IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Multimedia (View All Report Types)
1 - 25 of 100 Matches Previous Page  |  Next Page
Trust But Verify: Mobile App Protection Best Practices
sponsored by Arxan
WEBCAST: This webcast explores how to evolve app security to face modern day threats and stop them before they can spread across your network. Discover a set of best practices for app security and threat mitigation, plus learn about Arxan's comprehensive app protection and alerting capabilities.
Posted: 15 Feb 2019 | Premiered: Feb 15, 2019

TOPICS: 
Arxan

How You Can Make Incident Response Faster and More Efficient
sponsored by CoreLight
WEBCAST: Watch this webcast to learn about Zeek—an open-source network security monitor that is formally known as Bro—and see how it can transform network traffic into high-fidelity data streams for faster incident detection.
Posted: 08 Feb 2019 | Premiered: Feb 8, 2019

TOPICS: 
CoreLight

How Cybercriminals are Adapting to Outwit Defenses
sponsored by Dell SecureWorks
WEBCAST: From July 2017 through June 2018, SecureWorks Counter Threat Unit researchers analyzed incident response outcomes and conducted original research to gain insight into threat activity and behavior across 4,400 companies. In this webcast, gain insight on the key findings from the report.
Posted: 06 Feb 2019 | Premiered: Dec 5, 2018

TOPICS: 
Dell SecureWorks

An Overview of Endpoint Detection & Response (EDR)
sponsored by Trend Micro, Inc.
WEBCAST: ESG Senior Principal Analyst Jon Oltsik discusses an overview of Endpoint Detection & Response (EDR) in the market, including trends, challenges, and how automation can help.
Posted: 06 Feb 2019 | Premiered: Mar 23, 2018

TOPICS: 
Trend Micro, Inc.

A Technical Introduction to Bro: Network Security's Best Kept Secret
sponsored by CoreLight
WEBCAST: Watch this webinar to learn about open-source network security monitor Bro—now known as Zeek—and how it can help you get deep, actionable traffic insight you can use for network analysis.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019

TOPICS: 
CoreLight

Universities, Network Security, and Bro: A Roundtable Discussion
sponsored by CoreLight
WEBCAST: Watch this webinar to learn about open-source network security monitor, Bro—now known as Zeek—and how companies and universities use it to transform raw network traffic into high-fidelity data streams for analysis and threat detection.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019

TOPICS: 
CoreLight

An Introduction to Threat Hunting with Bro Zeek
sponsored by CoreLight
PRODUCT DEMO: Watch this webcast to hear from Richard Chitamitre, Jonathon Hall, and Andrew Pease—3 elite threat hunters with years of military service fighting on the cyberwarfare frontlines—on how to start using Zeek to hunt down attackers.
Posted: 05 Feb 2019 | Premiered: 05 Feb 2019

TOPICS: 
CoreLight

"Bro" Open-Source Framework with Alan Saldich
sponsored by CoreLight
WEBCAST: In this webcast, listen to Chief Marketing Officer at Corelight, Alan Saldich, talk about the open source software Bro, now known as Zeek. Learn how CoreLight's sensors help enable the large-scale usage of Bro by retrieving and organizing the data you need to track network traffic and performance.
Posted: 05 Feb 2019 | Premiered: Feb 5, 2019

TOPICS: 
CoreLight

A Revolution in Network Security Monitoring Is Underway: Are You Ready?
sponsored by CoreLight
WEBCAST: Watch this video to hear from networking industry analyst Zeus Kerravala to learn how cutting-edge organizations are leading a security monitoring revolution, away from scattershot network visibility toward a unified, comprehensive visibility approach with tools purpose-built for security teams.
Posted: 04 Feb 2019 | Premiered: Feb 4, 2019

TOPICS: 
CoreLight

How to Reduce Security Risks through Better DNS Visibility & Analysis
sponsored by CoreLight
WEBCAST: In this webcast, find out how you can drive visibility into DNS traffic so that you can create a strong security analytics strategy that enables you to reduce risks for your network.
Posted: 04 Feb 2019 | Premiered: Jan 9, 2019

TOPICS: 
CoreLight

Network Visibility and Using "Bro" with Vincent Stoffer
sponsored by CoreLight
WEBCAST: Watch this video to hear Director of Customer Solutions at Corelight, Vincent Stoffer, discuss network visibility and threat hunting as well as pairing the company's hardware appliance with the open-source software, Bro, now known as Zeek—enabling security teams to use Bro at an enterprise scale for accurate network traffic analysis.
Posted: 01 Feb 2019 | Premiered: Feb 1, 2019

TOPICS: 
CoreLight

The IT Security Confidant Vanishing Perimeter Pickup Sub
sponsored by Symantec
WEBCAST: See the benefits of Symantec Web Security Services today.
Posted: 01 Feb 2019 | Premiered: Feb 1, 2019

TOPICS: 
Symantec

The IT Security Confidant Vanishing Perimeter Pickup
sponsored by Symantec
VIDEO: See the benefits of Symantec Web Security Services today.
Posted: 31 Jan 2019 | Premiered: 31 Jan 2019

TOPICS: 
Symantec

The IT Security Confidant Vanishing Perimeter Sub
sponsored by Symantec
WEBCAST: The world of IT security has seen a vanishing perimeter in recent years. This has resulted from the increased usage of cloud which has made it for difficult for companies to secure mobile devices. In this webcast, learn about a simple, complete and cost-effective cloud security solution from Symantec.
Posted: 31 Jan 2019 | Premiered: Jan 31, 2019

TOPICS: 
Symantec

The IT Security Confidant Vanishing Perimeter
sponsored by Symantec
WEBCAST: Click here, to learn about the benefits of Symantec's Web Security Services and learn how their advanced cloud delivered network security services are helping the cloud generation.
Posted: 31 Jan 2019 | Premiered: Jan 31, 2019

TOPICS: 
Symantec

Corelight Webcast: New SIEM on the Block -- Meet Humio
sponsored by CoreLight
WEBCAST: Bro network security monitoring is an open source tool. It turns raw network traffic into comprehensive network logs organized by protocol, with key fields extracted specifically for security use cases. In this webcast, watch a demo to see how Corelight's technical integration with Humio allows you to economically monitor all your network traffic.
Posted: 28 Jan 2019 | Premiered: Aug 21, 2018

TOPICS: 
CoreLight

The 2019 Security Strategy
sponsored by Cloudflare
VIDEO: How are you planning to secure your employees, your company, and your customers in 2019? Watch this webinar to hear from Cloudfare CSO Joe Sullivan on the core strategies he uses to help protect Cloudfare, and—as a result—its 12M domains that rely on it for security and performance.
Posted: 22 Jan 2019 | Premiered: 17 Jan 2019

TOPICS: 
Cloudflare

How Neustar SiteProtect NG Safeguards its Customers
sponsored by Neustar
VIDEO: In this video, hear from 6 Security and Network professionals on how their leading businesses were able to mitigate DDoS attacks using Neustar SiteProtect NG.
Posted: 18 Jan 2019 | Premiered: 16 Jan 2019

TOPICS: 
Neustar

How Permanent TSB Protects its Online Banking System from DDoS Attacks
sponsored by Neustar
VIDEO: Permanent TSB, the third largest Irish provider of personal retail banking services in Ireland, needed to protect their online banking services from harmful DDoS attacks. Read one to find out they accomplished DDoS security.
Posted: 18 Jan 2019 | Premiered: 18 Jan 2019

TOPICS: 
Neustar

Why You Shouldn't Gamble on Security When Moving to the Cloud
sponsored by Zscaler
VIDEO: Join this 15-minute webinar to explore the elements that make up a comprehensive security platform, and learn how to enable direct access to the internet and cloud applications for all users in all locations, without gambling on security.
Posted: 15 Jan 2019 | Premiered: 11 Jan 2019

TOPICS: 
Zscaler

DomainTools Guide to Threat Hunting with Splunk and Phantom
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. The first step to integrating threat hunting into your organization is establishing a true threat hunting program. In this webcast, learn about a number of threat hunting essentials.
Posted: 14 Jan 2019 | Premiered: Jan 14, 2019

TOPICS: 
DomainTools

The Beginner's Guide to Threat Hunting
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents. In this webcast, learn about the key steps to creating a threat hunting process.
Posted: 11 Jan 2019 | Premiered: Dec 31, 2018

TOPICS: 
DomainTools

SANS Fingerprinting Threat Actors with Web Assets
sponsored by DomainTools
WEBCAST: Threat intelligence helps companies better predict the actions of threat actors to stay ahead of their attacks. In order to do this, organizations must learn more about the enemy. In this webcast, SANS instructor Rebekah Brown and Data Systems Engineer at DomainTools, Mike Thompson discuss ways to better fingerprint threat actors.
Posted: 11 Jan 2019 | Premiered: May 31, 2018

TOPICS: 
DomainTools

The Beginner's Guide to Mitigating Phishing Attacks
sponsored by DomainTools
WEBCAST: Phishings attacks are a common form of fraud that is most commonly done by disguising malicious links to distribute malware. In this webcast, Corin Imani, Senior Security Advisor at DomianTools discusses real world examples, the steps to executing a phishing attack and ways to remediate a phishing attack.
Posted: 10 Jan 2019 | Premiered: Jan 10, 2019

TOPICS: 
DomainTools

Siemens on their Secure Cloud Transformation with Zscaler
sponsored by Zscaler
WEBCAST: Watch this brief video to hear insights from Siemens' VP of Global IT Infrastructure, Frederik Janssen about the company's re-architecting of its global hub-and-spoke network to a direct-to-cloud architecture.
Posted: 03 Jan 2019 | Premiered: Jan 3, 2019

TOPICS: 
Zscaler
1 - 25 of 100 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement