IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security White Papers (View All Report Types)
1 - 25 of 541 Matches Previous Page  |  Next Page
Assessing the Strengths and Weaknesses of SD-WAN Technology
sponsored by Cato Networks
WHITE PAPER: SD-WAN is a complex area and a recent Gartner report explains how to sift through that complexity by identifying the technology’s architectural component, typical deployments models, and key evaluation criteria. In this white paper, learn how Cato addresses these points.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Cato Networks

10 Things to Look for When Troubleshooting Slow Network Performance
sponsored by Accedian
WHITE PAPER: If you communicate, collaborate, and do business on the web, you’ve probably experienced your network come to a grinding halt, freezing, or moving at a snail’s pace. In this white paper, uncover 10 things you should look for when managing and monitoring your network to help minimize or eliminate the effects of network issues.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Accedian

The Network for the Digital Business Starts with the Secure Access Service Edge (SASE)
sponsored by Cato Networks
WHITE PAPER: Networking and security are slowing down businesses as silos, built decades ago, are stretched and patched to accommodate emerging business requirements. In this white paper, learn how networking and security can become part of the IT platform for the digital business with a single cloud-based service: Secure Access Service Edge (SASE).
Posted: 02 Apr 2020 | Published: 02 Apr 2020

Cato Networks

The Hard Truth About Winning Against Cyber Threats
sponsored by Dell SecureWorks
WHITE PAPER: When developing security strategies, today’s organizations make the mistake of being overly reliant on specific tools and technologies rather than focusing on hygiene and culture. This white paper overviews key characteristics of a hygienic security approach, and highlights 5 focus areas for developing a security strategy.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Dell SecureWorks

Cisco Software-Defined WAN for Secure Networks
sponsored by Cisco Systems, Inc.
WHITE PAPER: Many organizations are moving their network infrastructure and applications to the cloud. This trend is placing increasing demands on WAN service delivery. The WAN must shift from playing a supporting role in the network to being a provider of innovation. In this white paper, learn how Cisco SD-WAN can help.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Cisco Systems, Inc.

Intent-Based Networking at a Glance
sponsored by Cisco Systems, Inc.
WHITE PAPER: IT professionals need to bridge the gap between what your business needs and what your network delivers in terms of scalability, operational effectiveness, and security. In this brief, learn how your IT teams can meet these challenges by adopting an intent-based approach across each network domain.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Cisco Systems, Inc.

InfoSec Pros Should Do These 8 Things During the Coronavirus Outbreak
sponsored by CI Security
WHITE PAPER: With coronavirus, more organizations are changing the way they operate. More people are working remotely than ever before, which leads to new and interesting challenges for information security professionals. Download this white paper for 8 steps InfoSec pros should take now.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

CI Security

Guide to Zero Trust for Financial Services Organizations
sponsored by Gigamon
WHITE PAPER: Traditional security and implicit trust are no longer viable for financial institutions. Security teams are under pressure to provide adequate security that meets compliance requirements and customer needs. In this white paper, learn about zero-trust and see why top industry executives are adopting this approach. Read on to learn more.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

Gigamon

Guide to Zero Trust for Healthcare Organizations
sponsored by Gigamon
WHITE PAPER: Healthcare organizations can no longer implicitly trust the users, devices and applications on their networks. This is the concept behind the move towards Zero Trust. In this guide, learn how healthcare organizations can design and implement Zero Trust architectures around the key concepts of network and data visibility.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

Gigamon

What Makes A Standalone IPS So Effective?
sponsored by Trend Micro
WHITE PAPER: In this white paper, explore the guiding principles security researchers need to follow when designing and developing effective vulnerability filters, with examples of how these filters can be used by an IPS to detect and block the latest threats.
Posted: 12 Mar 2020 | Published: 01 Oct 2019

Trend Micro

MPLS, SD-WAN, Internet, and SASE
sponsored by Cato Networks
WHITE PAPER: The WAN is the backbone of the business. It ties together your remote locations, headquarters and data centers into an integrated network. Yet, the role of the WAN has evolved in recent years. In this white paper, learn about the connectivity, optimization and security options that are needed when building a network for the digital business.
Posted: 10 Mar 2020 | Published: 10 Mar 2020

Cato Networks

Why is Cloud-Native SD-WAN Considered a Top Choice Among IPVPN Alternatives?
sponsored by Cato Networks
WHITE PAPER: While IPVPN can address select small-scale WAN use cases, it simply isn’t designed to meet the demands of the modern digital business. By taking a converged, scalable, and secure approach to WAN connectivity, cloud-native SD-WAN serves as the ideal IPVPN alternative. Download this white paper to learn more.
Posted: 10 Mar 2020 | Published: 10 Mar 2020

Cato Networks

SASE Since Birth!
sponsored by 128 Technology
WHITE PAPER: In its 2019 Hype Cycle for Enterprise Networking report, Gartner defines SASE (secure access service edge) as an emerging market that combines elements of SD-WAN and network security into a single cloud-managed package. In this white paper, learn how 128 Technology has been SASE since birth.
Posted: 10 Mar 2020 | Published: 10 Mar 2020

128 Technology

How the Cloud Simplifies Network Security
sponsored by Cisco Umbrella
WHITE PAPER: Many enterprises have seen their digital transformation efforts hindered by their legacy network architectures and cybersecurity models rooted in the past. In this white paper, learn how SASE can help organizations by converging network services with security services into a cloud-based service that connects and secures any enterprise resource.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Cisco Umbrella

Transforming Enterprise Access Network to Software Defined
sponsored by Wipro
WHITE PAPER: The dynamics of user traffic are changing, especially with more IoT devices coming into the access network, along with content-heavy social media, voice, video and data, which puts a lot of stress on the access network. In this blog, learn how Software Defined Access (SDA) can help ensure faster, more secure network access for users.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Wipro

Understanding Zero Trust Security
sponsored by Atlassian
WHITE PAPER: Inside this white paper, find the current state of workplace security, the basic principles of the Zero-Trust security model, and how you can begin your journey towards a Zero Trust-secure workplace environment.
Posted: 28 Feb 2020 | Published: 28 Feb 2020

Atlassian

Why Behavior-Based Network Traffic Analysis (NTA) Matters
sponsored by IronNet
WHITE PAPER: Today’s security executives are looking to shore up their defenses with a more proactive approach — one that can signal unknown threats steps ahead of the impact. Behavioral analytics adds that level of sophistication to network traffic analysis (NTA). Learn how NTA can elevate your threat detection strategy overall.
Posted: 25 Feb 2020 | Published: 25 Feb 2020

IronNet

The Top Automated Bot Threats to Applications and How to Stop Them
sponsored by Radware
WHITE PAPER: Today, malicious bots compromise of 26% of total internet traffic. Bots scour the internet, and bypass traditional security methods in order to attack online businesses. So, how can your organization be better equipped to handle this threat? Download this white paper to uncover the top threat tactics & how to mitigate them.
Posted: 25 Feb 2020 | Published: 25 Feb 2020

Radware

Ready, Set, SD-WAN
sponsored by Riverbed
WHITE PAPER: Like many enterprises, you may be looking to SD-WAN to meet your insatiable need for bandwidth and to lower your network costs. However, before rolling out SD-WAN, there a few things you need to consider. In this white paper, explore 4 tips to help your enterprise get the most value from your investment in SD-WAN.
Posted: 25 Feb 2020 | Published: 25 Feb 2020

Riverbed

Securing the Human Perimeter with Natural Language Understanding
sponsored by Armorblox
WHITE PAPER: The traditional notion of what constitutes a perimeter is disappearing, user behavior is evolving, and organizations are incorporating mobile workforces and remote devices. Applying adequate security today requires a change in mindset to focus on the human perimeter. Download this white paper to learn more.
Posted: 21 Feb 2020 | Published: 31 May 2019

Armorblox

Guide to Zero Trust for Federal Agencies
sponsored by Gigamon
WHITE PAPER: Cyberattacks targeting federal agencies are growing in both volume and complexity, and existing tactics are unable to protect these networks. To meet rising threats, security leaders are adopting a zero-trust model, a concept that states that users, devices and apps can’t be trusted without authentication. Read on to learn more.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

Gigamon

NIST Cybersecurity Framework Evaluation Guide
sponsored by Absolute Software Corporation
WHITE PAPER: The NIST Cybersecurity Framework (CSF) outlines specific actions and guidelines for organizations to undertake in order to improve security hygiene and meet regulatory requirements. In this evaluation guide, take a closer look at the 5 pillars of the NIST CST and learn how the Absolute platform aligns with the action items.
Posted: 20 Feb 2020 | Published: 02 Oct 2018

Absolute Software Corporation

Data Security for the Way People Work
sponsored by Dell and Intel
WHITE PAPER: Faced with a growing array of threats and the challenge of enabling the mobile workforce, IT leaders should tailor their security strategy to focus on the way end users work. Download this report to uncover the common threats and key tactics to consider when implementing a security plan.
Posted: 19 Feb 2020 | Published: 19 Feb 2020

Dell and Intel

How to Provide a Safe Learning Environment
sponsored by Absolute Software Corporation
WHITE PAPER: Technology has become a fundamental part of the education system, and it’s likely to continue as a classroom trend. However, these devices also present risks to students and schools. Download this white paper to uncover 3 approaches your organization should adopt in order to ensure a safer learning environment.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Absolute Software Corporation

Security at the Speed of Your Network
sponsored by Gigamon
WHITE PAPER: Read “Security at the Speed of Your Network” to learn how to use an architectural approach that improves security posture and reduces costs without painful compromises on performance.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Gigamon
1 - 25 of 541 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info