IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: A network analyzer (also called a protocol analyzer or packetanalyzer) is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity. Network analyzers can supplement firewalls,anti-virus programs, and spyware detection programs.Network analyzers can:Provide  … 
Definition continues below.
Network Security Reports
76 - 100 of 1281 Matches Previous Page  |  Next Page
Secure Mobile Access: Overcoming Today's BYOD Obstacles
sponsored by Dell Software
WHITE PAPER: This white paper examines the need for a holistic security strategy to address the end-to-end mobility and BYOD challenges.
Posted: 28 May 2015 | Published: 19 May 2015

Dell Software

Today's Top 8 Cybersecurity Threats
sponsored by Dell Software
WHITE PAPER: This informative white paper presents and details the top cybersecurity threats and attacks to help your organization re-evaluate your security strategy.
Posted: 28 May 2015 | Published: 01 Apr 2015

Dell Software

Uncover Threats in SSL Traffic: The Ultimate Guide to SSL Inspection
sponsored by A10 Networks
WHITE PAPER: Access this white paper to see all the features you should have in a SSL inspection platform.
Posted: 28 May 2015 | Published: 31 Dec 2014

A10 Networks

Securing Endpoints Against The Next Generation of Attacks
sponsored by Trend Micro
WHITE PAPER: Access this white paper to learn what you need to ensure complete endpoint security.
Posted: 28 May 2015 | Published: 28 May 2015

Trend Micro

The Current State of Server Security Affairs
sponsored by Trend Micro
WHITE PAPER: Access this white paper for an in-depth examination of the current state of server security.
Posted: 27 May 2015 | Published: 26 Dec 2014

Trend Micro

Case Study: Deploying Secure Public WiFi
sponsored by Dell Software
CASE STUDY: This brief case study examines how one Australian city council enabled secure WiFi in all public buildings using a next-gen firewall to protect endpoints, users, and sensitive data. Access now to learn how to mitigate mobile and network threats.
Posted: 27 May 2015 | Published: 13 May 2015

Dell Software

Research Report: The Value of an Upgraded Network Solution
sponsored by Extreme Networks
WHITE PAPER: Access this resource to learn how one company was able to upgrade their network to improve customer service and various business processes.
Posted: 27 May 2015 | Published: 27 May 2015

Extreme Networks

Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization
sponsored by Mimecast
WHITE PAPER: This white paper presents the timeline of a spear-phishing attack and the common security strategies used that ultimately fail to protect the organization.
Posted: 26 May 2015 | Published: 22 Apr 2015

Mimecast

The Value of Cloud and Data Security
sponsored by Trend Micro
WHITE PAPER: In this white paper, you'll learn about a simple, comprehensive approach to server security that proves serious economic value for any company.
Posted: 22 May 2015 | Published: 22 May 2015

Trend Micro

Uncover Advanced Attacks and Detect Hidden Breaches
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, discover how you can gain greater visibility into the state of both active and live threats hidden within your network.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

VMware NSX The Platform for Network Virtualization
sponsored by VMware
DATA SHEET: Current network and security solutions are rigid, complex and often vendor-specific. Consult this white paper to find out more on how VMware NSX can bring your data center and networking strategies to the next level.
Posted: 22 May 2015 | Published: 22 May 2015

VMware

Security, Storage, and Collaboration Gains from Cloud Solutions
sponsored by Box
WHITE PAPER: Access this white paper to learn how Avago Technologies implemented a new cloud file sync and share service, yielding greater business agility, infrastructure cost-savings and simplified management for greater security.
Posted: 21 May 2015 | Published: 31 Jul 2014

Box

Securing the Payment Card Industry in Physical, Virtual and Cloud Environments
sponsored by Trend Micro
WHITE PAPER: Access this white paper for an in-depth look at how you can enjoy all of the benefits of a virtual PCI data center without having to worry about PCI Data Security Standard 3.0 compliance.
Posted: 20 May 2015 | Published: 24 Apr 2015

Trend Micro

Security and Unlocking the Value of the Mobile Workforce
sponsored by EE
WHITE PAPER: In this white paper, explore the benefits and challenges of mobile computing and why MDM needs to transition to enterprise mobility management (EMM) to secure apps and content. Continue reading to learn more.
Posted: 19 May 2015 | Published: 18 Mar 2015

EE

How to Securely Sync, Share, Collaborate, and Manage Business Content
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper examines one Software as a Service (SaaS) strategy and how it enables mobile content access and secure file sharing outside of the firewall. View now to see how other organizations have used this approach to protect data and files as they are accessed and shared and if it is right for your organization.
Posted: 18 May 2015 | Published: 16 Dec 2014

IntraLinks, Inc

Top 10 Data Security Mistakes to Avoid
sponsored by EE
WHITE PAPER: This insightful white paper presents the top 10 common security mistakes that countless organizations have made recently.
Posted: 18 May 2015 | Published: 08 Apr 2015

EE

Checklist: Online Security Strategy Key Considerations
sponsored by Melbourne IT
WHITE PAPER: The following white paper provides readers with a checklist designed to help assess your approach to online security and identify if there are any areas of your strategy that require reevaluation. Access now and gain a firm grasp on your online security strategy and learn what steps you can take to improve it.
Posted: 18 May 2015 | Published: 18 May 2015

Melbourne IT

Final Five Purchasing Decisions for Intrusion Detection Systems
sponsored by Hewlett-Packard Company
EGUIDE: This expert guide can help you ensure that you're making the right IDS choice with five considerations you need to think of before making your purchase.
Posted: 14 May 2015 | Published: 14 May 2015

Hewlett-Packard Company

Fighting Today's Advanced Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper demystifies APTs and reveals a three phase strategy to defending your network against determined cybercriminals.
Posted: 13 May 2015 | Published: 22 Apr 2015

Fortinet, Inc.

Securing Your Data Center from Endpoints to the Core
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the features and benefits of a security approach that defends the network core and edge to better protect data centers from today's latest risk factors.
Posted: 12 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Advanced Attacks Require an Advanced Solution
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper outlines a simple three phase framework for detecting and blocking concealed threats and protecting data on your network and beyond.
Posted: 12 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Internet of Things Security Study: Home Security Systems Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This research study presents the  test results of 10 popular home security systems. The results will make you feel anything but secure.
Posted: 12 May 2015 | Published: 29 Apr 2015

Hewlett-Packard Company

How to Prevent Security Breaches in Your Retail Network
sponsored by Dell, Inc.
WHITE PAPER: Explore the multi-vector nature common to most high-profile retail security breaches in this white paper and learn about the several common characteristics of recent breaches and how to protect your data against hackers.
Posted: 12 May 2015 | Published: 06 May 2015

Dell, Inc.

Shellshock and Future Vulnerabilities — Buying Precious Time
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to explore how Shellsock works, how attackers are exploiting network vulnerabilities, and what to do about future vulnerabilities.  View now to learn more.
Posted: 11 May 2015 | Published: 01 Apr 2015

Dell, Inc.

Top 10 Firewall Shopping Checklist
sponsored by Juniper Networks, Inc.
RESOURCE: In this white paper, you will learn the 10 necessary functions of a next-gen firewall to mitigate evolving dynamic threats.  View this helpful buyer's guide now to learn more.
Posted: 11 May 2015 | Published: 06 May 2015

Juniper Networks, Inc.
76 - 100 of 1281 Matches Previous Page    2 3 4 5 6 7    Next Page
 
NETWORK SECURITY DEFINITION (continued): …  detailed statistics for current and recent activity on the network.Test anti-malware programs and pinpoint potential vulnerabilitiesDetect unusual levels of network traffic.Detect unusual packet characteristics.Identify packet sources or destinations.Configure alarms for defined threats.Search for specific data strings in packets.Monitor bandwidth utilization as a function of time.Create application-specific plug-ins.Display all statistics on a user-friendly control panel.Network analyzers are not intended to replace firewalls, anti-virus programs, or spyware detection programs. However, the use … 
Network Security definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement