IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security White Papers (View All Report Types)
1 - 25 of 568 Matches Previous Page  |  Next Page
Tanium for Detection and Response: Effectively Address and Remediate Incidents
sponsored by Tanium
WHITE PAPER: Endpoint detection response (EDR) tool effectiveness can be measured by 3 key attributes: the scope of data it provides, its performance and scalability, and its flexibility. In this solution brief, dive deeper into each of the features that distinguish effective EDR tools. Continue reading to learn more.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Tanium

Transforming Cybersecurity Strategy for the Age of IoT
sponsored by Forescout
WHITE PAPER: In a recent study, the Forescout Research Team looks to better understand the current risks and threats by looking at the IoT in a smart building. The report outlines 3 strategies an attacker might use and discusses ways to mitigate them. Read on to dive deeper into the key findings.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Forescout

Connecting Everything and Everyone
sponsored by Nokia
WHITE PAPER: The number of IoT connected devices is increasing and the market opportunities have encouraged many operators to become IoT service providers. However, this transition brings the challenge of connecting and managing these devices. In this white paper, learn how Nokia Impact can help your organization manage every device from a single platform.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Nokia

State of the Firewall
sponsored by FireMon
WHITE PAPER: While firewalls are a critical part of a holistic security approach, enterprises remain challenged by the lack of automation, network security complexity, and lack of overall network visibility. Recently, FireMon conducted research into how organizations are managing security challenges. Read on to uncover the key themes and findings.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

FireMon

Simplify, Strengthen and Unify Your Security with Zero Trust Access
sponsored by PortSys
WHITE PAPER: Given the increasing threats and challenges to IT security, organizations should consider a zero-trust approach for protecting their infrastructure. In this data sheet, uncover the benefits and challenges of incorporating a zero-trust approach and gain insight into the features of Total Access Control’s zero-trust service.Read on to learn more.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

PortSys

Password Management with Hitachi ID Password Manager
sponsored by Hitachi ID
WHITE PAPER: Why do we still use passwords? Despite the prediction of the end of passwords, their cost-effectiveness makes them likely to remain popular. This white paper reviews the benefits of credential and password management, some alternatives, best practices, and a vast array of other topics. Download the report to get started.
Posted: 13 Nov 2019 | Published: 01 Nov 2019

Hitachi ID

Rise of the Machines: Transforming Cybersecurity Strategy for the Age of IoT
sponsored by Forescout
WHITE PAPER: Information technology (IT) & operational technology (OT) were, for a long time, regarded as two distinct areas within an organization. Now these two domains are interconnected, thanks to the Internet of Things (IoT) revolution.But what are these “things”, what do they have to say & are we listening? Read on to learn more.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Forescout

Common and Best Practices for SOCs: Results from the 2019 Survey
sponsored by Siemplify
WHITE PAPER: In the 2019 edition of the SANS Security Operations Center (SOC) Survey, security leaders and professionals provided responses in order to better understand common barriers and best practices, where to focus to enhance security, and what to highlight when requesting additional SOC resources. Download the report to uncover the key results.
Posted: 08 Nov 2019 | Published: 08 Nov 2019

Siemplify

K-12 Education Playbook: Game Day is Every Day When the Network is Involved
sponsored by Extreme Networks
WHITE PAPER: Educational technology is enabling primary and secondary school districts to reshape how students are taught. Therefore, school networks must adapt to support these technologies. In this white paper, learn how Extreme Networks can provide campuses with the elements to create open, software-driven educational networks.
Posted: 08 Nov 2019 | Published: 08 Nov 2019

Extreme Networks

Healthcare Playbook: Game Day is Every Day When the Network is Involved
sponsored by Extreme Networks
WHITE PAPER: It is no longer sufficient for healthcare networks to be fast and reliable; real-time health systems require data and intelligence to achieve proactive situational awareness and clinical efficiency. In this white paper, learn how healthcare providers can improve business agility and clinical operations with an autonomous network.
Posted: 08 Nov 2019 | Published: 08 Nov 2019

Extreme Networks

Deliver a Best-In-Class User Experience
sponsored by Aruba Networks
WHITE PAPER: Today’s technology leaders must oversee a department that supports more customers, remote workers, BYOD policies, and IoT devices. They must also deliver bandwidth-hungry apps that today’s users crave. In this white paper, learn how to deliver on users’ expectation sand boost IT productivity with a next-generation switching portfolio.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Aruba Networks

Transform the Network Operator Experience
sponsored by Aruba Networks
WHITE PAPER: To power digital initiatives, enterprises are adopting technologies like cloud, mobile, and IoT. While these technologies are necessary to propel the business forward, IT leaders are being held back by networks rooted in the past. In this white paper, discover 3 benefits of switching to a modern network.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Aruba Networks

The No-Nonsense Guide to Security Operations Metrics
sponsored by Siemplify
WHITE PAPER: Given that it’s difficult to define & measure success when it comes to cybersecurity, companies must carefully consider the appropriate KPIs to use when setting their security goals. In this guide, learn about how business, operational & improvement metrics can measure the efficacy of your cybersecurity operations program.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Siemplify

Remote Vendor Access: A Growing Attack Vector
sponsored by Cyber-Ark Software
WHITE PAPER: Organizations today rely on 3rd party vendors more than ever. Although these arrangements can provide valuable services, they also bring with them significant security considerations and risk. In this white paper, learn about CyberArk Alero which is designed to provide fast, easy and secure privileged access for remote vendors.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Cyber-Ark Software

The CISO’s Handbook for Certificate Management
sponsored by AppViewX
WHITE PAPER: Certificate-related outages usually stem from persistent cases of mismanagement. Even the simplest of errors have large impacts. However, most events can be circumvented by simply using a certificate management system. In this white paper, uncover 3 steps technology leaders can take to implement certificate management.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

AppViewX

Vormetric Data Security Platform Architecture
sponsored by Thales
WHITE PAPER: As enterprise security teams struggle to defend against more frequent & intricate attacks, data encryption has become a vital safeguard. When it comes to encryption, configuration is a constant trade-off between security & complexity. Read on for an overview of the advantages & limitations of different encryption approaches.
Posted: 06 Nov 2019 | Published: 31 Jul 2019

Thales

Certificate Lifecycle Management and Automation
sponsored by AppViewX
WHITE PAPER: Certificate management is a complex process. Without constant management, certificates are vulnerable to attacks, breaches, & system downtime. This white paper outlines why you should automate the certificate lifecycle, the consequences for not applying it & 5 steps to quickly implement automation in your organization.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

AppViewX

Learnings from The Frontlines: 4 Steps to Protect What Attackers Are Really After
sponsored by Cyber-Ark Software
WHITE PAPER: Forrester estimates that 80% of security breaches involve privileged credentials & it makes sense why: attackers are targeting those who have access to sensitive data & infrastructure. In this guide, discover how to think like an attacker in order to develop a security strategy to protect your critical assets.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Cyber-Ark Software

Organizations Increasing Their Adoption of Network Functions Virtualization
sponsored by Equinix
WHITE PAPER: IT infrastructure has become more complex than ever, especially when it comes to networking and the reality of highly distributed infrastructures. That’s why many enterprises are turning to NFV. This white paper provides insight on the state of NFV adoption and offers a specific approach to optimizing the benefits of the technology.
Posted: 05 Nov 2019 | Published: 04 Nov 2019

Equinix

Border Gateway Protocol: The Roadmap to the Internet
sponsored by AppNeta
WHITE PAPER: Monitoring BGP data gives enterprise IT visibility into the high-level networks and Autonomous Systems that an app may traverse on its path to delivery. In this white paper, learn how AppNeta helps teams put this data to use.
Posted: 05 Nov 2019 | Published: 04 Nov 2019

AppNeta

The Evolution of SD-WAN as a Platform
sponsored by VMware Velocloud
WHITE PAPER: Transformation is already happening in the data centers and now organizations must redefine and transform the WAN. SD-WAN is a new way of building the WAN. In this white paper learn everything you need to know about SD-WAN.
Posted: 04 Nov 2019 | Published: 31 May 2019

VMware Velocloud

Privileged Access Threat Report 2019
sponsored by BeyondTrust Corporation
WHITE PAPER: 2020 is approaching and issues around employee & vendor access are not going away. But it’s possible to improve the visibility of threats & increase the confidence over an IT environment’s security. That’s where Privileged Access Management (PAM) comes into play. View this report for tips on managing insider access, vendor risk & more.
Posted: 04 Nov 2019 | Published: 04 Nov 2019

BeyondTrust Corporation

Get Cloud Ready with SD-WAN
sponsored by VMware Velocloud
WHITE PAPER: As more applications move to the cloud, business users increasingly rely on them to do their jobs. But for IT organizations that are managing remote and branch offices, it can be a challenge to accommodate these needs. In this white paper, learn how SD-WAN can help address the challenges of today’s hybrid cloud environment.
Posted: 04 Nov 2019 | Published: 31 May 2019

VMware Velocloud

Five Steps To A Zero Trust Security Strategy Q&A
sponsored by Ionic Security
WHITE PAPER: Following a recent webcast on the zero-trust approach, Stephanie Balaouras, Vice President, Research Director for Security & Risk at Forrester Research participated in a Q&A with audience members. Review some of Balaouras’ insights on data-centric security strategy approaches.
Posted: 01 Nov 2019 | Published: 01 Nov 2019

Ionic Security

The 5 Business Advantages of SD-WAN
sponsored by Fortinet, Inc.
WHITE PAPER: Traditional network architectures aren’t built to handle the workloads and complexities of most digital transformation initiatives. Therefore, many network operations teams are turning to SD-WAN. In this white paper, discover 5 ways SD-WAN technology can boost your bottom line – without IT headaches.
Posted: 01 Nov 2019 | Published: 16 Aug 2019

Fortinet, Inc.
1 - 25 of 568 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement