IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security White Papers (View All Report Types)
1 - 25 of 515 Matches Previous Page  |  Next Page
The Evolution of Network Access Control
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn why security architects should reevaluate network access controls to protect endpoints, users, and the broader organization from the potentially disastrous effects of a device-borne breach.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

TOPICS: 
Fortinet, Inc.

Four Easy Ways Central Logging Improves Security Posture
sponsored by Splunk Services UK Ltd
WHITE PAPER: Cybersecurity tools send alerts to help identify malicious activity, but the burden remains with the organization to figure out whether that alert is meaningful and if and how it fits into a larger chain of malicious activity. In this white paper, explore 4 basic data sources that you can leverage for immediate visibility of security activities.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

TOPICS: 
Splunk Services UK Ltd

Cisco Ransomware Defense: Keep Ransomware at Bay
sponsored by Cisco Umbrella
WHITE PAPER: Files and information are the lifeblood of an organization. Keeping this information secure is nonnegotiable. Without the appropriate defenses, ransomware can inflict enough damage to reduce an organization to operating with pen and paper. In this white paper, learn the benefits of Cisco Ransomware Defense.
Posted: 19 Feb 2019 | Published: 31 Oct 2017

TOPICS: 
Cisco Umbrella

TLS 1.3: Are you Ready?
sponsored by F5 Networks
WHITE PAPER: Learn about a product designed to provide high-performance decryption of inbound and outbound SSL/TLS traffic, enabling security inspection to expose threats and stop attacks.
Posted: 15 Feb 2019 | Published: 31 Dec 2018

TOPICS: 
F5 Networks

Increase the ROI of Inspection Technologies
sponsored by F5 Networks
WHITE PAPER: Security inspection tools are increasingly blind to SSL/TLS traffic. In this white paper, learn how F5 SSL Orchestrator can help your organization by intelligently managing the flow of encrypted traffic across your security chain.
Posted: 15 Feb 2019 | Published: 31 Dec 2018

TOPICS: 
F5 Networks

5 Things You Need to Know about a Web Application Firewall
sponsored by Neustar
WHITE PAPER: Web Application Firewall (WAF) is a priority item for IT professionals who are struggling to protect their customer-facing and mission-critical applications. WAFs detect and protect web applications from attacks that try to exploit vulnerabilities. In this white paper, learn 5 things you need to know before buying a WAF.
Posted: 14 Feb 2019 | Published: 13 Apr 2018

TOPICS: 
Neustar

Securing Web Applications in Container-Based Environments
sponsored by Fortinet, Inc.
WHITE PAPER: A lack of dynamic security capabilities that can keep pace with the ever-changing nature of DevOps environments leaves organizations exposed to risks. In this white paper, learn about Fortinet's WAF that is designed to protect web-based applications and internet-facing data from threats within container-based environments.
Posted: 14 Feb 2019 | Published: 17 Nov 2018

TOPICS: 
Fortinet, Inc.

Neustar Security Solutions Overview
sponsored by Neustar
WHITE PAPER: Learn about Neustar and their approach to DNS and security. Tap into this resource to find out how you can maintain network performance while tightening security for key areas, like DDoS protection and identity assurance.
Posted: 13 Feb 2019 | Published: 15 Jan 2018

TOPICS: 
Neustar

IP Intelligence Improves Company Efficiency, Customer Experience, and Security
sponsored by Neustar
WHITE PAPER: Successful brands are the ones that identify and connect with their customers – and that's why IP Intelligence (IPI) is so critical. IPI helps companies sort out the good actors from the bad, improving the customer experience while keeping security systems safe. In this white paper, learn how different companies have implemented Neustar's IPI.
Posted: 13 Feb 2019 | Published: 19 Jul 2017

TOPICS: 
Neustar

Accelerating Security Response
sponsored by ServiceNow
WHITE PAPER: Financial institutions have long been leaders in information security, spending a significant amount of their IT budgets on safeguarding their companies. While they have always been working on reducing threats, new challenges continue to emerge. In this white paper, learn about some of the new challenges financial institutions are facing.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
ServiceNow

Network Security that's Built Right In
sponsored by 128 Technology
WHITE PAPER: Learn about a zero trust security model that's designed to help businesses mitigate the risk of cyberattacks by enabling granular network segmentation, policy-based inter-router traffic encryption, fully distributed firewall protection, and more.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
128 Technology

9 Key Questions to Ask When Selecting an Incident Response Service Provider
sponsored by Dell SecureWorks
WHITE PAPER: Many people associate the term "incident response" with recovery efforts following a major security breach. However, effective incident response is not just reactive, nor is it confined to major incidents. In this white paper, learn how an incident response provider can assist you with a range of prevention, detection, and response activities.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
Dell SecureWorks

Network Security & Performance: Mastering a Multi-Cloud Approach
sponsored by 128 Technology
WHITE PAPER: Learn about 128T's Session Smart Routers and find out how you can operate more efficiently in hybrid and multi-cloud environments by improving network security without hampering app performance.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
128 Technology

How Blockchain Transforms Data Security
sponsored by ALTR
WHITE PAPER: The blockchain design pattern is not just about supporting digital currencies or rethinking every human system of trust. Its basic security-related characteristics have the potential to stem today's overwhelming tide of data breaches. In this white paper, learn more about blockchain and how it can help your organization protect sensitive data.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
ALTR

Nine Best Practices for Active Directory Security
sponsored by Quest
WHITE PAPER: It is often assumed that threats come from outside an organization. However, a lapse in internal security is often what enabled an attack to succeed. In this white paper, explore how a typical insider threat unfolds. The white paper also details 9 critical security best practices that minimize the risk of an internal threat.
Posted: 06 Feb 2019 | Published: 06 Feb 2019

TOPICS: 
Quest

DIY is DOA: Cybersecurity Moves Toward Hybrid Models
sponsored by Dell SecureWorks
WHITE PAPER: Information security always was complex and challenging. But the rise of cloud and mobile organizations has multiplied that challenge. However, information security services providers (ISSPs) can help organizations by empowering their internal resources. In this white paper, explore how using ISSPs can leverage an organization's operations.
Posted: 06 Feb 2019 | Published: 06 Feb 2019

TOPICS: 
Dell SecureWorks

Rethinking Data Security
sponsored by Forcepoint
WHITE PAPER: The traditional network security perimeter has dissolved, primarily because of the rise of mobile employees and the adoption of cloud services. The result of this is overwhelmed security teams. In this white paper, learn how Forcepoint's Dynamic Data Protection helps organizations solve the fundamental challenges of traditional DLP deployments.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

TOPICS: 
Forcepoint

Endpoint Security: 7 Things you Should Pay Attention to Now
sponsored by Freudenberg IT
WHITE PAPER: Outdated browsers, network protocol vulnerabilities, untrained users – these days, malware has lots of entry points. While hackers are becoming more professional, most companies are inadequately positioned when it comes to device security. In this white paper, learn 7 things you should pay attention to in order to secure your organization.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

TOPICS: 
Freudenberg IT

Why and How to Block Security Breaches at the Endpoint
sponsored by Freudenberg IT
WHITE PAPER: Most companies understand the need to defend the enterprise against malware, but some technologies can't provide sufficient protection. Organizations can put the right security tools in place and partner with an MSP to provide missing expertise and oversight. In this white paper, learn 7 best practices to consider when selecting an MSP.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

TOPICS: 
Freudenberg IT

Eliminating the Blind Spot
sponsored by Dell SecureWorks
WHITE PAPER: Today, enterprises must obtain end-to-end visibility, detection and response capabilities required to quickly remediate breaches. In this white paper, learn how unifying advanced detection technologies for the network and endpoint with the right intelligence, people and processes can empower a security team.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

TOPICS: 
Dell SecureWorks

How to Migrate the Insider Threat
sponsored by Quest
WHITE PAPER: More and more IT pros are getting wise to the true nature of the insider threat. They understand that the insider threat is much more than a disgruntled admin sabotaging systems or stealing data. This white paper explains how organizations can up their game. It details 3 key best practices that will help you mitigate the insider threat.
Posted: 04 Feb 2019 | Published: 04 Feb 2019

TOPICS: 
Quest

Missing Critical Patches: A Cybersecurity Epidemic
sponsored by Tanium
WHITE PAPER: IT security leaders agree that following best practices is instrumental in reducing cyber incidents. However, most organizations need to improve their best practices to stay secure. In this white paper, review key findings from a Frost & Sullivan survey. Also discover 5 recommended action items to help address common endpoint security issues.
Posted: 04 Feb 2019 | Published: 31 Dec 2017

TOPICS: 
Tanium

Security with Dropbox Business
sponsored by Dropbox
WHITE PAPER: User-friendly tools provide IT with a unique opportunity to centralize data onto a sanctioned platform. Dropbox has approached this by becoming a popular tool for productivity. In this white paper, learn how they pair the benefits of widespread adoption with the controls and certifications IT needs to protect employees and their data.
Posted: 30 Jan 2019 | Published: 30 Jan 2019

TOPICS: 
Dropbox

Endpoint Security Buyer's Guide: Protect, Detect, Respond
sponsored by Tanium
WHITE PAPER: Today, virtually every organization connected to the Internet is attacked at its endpoints, and the most significant cybersecurity attacks involve at least one compromised endpoint. In this white paper, learn about the 4 main areas of endpoint security, why they are important and the essential capabilities of each.
Posted: 30 Jan 2019 | Published: 30 Jan 2019

TOPICS: 
Tanium

Managed Detection and Response (MDR): An overview of 24/7 alert monitoring and threat hunting services
sponsored by Trend Micro, Inc.
WHITE PAPER: Organisations are facing stealthy threat actors who are employing techniques designed to bypass existing security measures. Enterprises have to be aware of the ways in which their organisation might be targeted. In this white paper, learn about how a Managed Detection and Response service can help your organisation.
Posted: 30 Jan 2019 | Published: 30 Nov 2018

TOPICS: 
Trend Micro, Inc.
1 - 25 of 515 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement