IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security White Papers (View All Report Types)
1 - 25 of 615 Matches Previous Page  |  Next Page
Building Robust Defenses with Limited Resources
sponsored by Kaspersky Lab
WHITE PAPER: 91% of organizations have experienced at least one attack in the course of a year. It has become clear that security, particularly endpoint security, cannot be ignored. In order to get a proper return on investment, your security must be both comprehensive and targeted. Get into this white paper to learn how to maximize your resources.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

Kaspersky Lab

EDR: The Case for Automation and Simplification
sponsored by Kaspersky Lab
WHITE PAPER: Endpoint security is enhanced through increased visibility, but the ability to investigate threats and search for specific indicators of compromise can give endpoints an added layer of protection. Add in automated threat response, and your endpoint security is real-world ready. Read this white paper on endpoint detection and response to learn more.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

Kaspersky Lab

Selecting Your Next-Generation Firewall Solution
sponsored by Fortinet, Inc.
WHITE PAPER: As security architects consider how to provide comprehensive threat protection for their enterprises, they face a confusing array of feature sets and vendor claims lacking complete specifications and/or standards-based performance metrics. View this white paper so that you may approach your CISO with a well-informed and compelling recommendation.
Posted: 06 Aug 2020 | Published: 06 May 2020

Fortinet, Inc.

Securing OT Systems in the Face of Rapid Threat Evolution
sponsored by Fortinet, Inc.
WHITE PAPER: Operational technology (OT) and IT used exist independent of one another, and each had their own security. But with the evolution of IoT, OT is beginning to merge with IT and connect to the internet, exposing OT to an increased number of security risks. Read this white paper on what CISOs need to know about the advanced threat landscape.
Posted: 06 Aug 2020 | Published: 15 Feb 2020

Fortinet, Inc.

6 Ways a Business-Driven SD-WAN Edge Yields a Multiplier Effect on Digital Transformation Investments
sponsored by Silver Peak
WHITE PAPER: SD-WAN continues to be one of the fastest-growing segments of the network infrastructure market, and it is poised to reach $5.25 Billion in 2023, according to the latest IDC forecast. In this white paper explore key consideration for evaluating an SD-WAN business case.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

Silver Peak

Enable Your Network Transformation with Secure and Agile Architecture
sponsored by TATA Communications
WHITE PAPER: Will your network have an innate ability to adapt? Will you be able to provide secure, reliable connections to your employees and customers? Will you have a cloud architecture that is agile and allows for seamless communication and quicker development? View this white paper for a closer look at what you need for a better network.
Posted: 03 Aug 2020 | Published: 03 Aug 2020

TATA Communications

SIG - Cisco Umbrella
sponsored by Cisco Umbrella
WHITE PAPER: Cisco Umbrella is a Secure Internet Gateway (SIG) that provides the first line of defense against threats on the internet, wherever users go. With integrated cloud security, users are kept secure, and retention of all internet activity reduces incident response time. Learn about the benefits and key features of Umbrella in this white paper.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Cisco Umbrella

2020 SonicWall Cyber Threat Report
sponsored by SonicWall
WHITE PAPER: So far this year, intrusion attempts are up 19% to 2.3 trillion. IoT malware attacks are up 50%. And according to the FBI, daily cybercrimes have increased 75% since COVID-19 began. In reading this white paper, you will learn powerful statistics and trends, such as these, to make strong decisions in protecting your network and users.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

SonicWall

Lockdown Lessons
sponsored by Webroot
WHITE PAPER: Network security is the immune system of an organization. If a business does not maintain a healthy immune system, then it’s vulnerable to a host of rapidly evolving threats. If you want to learn how to best secure your network, read this white paper from Webroot, which details best practices and innovative methods of protection.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Webroot

Lockdown Lessons: Closing Security Gaps
sponsored by Webroot
WHITE PAPER: It’s known that keys to security include finding the best technology and putting protocols in place to keep intruders out and employees vigilant. But simple processes such as updating systems, installing patches and disabling unnecessary services can also go a long way. Read this white paper to learn more about gaps to close in your network.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Webroot

Types of Phishing Attacks You Need to Know to Stay Safe
sponsored by Webroot
WHITE PAPER: Phishing has evolved from a single technique into many highly specialized tactics, each adapted to specific types of targets and technologies. It is now carried out via text, phone, and email. Knowing about the diverse set of today’s tactics can help people be more prepared. Read this white paper for 11 common phishing tactics you should know.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Webroot

Security at the Speed of 5G
sponsored by AT&T Cybersecurity
WHITE PAPER: Download this report to learn the current posture and plans of the cybersecurity industry as they relate to the impact of 5G; and you'll be able to explore how your organization's plans account for the gaps and recommendations we've identified.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

AT&T Cybersecurity

Enable and protect your remote workforce
sponsored by AT&T Cybersecurity
WHITE PAPER: This white paper is intended to help you make smart, strategic decisions on the tools and services available to bolster cybersecurity readiness in a remote environment. Download today to take a holistic approach to help protect your network when you have a remote workforce.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

AT&T Cybersecurity

Redefining Network Optimization for an “Anywhere Workforce”
sponsored by Equinix
WHITE PAPER: Many organizations had already begun transitioning and updating their network optimization journey when the COVID-19 pandemic struck, creating fundamental changes in when, where and how employees worked. In this white paper, explore the key role network optimization will play to support new workforce business plans.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Equinix

Threat Intelligence: Shrinking the Cybersecurity Data Gap
sponsored by Bitdefender
WHITE PAPER: The average cost of a data breach reached $3.92B in 2019, and this figure continues to grow year-over-year. Simultaneously, security teams are struggling to keep up with evolving threats and false positives. As a result, more companies are adopting threat intelligence. Read this white paper to learn why it’s becoming more popular.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Bitdefender

Kingminer –a Crypto-Jacking Botnet Under the Scope
sponsored by Bitdefender
WHITE PAPER: Kingminer is a piece of crypto-jacking malware that has been around since early 2018. It is an infection that begins from an SQL server process and exploits configuration flaws to obtain access to said server and schedules malicious commands for execution. Read this white paper for a technical analysis and how to know if you’ve been compromised.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Bitdefender

TikTok Case Study
sponsored by Lookout
WHITE PAPER: Social media companies have been known to breach privacy laws regarding user data, and TikTok, a video sharing app, may be the latest culprit. US, Chinese and Russian governments are all of the belief that TikTok is covertly being used to collect user data, and organizations are digging to find answers. Open this white paper to learn more.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

Lookout

Loading DLLs for Illicit Profit: A Story About a Metamorfo Distribution Campaign
sponsored by Bitdefender
WHITE PAPER: Dynamic-link libraries (DLLs) are on-ramps into a network that tend to be overlooked. Hackers can hijack an organization’s DLLs leaving valuable company data vulnerable to attack and theft. Read this white paper for a closer look at how cybercriminals hack DLLs for illicit profit and how you may be able to prevent these criminals.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

Bitdefender

Secure, Cloud-Controlled Network to Enable Work From Home
sponsored by CradlePoint
WHITE PAPER: When organizations plan for employees to work remote, they must consider both security and bandwidth, and uncover ways for these two to be compromised or effortlessly seamed together. Which route does your department choose to go? Do you have plans for edge computing? Browse this solution brief to learn more about modernizing your network.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

CradlePoint

Mobile Phishing: Myths & Facts Facing Every Modern Enterprise Today
sponsored by Lookout
WHITE PAPER: It may surprise you that the rate at which people fall for mobile phishing attacks has increased 85% every year since 2011. Organizations are constantly working to defend against phishing, but methods of defense against email attacks may not likewise prevent mobile attacks. Read this white paper for 3 myths and 3 facts on mobile phishing.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Lookout

Lookout Discovery: Chinese Surveillanceware
sponsored by Lookout
WHITE PAPER: The Lookout Threat Intelligence team discovered 4 malware tools connected to advanced mobile threat campaigns active since 2013. China was the main target, but at total of twelve languages were targeted. To learn how to avoid these attacks, tap this brief to learn about Lookout's Threat Advisory Service & how it monitors networks/mobile devices.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Lookout

The Road to Digital Transformation: Enabling OT-IT Convergence
sponsored by Orange Business Services
WHITE PAPER: This IDC InfoBrief, The Road to Digital Transformation: Enabling OT-IT Convergence, provides an in-depth look at the obstacles and opportunities as they relate to embracing digital transformation through operational technology (OT) and information technology (IT) convergence. Read on to leverage IDC’s expert guidance.
Posted: 22 Jul 2020 | Published: 31 May 2020

Orange Business Services

Reaching Beyond The Perimeter: A Deep Dive into Mimecast’s Email Security 3.0 Strategy
sponsored by Mimecast
WHITE PAPER: Cybercriminals are at the peak of their powers. They’ve developed specialized tools to dig right into the hearts of businesses and leave without a trace. Email is at the center of this, with 60% of all email sent to organizations being spam or malicious. How does your organization plan to defend? Read this white paper for ideas on strategy.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Mimecast

Endpoint Security: A White Paper
sponsored by Orange Business Services
WHITE PAPER: With endpoints under constant threat from phishing, malware, spyware and viruses, IT departments must consider how they are protecting their employees’ devices. Browse this white paper for a look at how to effectively monitor endpoints as well as the challenges involved in choosing, deploying and managing an endpoint monitoring capability.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Orange Business Services

Web Security Technical Deep Dive
sponsored by Mimecast
WHITE PAPER: In this time of uncertainty, cloud and internet-based technologies are under greater threat than ever before. An influx of malware and phishing attacks means that businesses, if not properly protected, are in jeopardy. Read this technical deep dive to learn what you can do to ramp up web security.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Mimecast
1 - 25 of 615 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info