 Sep 2017 | Published: 31 May 2017

Windstream Communications

When it Comes to Optimizing Mid-Market Enterprise Networks, One Size Does Not Fit All
sponsored by Windstream Communications
RESOURCE: This resource stresses the key considerations to make when you are choosing a SD-WAN provider for your enterprise network.
Posted: 25 Sep 2017 | Published: 25 Aug 2017

Windstream Communications

Realizing the Promise of Scale in the Cloud
sponsored by West UC
WHITE PAPER: In this white paper, find out how healthcare organizations depend on UCaaS to provide up-to-date technology and deliver productivity benefits to improve customer satisfaction.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

West UC

The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure
sponsored by Google Cloud
WHITE PAPER: Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Google Cloud

Secure Cloud Faxing for Highly Regulated Industries
sponsored by J2 Cloud Services
WHITE PAPER: In this white paper, learn how you can seamlessly implement a cloud fax model without impacting functionality and security – all while gaining a better understanding of the traits to consider when selecting a cloud fax vendor.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

J2 Cloud Services

Metrics for Success: How does your UC&C stack up?
sponsored by Vyopta
RESOURCE: In this resource, find out how your UC&C strategies compare to competitors and learn how to leverage key performance indicators (KPIs) to bring your monitoring, voice, video, and messaging tools into a single view to track your success.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Vyopta

Driving Voice and Video Usage with Skype for Business
sponsored by Vyopta
RESOURCE: In this resource, learn how to make the transition to new UC strategies - like Skype for Business - without impacting security and customer satisfaction.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Vyopta

Intro to UCaaS: Creating Engaging Experiences in the Digital Workplace
sponsored by Windstream Communications
RESOURCE: In this resource, learn the fundamentals of UCaaS, how to make the switch, and what you qualities you should consider when choosing a UCaaS provider.
Posted: 25 Sep 2017 | Published: 26 Jul 2017

Windstream Communications

Internet Disruption Study
sponsored by Oracle + Dyn
RESEARCH CONTENT: In this research report conducted by Spiceworks, you will find the quantifiable impact of Internet disruptions on network operations for organizations.
Posted: 25 Sep 2017 | Published: 31 Jan 2017

Oracle + Dyn

Leaving the Traditional Network WANosaurus Behind with SD-WAN
sponsored by Windstream Communications
WHITE PAPER: The biggest challenge for current WAN networks is the cloud. Explore this white paper to learn how SD-WAN technology provides its users with the flexibility to add/change bandwidth in near real-time, while enhancing security and user experience.
Posted: 22 Sep 2017 | Published: 01 Aug 2017

Windstream Communications

Understanding What Matters Most When Selecting Managed DNS
sponsored by Oracle + Dyn
EBOOK: This e-book discusses the most important criteria when selecting a managed DNS provider, the advantages of a cloud-based DNS provider, and the added benefits of a secondary DNS service.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Oracle + Dyn

Cloud Security Report
sponsored by Alert Logic
RESEARCH CONTENT: According to this Cloud Security report, application attacks account for 75% of verified security incidents beating out brute force attacks, DDoS and more. In this research report, explore an overview of these different types of attacks and how attackers choose their targets.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Alert Logic

Transitioning from Traditional IT to a Secure Cloud
sponsored by Alert Logic
CASE STUDY: This case study explores how Wilbur-Ellis transformed their network infrastructure and the immediate benefits received from leveraging an Amazon Wed Services (AWS) cloud platform and security-as-a-service (SaaS) provider.
Posted: 22 Sep 2017 | Published: 31 Dec 2015

Alert Logic

Why Fax over VoIP & SIP is Unreliable and How the Cloud can Help
sponsored by J2 Cloud Services
WHITE PAPER: In this white paper, learn the fundamentals of traditional telecommunications and how enterprises are making the switch to VoIP, SIP, and FoIP protocols and find out the immediate benefits of a cloud-faxing model.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

J2 Cloud Services

Interconnection: Fueling the Explosion of the Digital Economy
sponsored by Equinix
RESOURCE: In this resource, learn how your bandwidth compares to others with the help of the Global Interconnection Index. Recognize the trends, insights, and projections.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Equinix

Remote Access Redefined: Managing the Rise of Third-Party Users
sponsored by Akamai Technologies
WHITE PAPER: This white paper discusses the need for new access models that establish next-generation firewalls (NGFW) to manage the rise of third-party users while meeting security and usability demands.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

Akamai Technologies

The Legal Aid Society of New York Overcomes Effects of Hurricane Sandy with Cloud Services Strategy
sponsored by J2 Cloud Services
CASE STUDY: This case study demonstrates how a cloud faxing model can help improve your everyday business needs with immediate and long-lasting benefits.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

J2 Cloud Services

Integrate Cloud Faxing with your Multi-function Printers
sponsored by J2 Cloud Services
WHITE PAPER: This white paper discusses the immediate benefits of a cloud faxing model with the integration of a multi-function printer (MFP).
Posted: 21 Sep 2017 | Published: 21 Sep 2017

J2 Cloud Services

How A Regional Bank Maintained Information Security with the Cloud
sponsored by J2 Cloud Services
CASE STUDY: In this case study, learn how a regional bank established the cloud faxing model that features redundancy and survivability to help prevent security breaches.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

J2 Cloud Services

IHS Technology: Network Monitoring Equipment
sponsored by Gigamon
WHITE PAPER: In this report, gain a stronger understanding of the top tools on the network monitoring market to help improve overall security and reliability.
Posted: 20 Sep 2017 | Published: 19 May 2017

Gigamon

Disrupt the Machine-to-Human Fight with a New Defender Lifecycle Model in Security Operations
sponsored by Gigamon
WHITE PAPER: In this white paper, learn how Gigamon's security delivery platform combats breaches and cyberattacks by integrating machine learning, artificial intelligence (AI) and security workflow automation.
Posted: 20 Sep 2017 | Published: 31 Jul 2017

Gigamon

Building the Agile Enterprise: Maintain Your Competitive Edge
sponsored by Verizon
WHITE PAPER: Enterprise leaders want a network that exceeds their customers' expectations. Explore this white paper to reveal how to collaborate better with employees and open up new business opportunities by virtualizing your network infrastructure.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Verizon

Building the Case for Virtual Network Services
sponsored by Verizon
WHITE PAPER: As the digital economy continues to take hold, organizations need to focus on their applications, and specifically how customers access the services within the business. Read this white paper to reveal benefits you can see from using network functions virtualization.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Verizon
76 - 100 of 1517 Matches Previous Page    2 3 4 5 6 7    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  from many points to support offline analysis.After establishing a benchmark for normal traffic, the NBA program passively monitors network activity and flags unknown, new or unusual patterns that might indicate the presence of a threat. The program can also monitor and record trends in bandwidth and protocol use. Network behavior analysis is particularly good for spotting new malware and zero day exploits. A good NBA program can help a network administrator minimize the time and labor involved in locating and resolving problems. It should be used as an enhancement to the protection provided by … 
Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement