IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security White Papers (View All Report Types)
1 - 25 of 544 Matches Previous Page  |  Next Page
How To Improve Guest Experience and Hotel Staff Productivity With Unified Communications
sponsored by Spectrum Enterprise
WHITE PAPER: To enable a connected workforce, many hotels still rely on legacy technology, using two-way radios. Unfortunately, these devices are not secure and are often unreliable. In this white paper, learn how to improve communication and collaboration among hotel staff to increase efficiency in addressing guest and operation issues.
Posted: 24 May 2019 | Published: 24 May 2019

Spectrum Enterprise

Digital Transformation Executive Report
sponsored by Dell SecureWorks
WHITE PAPER: Businesses are more dependent on technology than ever before. While digital transformation brings about opportunity, it also introduces large amounts of risk. In this white paper, learn how organizations can create a decentralized security partnership approach between security, IT and citizen developers.
Posted: 23 May 2019 | Published: 23 May 2019

Dell SecureWorks

8 Essential Elements of a Comprehensive IT Security Strategy
sponsored by Involta
WHITE PAPER: IT security measures should be at the forefront of every business owner's mind. Improving cybersecurity to prevent data loss and protect critical business and financial data is essential. In this white paper, explore 8 elements that play an important role in developing and maintaining secure IT environments.
Posted: 21 May 2019 | Published: 21 May 2019

Involta

Shake the Box: How to Get Encrypted Traffic Insights Without Decryption
sponsored by Corelight
WHITE PAPER: The most advanced security teams rely on network traffic as a fundamental data source for security investigations, but encryption has made that increasingly difficult. In this white paper, learn how the open-source Zeek framework (formerly called 'Bro') was purpose-built for network security monitoring.
Posted: 21 May 2019 | Published: 21 May 2019

Corelight

Firewall Cleanup Recommendations
sponsored by FireMon
WHITE PAPER: In this white paper, learn about specialized tools and features that can help clean up enterprise-wide firewalls efficiently and thoroughly.
Posted: 21 May 2019 | Published: 21 May 2019

FireMon

Turbocharge ITOps Productivity for Security and Efficiency
sponsored by BMC
WHITE PAPER: It's simply not possible to address the security risks and management challenges posed by today's infrastructures using manual methods. Operations and security teams need automation—and they need it badly. In this white paper, learn how to empower your team with integrated automation.
Posted: 15 May 2019 | Published: 15 May 2019

BMC

DDoS Attack Mitigation in the Cloud Age
sponsored by Nokia
WHITE PAPER: DDoS attack methods are constantly evolving, and network operators must similarly adapt and evolve their arsenal of defensive measures to keep their customers, content and infrastructure safe. Find out how Nokia can help you do that in this white paper.
Posted: 14 May 2019 | Published: 14 May 2019

Nokia

Exploring the Gray Space of Cybersecurity with Insights from Cognitive Science
sponsored by Forcepoint
WHITE PAPER: Cybersecurity is traditionally very good at identifying activities that are black or white—either obviously bad or clearly good. But there is a wide "gray space" between black and white, full of activities that are less clear. In this white paper, learn how to determine the best course of action in ambiguous scenarios.
Posted: 14 May 2019 | Published: 14 May 2019

Forcepoint

Why CASB Alone Isn't Enough
sponsored by Open Systems Technologies
WHITE PAPER: Download this white paper to learn about the benefits of a complete web protection platform and why a CASB is no longer enough.
Posted: 13 May 2019 | Published: 13 May 2019


Five Myths of Network Security in a Hybrid Infrastructure
sponsored by Trend Micro, Inc.
WHITE PAPER: Not surprisingly, the transition to a hybrid infrastructure is creating confusion among both security professionals and vendors regarding where security controls should be deployed. In this white paper, explore 5 myths about the need for traditional network security in a hybrid infrastructure.
Posted: 13 May 2019 | Published: 31 Mar 2019

Trend Micro, Inc.

Beginner's Guide to Open Source Intrusion Detection Tools
sponsored by AT&T Cybersecurity
WHITE PAPER: Threat and intrusion detection have become a top priority in cybersecurity, making it more important than ever. If you aren't already running an intrusion detection system (IDS) in your network, you should start now. In this white paper, explore different IDS tools to determine which would be the best fit for your organization.
Posted: 10 May 2019 | Published: 10 May 2019

AT&T Cybersecurity

Safeguard your devices against ransomware with Log360
sponsored by ManageEngine
WHITE PAPER: Network attack mechanisms continue to evolve on a daily basis. Of the network attacks that aim to steal or compromise data in some way, ransomware attacks have gained significance in recent times. In this white paper, learn how to properly implement and utilize SIEM as a defense against ransomware.
Posted: 10 May 2019 | Published: 10 May 2019

ManageEngine

The Future Mode of DDoS Attack Mitigation
sponsored by Nokia
WHITE PAPER: Download this white paper to learn about a new tool designed to protect your network from DDoS attacks no matter what, and find out how leveraging peering routers equipped with Nokia's FP4 routing silicon helps mitigate volumetric attacks.
Posted: 10 May 2019 | Published: 10 May 2019

Nokia

The Basics of Auditing and Securing Your Network Perimeter with SIEM
sponsored by ManageEngine
WHITE PAPER: To thwart network attacks, you first need to be on top of critical security events occurring in your network. But due to the high volume of events, auditing these events in real time can be challenging, if not impossible. In this white paper, learn about the basics of auditing and securing your network perimeter by leveraging SIEM.
Posted: 10 May 2019 | Published: 10 May 2019

ManageEngine

Using SD-WAN to Enhance your Security Posture
sponsored by Open Systems Technologies
WHITE PAPER: The use of SD-WAN is dramatically increasing, and in many cases, it is a means of reducing network complexity that can create vulnerabilities. However, SD-WAN is just the starting point for reducing risk. Download this white paper to learn more about the benefits of secure SD-WAN today.
Posted: 09 May 2019 | Published: 09 May 2019


Direct Internet Access (DIA): Rethinking WAN for the Cloud Era
sponsored by AppNeta
WHITE PAPER: This white paper examines Direct Internet Access (DIA) as a fast, secure alternative to MPLS that pairs well with SD-WAN deployments. Learn about the pivotal considerations that come into play when deciding to move forward with DIA so that you can maintain network security and performance.
Posted: 09 May 2019 | Published: 09 May 2019

AppNeta

Maximizing SOC Effectiveness and Efficiency with Integrated Operations and Defense
sponsored by NetScout Systems, Inc.
WHITE PAPER: The most successful security programs are rarely the ones with the largest security budgets or staffs. The effectiveness of security operations increases by leveraging existing resources in more productive ways. In this white paper, explore leverage areas for assuring SOC success while taking advantage of integration opportunities.
Posted: 09 May 2019 | Published: 09 May 2019

NetScout Systems, Inc.

Secure SD-WAN: Helping CIOs Meet their Goals
sponsored by Open Systems Technologies
WHITE PAPER: A recent study shows that 85% of organizations are considering implementing SD-WAN, but moving too fast to deploy can invite unwanted risks so it's best to move ahead a clear plan in place. In this white paper, find out what CEOs and boards are talking about with CIOs when it comes to their most pressing concerns for getting SD-WAN-ready.
Posted: 08 May 2019 | Published: 08 May 2019


Armor Dynamic Threat Blocking (DTB)
sponsored by Armor
WHITE PAPER: Organizations are under constant threat from a barrage of scans and attacks delivered across IP traffic. In this white paper, learn how Armor's Dynamic Threat Block (DTB) is designed to allow security teams to assess and automatically block both incoming and outgoing malicious IP traffic at any layer of their security stack.
Posted: 08 May 2019 | Published: 08 May 2019

Armor

DNS Monitoring and What it Means for the Enterprise
sponsored by AppNeta
WHITE PAPER: DNS is part of your network's backbone, and as a result, it's inherently tied to your network's performance, its security, and – ultimately – the user experience that it delivers. Find out how you can effectively monitor DNS performance across all of your locations so that you can identify and resolve issues before they negatively impact end users.
Posted: 08 May 2019 | Published: 08 May 2019

AppNeta

How to Secure Your Post-Perimeter World
sponsored by Lookout
WHITE PAPER: As employees continue to use a mix of managed and unmanaged devices to access corporate resources, it sets up the need for a new security architecture: post-perimeter security. In this white paper, learn why the world is moving to post-perimeter security, what you need, and how to make it happen.
Posted: 06 May 2019 | Published: 06 May 2019

Lookout

What is Lurking on Your Network
sponsored by Infoblox
WHITE PAPER: The huge number of shadow personal devices and IoT devices on enterprise networks presents a massive challenge to IT teams—and security professionals in particular. Find out how you can protect your network and devices from common attacks in this white paper.
Posted: 02 May 2019 | Published: 02 May 2019

Infoblox

Malicious Cryptominers are Eyeing Your Resources.
sponsored by Cisco Umbrella
WHITE PAPER: Malicious cryptominers tap into an organization's computing power in order to create cryptocurrencies and generate profit for themselves. If your organization is protected, it can cost you in many ways. In this white paper, learn how to protect your organization using Cisco Umbrella as your first line of defense.
Posted: 02 May 2019 | Published: 02 May 2019

Cisco Umbrella

Protect Your Organization From Unwanted Cryptomining
sponsored by Cisco Umbrella
WHITE PAPER: Malicious cryptomining is a browser or software-based threat that enables bad actors to secretly use a business' computing power to mine digital currency. Bad actors are drawn to cryptomining because it's an easy and anonymous way for them to generate cash. In this white paper, learn how to protect your organization from cryptomining.
Posted: 02 May 2019 | Published: 02 May 2019

Cisco Umbrella

Security Operations Center: Build It Or Buy It
sponsored by Armor
WHITE PAPER: Organizations have come to realize the only way to protect their networks around the clock is with a security operations center (SOC). This white paper can help you decide whether to build or buy a SOC by exploring the staffing, technology, and costs required to operate a successful SOC.
Posted: 02 May 2019 | Published: 30 Nov 2018

Armor
1 - 25 of 544 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement