IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by, powered by an online computer dictionary
Network Security White Papers (View All Report Types)
1 - 25 of 824 Matches Previous Page  |  Next Page
5 Security Questions That Tell All
sponsored by ConvergeOne
WHITE PAPER: How are measuring the success of your cybersecurity approach? Utilize this resource to help assess the foundational elements of your cyber risk management program with 5 key questions.
Posted: 19 Mar 2018 | Published: 19 Mar 2018


Accelerating to Network Agility
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover how to build a network that enhances business agility and powers digital transformation initiatives.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

Juniper Networks, Inc.

DDoS Response Playbook
sponsored by Imperva
WHITE PAPER: DDoS attacks have become a fact of life for any business with a web presence. This guide reveals how to plan and execute a DDoS response plan and outlines pragmatic steps and best practices for choosing and setting up the right mitigation strategy for your organization.
Posted: 15 Mar 2018 | Published: 15 Mar 2018


IP Networking Comparison Guide for the Transformational Enterprise
sponsored by Juniper Networks, Inc.
WHITE PAPER: This IDG Research guide compares IP networking solutions from Juniper, Cisco, Extreme (Brocade), Arista, and HP. Learn about the 4 key areas driving enterprise network priorities, the capabilities necessary to drive digital transformation, and how each vendor stacks up.
Posted: 14 Mar 2018 | Published: 14 Mar 2018

Juniper Networks, Inc.

Enterprise Organizations Need a Closed-loop Security Architecture
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Find out how a "closed-loop" network security strategy can help increase real-time network visibility, tighten access controls and enhance advanced attack detection so your enterprise can move forward with your digital transformation initiatives.
Posted: 13 Mar 2018 | Published: 31 Jan 2018

Hewlett Packard Enterprise

3 Methods for Multi-Fiber Testing
sponsored by Leviton
WHITE PAPER: Multi-fiber installation and testing best practices will be critical to maintaining a competitive edge as network migration strategies evolve. In this white paper, learn 3 types of multi-fiber testing to prepare your network for facilitating 40/100G migrations.
Posted: 12 Mar 2018 | Published: 12 Mar 2018


Threat Visibility and the Zero-Trust Virtual Data Center
sponsored by McAfee, Inc.
WHITE PAPER: Explore how a network security platform can help make zero-trust networking supremely practical, prevent intrusions, and detect targeted threats.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

McAfee, Inc.

Mitigating the SSL/TLS Cybersecurity Threat
sponsored by Radware
WHITE PAPER: 75% of web traffic will be encrypted by 2019, according to NSS Labs. Utilize this e-book to learn how to combat the growing number of complex encrypted web attacks as well as mitigate SSL/TLS cybersecurity threats.
Posted: 09 Mar 2018 | Published: 09 Mar 2018


How to Successfully Monitor and Manage Network Traffic in VMware Environments
sponsored by APCON, Inc.
WHITE PAPER: Today, virtualization has created a challenge for maintaining network monitoring capabilities. This white paper introduces how packet brokers can help analyze traffic from multiple network links and then deliver relevant data to your already existing network security platforms.
Posted: 09 Mar 2018 | Published: 09 Mar 2018


The Honeypot Project
sponsored by Armor
WHITE PAPER: As the cloud gains momentum, protecting sensitive data no longer means simply safeguarding on-premises infrastructure. Take a look at this resource to uncover the results from a real-world demonstration that shows the types of attacks targeting public cloud environments for small and midsized businesses.
Posted: 09 Mar 2018 | Published: 09 Mar 2018


How to Get a Digital Advantage with a Better Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Learn how to build a strong network infrastructure to help you complete your organization's digital transformation initiatives.
Posted: 08 Mar 2018 | Published: 08 Mar 2018

Juniper Networks, Inc.

The Future of Cyber Security
sponsored by Oracle
WHITE PAPER: Inside this 11-page white paper, discover how to protect against increasingly sophisticated attacks with artificial intelligence (AI) and machine learning (ML). Learn how these algorithms can help monitor who has access to what resources and encrypt sensitive data.
Posted: 07 Mar 2018 | Published: 07 Mar 2018


Safeguarding your Network from Insider Threats
sponsored by APCON, Inc.
WHITE PAPER: Inside, discover how network monitoring is the key player in today's network security strategy for protection against 2 types of insider threats – the bad actor and the negligent employee.
Posted: 07 Mar 2018 | Published: 07 Mar 2018


Top 9 DDoS Threats Your Organization Must be Prepared For
sponsored by Radware
WHITE PAPER: Use this resource to gain a better understanding of the top 9 DDoS threats your organization should prepare for.
Posted: 07 Mar 2018 | Published: 07 Mar 2018


How a Cloud Phone System Uniquely Supports your Mobile Workforce
sponsored by RingCentral
WHITE PAPER: Inside this white paper, gain valuable insights into how a cloud VoIP phone system provides the capabilities necessary to make the mobile worker an integral part of your business and overcome the challenges of BYOD.
Posted: 07 Mar 2018 | Published: 07 Mar 2018


Human to Machines: The Shift in Security Strategy with Machine Learning
sponsored by Oracle
WHITE PAPER: Today's IT security strategy must evolve to focus on internal threats and securing what matters like customer data, financial data and business-critical applications. In this white paper, gain valuable insights into how machine learning brings a new level of sophistication to cybersecurity threat prediction, prevention, detection and response.
Posted: 07 Mar 2018 | Published: 07 Mar 2018


Is Compliance Being Left to Chance?
sponsored by Oracle
WHITE PAPER: Tap into this resource to learn how cloud and AI technologies may hold the key to managing compliance and security in a clear, consistent, and efficient way.
Posted: 06 Mar 2018 | Published: 06 Mar 2018


Adaptive Security: Changing Threats Require a New Protection Paradigm
sponsored by Radware
WHITE PAPER: As a result of the blurring lines which traditionally delineated the network perimeter, a new approach to vulnerability management is needed; an adaptive approach. In this white paper learn the 2 prerequisites for modern network security success, as well as the 3 building blocks for adaptive security.
Posted: 06 Mar 2018 | Published: 31 Dec 2017


A Guide to Securing Cloud Platforms
sponsored by IBM
WHITE PAPER: Organizations transitioning to the cloud or planning hybrid cloud app deployments must supplement traditional perimeter-based network security with protection for cloud-based workloads.Utilize this guide as an approach to effectively securing cloud platforms.
Posted: 01 Mar 2018 | Published: 01 Mar 2018


The Confidence Crisis: Protecting Applications Against Data Theft and Bot Attacks
sponsored by Radware
WHITE PAPER: 68% of retailers lack certainty they could secure credit card data during peak demand periods, according to the National Retail Federation. Take a look at this report to gain insight into protecting applications against data theft and bot attacks targeting various industries.
Posted: 27 Feb 2018 | Published: 27 Feb 2018


The Truth About Cloud Contact Center Security
sponsored by West UC
WHITE PAPER: For the modern contact center, security is still the biggest barrier to adoption of a cloud-based strategy. To ease your concerns, this white paper debunks 5 common network security myths and helps you build a secure cloud contact center.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

West UC

Telecom Providers: Improve your Subscribers' Experience
sponsored by Vitria Technology, Inc.
WHITE PAPER: To help improve customer experience, learn how telecom providers can reduce the time from the start of service incidents to issue resolution by accelerating each phase of the incident lifecycle using an effective analytics strategy.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Vitria Technology, Inc.

The CIO's Guide to SD-WAN
sponsored by Sprint
WHITE PAPER: With the widespread adoption of cloud-based applications, mobile solutions, IoT and big data, IT leaders are looking to evolve their networks. This resource offers CIO's a guide to SD-WAN to aid in evolving networks, while improving security, scalability and flexibility.
Posted: 23 Feb 2018 | Published: 23 Feb 2018


A Quick History of IoT Botnets
sponsored by Radware
WHITE PAPER: Gartner estimates that there will be 20 billion connected devices by 2020. Access this resource to learn about the history of IoT botnets and how the rise of connected devices can bring upon the rise of dangerous bot attacks.
Posted: 22 Feb 2018 | Published: 22 Feb 2018


Evolving Threat of Botnets, Web Scraping and IoT Zombies
sponsored by Radware
WHITE PAPER: By 2020, the number of IoT units installed could reach as many as 20 billion, according to Gartner. This resource examines the severity of dangerous bots, which exploit IoT devices as weapons of attack.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

1 - 25 of 824 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement