IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security White Papers (View All Report Types)
1 - 25 of 475 Matches Previous Page  |  Next Page
5 Cybersecurity Practices Every K-12 District Should Follow
sponsored by Absolute Software Corporation
WHITE PAPER: Cyberattacks against K-12 schools are on the rise – with valuable information like student names, birth dates, Social Security numbers as the main targets. This white paper highlights 5 cybersecurity practices K-12 districts should follow, read on to get started.
Posted: 05 Oct 2021 | Published: 05 Oct 2021

Absolute Software Corporation

Five Must-Haves for Next-Gen SD-WAN Solutions
sponsored by Juniper Networks
WHITE PAPER: Today, ensuring network security is more challenging than most experts would have predicted. Access this white paper for an overview of the evolution of software-defined wide-area networks (SD-WANs) and discover the 5 must-have features of a next-gen SD-WAN solution.
Posted: 16 Jun 2021 | Published: 16 Jun 2021

Juniper Networks

Five Critical Requirements for Internal Firewalling in the Data Center
sponsored by VMware Intel
WHITE PAPER: This white paper looks at the shocking state of network security and how many organizations could benefit by securing traffic in the data center with a new approach: using a distributed, service-defined internal firewall. Download to learn about VMware NSX’s Service-Defined Firewall and its potential impact on visibility, compliance, and more.
Posted: 04 Jun 2021 | Published: 31 Mar 2021

VMware Intel

Securing the Data Center in Just Four Steps
sponsored by VMware Intel
WHITE PAPER: Appliance-based security has proven incapable of keeping up with securing east-west traffic. But this white paper looks at an alternative approach: a distributed internal firewall. Learn about VMware’s own version of this offering – their Service-defined Firewall – and uncover 4 steps to improving security in the data center.
Posted: 04 Jun 2021 | Published: 31 Mar 2021

VMware Intel

Tanium Insights: It’s Time to Ditch the VPN for Zero Trust
sponsored by Tanium
WHITE PAPER: In this white paper, examine what kick-started the zero-trust movement, why it's completely changed the conversation around network security, how Tanium and its partners' capabilities contribute to a zero-trust solution.
Posted: 13 May 2021 | Published: 13 May 2021

Tanium

Pass-the-Hash and Pass-the-Ticket
sponsored by Verizon
WHITE PAPER: Pass-the-hash and its relative, pass-the-ticket, are attack techniques commonly used by adversaries to compromise enterprise servers after some other attack has created a foothold inside the enterprise. Inside this white paper, learn how Verizon Software Defined Perimeter (SDP) uses multi-factor authentication to mitigate these attacks.
Posted: 12 May 2021 | Published: 12 May 2021

Verizon

New Priorities for IT Operations: Be Ready for Whatever Comes Next
sponsored by Tanium
WHITE PAPER: With remote work operationalized, IT teams can now strategically evaluate recent decisions and determine what needs to be done to update and align processes and infrastructure without additional disruption. How does ITOps get this done? Download this white paper by ESG to discover a pragmatic roadmap to IT sustainability. 
Posted: 13 Apr 2021 | Published: 31 Mar 2021

Tanium

Companies Boost Home/Mobile Remote Access Performance, Scalability and Security with Cato
sponsored by Cato Networks
WHITE PAPER: The COVID-19 pandemic led to the largest global work-at-home experiment in history. Unfortunately, home users often wrestle with the slow performance, latency and unreliability that come with backhauling remote connections to a data center. In this white paper, learn how 3 organizations were able to overcome these challenges with the help of Cato.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

Cato Networks

Comparison and Analysis of Security Aspects of LoRaWAN and NB-IoT
sponsored by Telekom Deutschland GmbH
WHITE PAPER: The two most commonly used LPWA technologies today are NarrowBand IoT (NB-IoT) and Long Range Wide Area Network (LoRaWAN). While more and more IoT use cases use NB-IoT or LoRaWAN technology, security specialists have observed IoT-related attacks increasing sharply for years. In this white paper, take a look at the security of NB-IoT and LoRaWAN.
Posted: 05 Apr 2021 | Published: 05 Apr 2021

Telekom Deutschland GmbH

Getting started with SASE: A guide to secure and streamline your network infrastructure
sponsored by Cloudflare
WHITE PAPER: SASE, or secure access service edge, simplifies traditional network architecture by merging network and security services on one global network. This white paper explores the evolution of network security that led to SASE, outlines the breadth of services included in a SASE solution and offers practical steps to move toward SASE adoption.
Posted: 22 Mar 2021 | Published: 01 Dec 2020

Cloudflare

The iboss cloud Zero Trust Network Access (Z TNA) Private Access Platform architecture
sponsored by iBoss
WHITE PAPER: Organizations deploying and using legacy network security appliances to protect cloud connectivity and internet access are faced with the problem of the disappearing network perimeter. But zero trust network access can ensure fast, compliant and secure connections from anywhere. Download this white paper to explore zero trust in detail.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

iBoss

7 ways to work from anywhere
sponsored by Cloudflare
WHITE PAPER: Today, workforces are drastically more mobile and distributed. Where it was once feasible to draw a perimeter around corporate resources, the rise of SaaS, cloud computing, and remote work has rendered this approach obsolete. In this e-book, learn 7 best practices that can help you protect your global workforce without sacrificing productivity.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Cloudflare

Five Key Steps To Securely Connect Your Remote Workforce
sponsored by Intrado
WHITE PAPER: After the initial scramble to enable employees to stay safe by working from home, companies are now able to take stock of the situation and address any security gaps. In this white paper, uncover 5 key steps to help you create a long-term sustainable plan for secure remote working.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Intrado

4 Key Elements Of An ML-Powered NGFW: How Machine Learning Is Disrupting Network Security
sponsored by Palo Alto Networks
WHITE PAPER: Bad actors and security teams are trading blows when it comes to leveraging automation, with both sides scaling their operations. But as more and more organizations leverage cloud, environments become more complex and more vulnerable. Delve into this white paper to learn how machine learning (ML) can aid in securing your network.
Posted: 17 Mar 2021 | Published: 17 Mar 2021

Palo Alto Networks

Unity Orchestrator Global Enterprise
sponsored by Aruba Networks
WHITE PAPER: If your organization has multiple large-scale SD-WAN deployments, it can be difficult to get visibility into them and, moreover, orchestrate them. Professionals with Silver Peak Unity EdgeConnet SD-WAN fabrics in their stack should read this white paper. It details how you can centrally manage and monitor these SD-WAN deployments.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

Aruba Networks

Secure Sd-Wan For The Cloud-First Enterprise Without Compromise
sponsored by Aruba Networks
WHITE PAPER: As enterprises move to the cloud, security challenges multiply. Examine this white paper to learn how Zscaler and Silver Peak are combining their respective Cloud Security and Unity EdgeConnect SD-WAN platforms to address these challenges. And, see how they’re collaborating to deliver security orchestration for consistent security policies.
Posted: 25 Feb 2021 | Published: 31 May 2019

Aruba Networks

Are Your Branch Sites an Open Door to Cyberattacks?
sponsored by SonicWall
WHITE PAPER: Traditional methods of deploying and maintaining security at branch sites have become ineffective, expensive and unmanageable. But an SD-Branch solution can form a cornerstone for boundless security in distributed enterprise environments. Jump into this white paper to see why the time for SD-Branch is now.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

SonicWall

How Cloud-Driven Network Solutions Meets the Rising Demand of Ecommerce, Distribution, and Supply Chain
sponsored by Extreme Networks
WHITE PAPER: The retail industry faces unprecedented technology challenges when it comes to distribution and the supply chain. As such, implementing the right platforms has never been more critical. Visibility, capacity management and scalability are all paramount. Access this solution brief to see how cloud-delivered networking meets these challenges head-on.
Posted: 01 Feb 2021 | Published: 01 Feb 2021

Extreme Networks

Architecting a Secure Business-Driven SD-WAN
sponsored by Silver Peak
WHITE PAPER: SD-WAN delivers the ability to actively utilize low-cost broadband services. But because broadband services are ‘public’ instead of ‘private,’ advanced security capabilities are required to ensure the confidentiality and integrity of application traffic traversing such connections. Access this white paper to learn about Silver Peak’s secure SD-WAN.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Silver Peak

Making the Shift to a Business-First Networking Model
sponsored by Silver Peak
WHITE PAPER: While the majority of enterprises have moved applications and IT infrastructure to the cloud, many have yet to realize the full promise of the cloud. This is down to your network. The onus is now on network professionals to give their employees the best possible experience. Read this white paper the role of business-driven SD-WAN.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Silver Peak

The 10 Tenets Of An Effective Sase Solution
sponsored by Palo Alto Networks
WHITE PAPER: This e-book guides you through the top 10 requirements to keep in mind as you look for an effective SASE offering. Download it now to learn about Zero Trust network access, quality of service (QoS), DNS security, and threat prevention.
Posted: 07 Jan 2021 | Published: 07 Jan 2021

Palo Alto Networks

5 steps to secure home devices & improve productivity for remote work
sponsored by Barracuda
WHITE PAPER: Due to the pandemic, remote work became an essential part of a modern enterprise. But for remote work and employees to thrive, they need fast and secure access to data. Read on to discover 5 steps organizations can take to further secure their remote workers, without sacrificing productivity.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

Zero Trust Security for Unmanaged Devices
sponsored by Armis
WHITE PAPER: The zero-trust security model has become a mainstay of security approaches. This white paper explores how to apply this security model to the exploding world of unmanaged devices. From webcams, printers, and building automation systems to industrial control systems and critical medical devices, learn about the evolving applications of zero trust.
Posted: 11 Dec 2020 | Published: 11 Dec 2020

Armis

Data Security Predictions 2021
sponsored by Splunk
WHITE PAPER: The pandemic of 2020 created unprecedented challenges for IT security teams and initiatives. This 23-page report provides a closer look at how the Coronavirus has shaped cybersecurity and explores key data security predictions for 2021. Read on to get started.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Splunk

Creating a Culture of Security
sponsored by HelpSystems
WHITE PAPER: You can invest in all the security tools you want, you can provision every security tool correctly and you can eliminate as much risk as possible – but if your organization is not creating a culture of security, you’re nowhere. Enter this white paper and extract 4 steps to cultivating security awareness among your network’s users.
Posted: 03 Dec 2020 | Published: 31 Jul 2020

HelpSystems
1 - 25 of 475 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences