IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security White Papers (View All Report Types)
1 - 25 of 535 Matches Previous Page  |  Next Page
The Future Of The Firewall
sponsored by Cisco
WHITE PAPER: As networks grow and evolve, so too should firewall strategies. In this white paper, take a closer look at the evolution of network security and discover the essential steps needed to ensure a future-proof firewalling strategy.
Posted: 08 Jul 2021 | Published: 08 Jul 2021

Cisco

Five Critical Requirements For Internal Firewalling In The Data Center
sponsored by VMware Intel
WHITE PAPER: This white paper looks at the shocking state of network security and how many organizations could benefit by securing traffic in the data center with a new approach: using a distributed, service-defined internal firewall. Download to learn about VMware NSX’s Service-Defined Firewall and its potential impact on visibility, compliance, and more.
Posted: 04 Jun 2021 | Published: 31 Mar 2021

VMware Intel

Securing The Data Center In Just Four Steps
sponsored by VMware Intel
WHITE PAPER: Appliance-based security has proven incapable of keeping up with securing east-west traffic. But this white paper looks at an alternative approach: a distributed internal firewall. Learn about VMware’s own version of this offering – their Service-defined Firewall – and uncover 4 steps to improving security in the data center.
Posted: 04 Jun 2021 | Published: 31 Mar 2021

VMware Intel

Tanium Insights: It’s Time to Ditch the VPN for Zero Trust
sponsored by Tanium
WHITE PAPER: In this white paper, examine what kick-started the zero-trust movement, why it's completely changed the conversation around network security, how Tanium and its partners' capabilities contribute to a zero-trust solution.
Posted: 13 May 2021 | Published: 13 May 2021

Tanium

Pass-the-Hash and Pass-the-Ticket
sponsored by Verizon
WHITE PAPER: Pass-the-hash and its relative, pass-the-ticket, are attack techniques commonly used by adversaries to compromise enterprise servers after some other attack has created a foothold inside the enterprise. Inside this white paper, learn how Verizon Software Defined Perimeter (SDP) uses multi-factor authentication to mitigate these attacks.
Posted: 12 May 2021 | Published: 12 May 2021

Verizon

Tanium Insights: It’s Time to Ditch the VPN for Zero Trust
sponsored by Tanium
WHITE PAPER: Learn what kick-started the zero-trust movement, why it's completely changed the conversation around network security. The white paper also covers what you need to know about adopting zero trust in your organization. Hint: You don't get up one morning and decide to adopt zero trust.
Posted: 11 May 2021 | Published: 11 May 2021

Tanium

New Priorities for IT Operations: Be Ready for Whatever Comes Next
sponsored by Tanium
WHITE PAPER: With remote work operationalized, IT teams can now strategically evaluate recent decisions and determine what needs to be done to update and align processes and infrastructure without additional disruption. How does ITOps get this done? Download this white paper by ESG to discover a pragmatic roadmap to IT sustainability. 
Posted: 13 Apr 2021 | Published: 31 Mar 2021

Tanium

Companies Boost Home/Mobile Remote Access Performance, Scalability and Security with Cato
sponsored by Cato Networks
WHITE PAPER: The COVID-19 pandemic led to the largest global work-at-home experiment in history. Unfortunately, home users often wrestle with the slow performance, latency and unreliability that come with backhauling remote connections to a data center. In this white paper, learn how 3 organizations were able to overcome these challenges with the help of Cato.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

Cato Networks

15 Experts' Questions and Answers about SASE
sponsored by Cato Networks
WHITE PAPER: SASE is, in brief, a new enterprise networking technology category introduced by Gartner in 2019. SASE solutions are cloud services that connect and secure all enterprises “edges” – datacenters, branch offices, mobile uses, and cloud resources. To learn more about SASE and explore an expert Q&A, check out this white paper.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

Cato Networks

SASE as a Gradual Deployment
sponsored by Cato Networks
WHITE PAPER: Gartner recently introduced a new architecture called SASE that converges networking and security capabilities. Moving to a new architecture can be daunting, which is why any SASE architecture should support enterprises moving at their own pace. In this white paper, explore 5 use cases of gradual deployment that a SASE architecture should support.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

Cato Networks

IT Managers Share Lessons Learned from Shifting to Work-from-Home
sponsored by Cato Networks
WHITE PAPER: The global COVID-19 pandemic exploded suddenly, with an unprecedented impact on enterprise work styles. In a matter of days, thousands of organizations had to shift to a remote workforce. In this white paper, find out how 3 organizations were able to ramp up their COVID-19 WFH strategy fast and seamlessly with the help of Cato’s SASE platform.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

Cato Networks

Securing Digital Innovation Demands Zero-trust Access
sponsored by Fortinet, Inc.
WHITE PAPER: As more organizations innovate digitally, apps and data disperse, and the network perimeter disappears. With malware-infected endpoints having increased 53% in the last 12 months, it’s safe to assume that threats are always present. View this white paper to learn how a zero-trust approach mitigates this constant threat presence.
Posted: 05 Apr 2021 | Published: 24 Sep 2020

Fortinet, Inc.

Comparison and Analysis of Security Aspects of LoRaWAN and NB-IoT
sponsored by Telekom Deutschland GmbH
WHITE PAPER: The two most commonly used LPWA technologies today are NarrowBand IoT (NB-IoT) and Long Range Wide Area Network (LoRaWAN). While more and more IoT use cases use NB-IoT or LoRaWAN technology, security specialists have observed IoT-related attacks increasing sharply for years. In this white paper, take a look at the security of NB-IoT and LoRaWAN.
Posted: 05 Apr 2021 | Published: 05 Apr 2021

Telekom Deutschland GmbH

Getting started with SASE: A guide to secure and streamline your network infrastructure
sponsored by Cloudflare
WHITE PAPER: SASE, or secure access service edge, simplifies traditional network architecture by merging network and security services on one global network. This white paper explores the evolution of network security that led to SASE, outlines the breadth of services included in a SASE solution and offers practical steps to move toward SASE adoption.
Posted: 22 Mar 2021 | Published: 01 Dec 2020

Cloudflare

The iboss cloud Zero Trust Network Access (Z TNA) Private Access Platform architecture
sponsored by iBoss
WHITE PAPER: Organizations deploying and using legacy network security appliances to protect cloud connectivity and internet access are faced with the problem of the disappearing network perimeter. But zero trust network access can ensure fast, compliant and secure connections from anywhere. Download this white paper to explore zero trust in detail.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

iBoss

7 ways to work from anywhere
sponsored by Cloudflare
WHITE PAPER: Today, workforces are drastically more mobile and distributed. Where it was once feasible to draw a perimeter around corporate resources, the rise of SaaS, cloud computing, and remote work has rendered this approach obsolete. In this e-book, learn 7 best practices that can help you protect your global workforce without sacrificing productivity.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Cloudflare

The Benefits of Using Managed Secure Devices Integrated With Cloud Communications Services
sponsored by NWN Corporation
WHITE PAPER: For users, business communications is a holistic experience: They use their devices to go online, using networks to connect to their applications and data. Additionally, they don’t want to worry about security. In this white paper, learn how IT teams can make this possible by using managed secure devices as a cloud service.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

NWN Corporation

Five Key Steps To Securely Connect Your Remote Workforce
sponsored by Intrado
WHITE PAPER: After the initial scramble to enable employees to stay safe by working from home, companies are now able to take stock of the situation and address any security gaps. In this white paper, uncover 5 key steps to help you create a long-term sustainable plan for secure remote working.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Intrado

4 Key Elements Of An ML-Powered NGFW: How Machine Learning Is Disrupting Network Security
sponsored by Palo Alto Networks
WHITE PAPER: Bad actors and security teams are trading blows when it comes to leveraging automation, with both sides scaling their operations. But as more and more organizations leverage cloud, environments become more complex and more vulnerable. Delve into this white paper to learn how machine learning (ML) can aid in securing your network.
Posted: 17 Mar 2021 | Published: 17 Mar 2021

Palo Alto Networks

DNS - Top cybersecurity trends 2021: Pandemic-related content used for attack propagation
sponsored by Cisco Umbrella
WHITE PAPER: In the face of new and rising pandemic-related threats, it's more important than ever to ensure that all web traffic is inspected and protected, so people can get the information they need — without getting compromised. Find out how to keep your employees safe from these types of attacks in 2021.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

Cisco Umbrella

Sase A Changing World Calls For A Different Kind Of Network
sponsored by VMware
WHITE PAPER: When it comes to digitization, legacy networks are simply not up to the task. The connections of these hub-and-spoke legacy networks are fixed, and the transit of data is limited due to lack of flexibility. Today, SASE’s cloud-based architecture can support networking and security needs. Access this ZK Research white paper to see how SASE works.
Posted: 26 Feb 2021 | Published: 26 Feb 2021

VMware

Unity Orchestrator Global Enterprise
sponsored by Aruba Networks
WHITE PAPER: If your organization has multiple large-scale SD-WAN deployments, it can be difficult to get visibility into them and, moreover, orchestrate them. Professionals with Silver Peak Unity EdgeConnet SD-WAN fabrics in their stack should read this white paper. It details how you can centrally manage and monitor these SD-WAN deployments.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

Aruba Networks

Secure Sd-Wan For The Cloud-First Enterprise Without Compromise
sponsored by Aruba Networks
WHITE PAPER: As enterprises move to the cloud, security challenges multiply. Examine this white paper to learn how Zscaler and Silver Peak are combining their respective Cloud Security and Unity EdgeConnect SD-WAN platforms to address these challenges. And, see how they’re collaborating to deliver security orchestration for consistent security policies.
Posted: 25 Feb 2021 | Published: 31 May 2019

Aruba Networks

Are Your Branch Sites an Open Door to Cyberattacks?
sponsored by SonicWall
WHITE PAPER: Traditional methods of deploying and maintaining security at branch sites have become ineffective, expensive and unmanageable. But an SD-Branch solution can form a cornerstone for boundless security in distributed enterprise environments. Jump into this white paper to see why the time for SD-Branch is now.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

SonicWall

Securing Remote Workers In The Age Of Teleworking
sponsored by Infoblox
WHITE PAPER: Remote workers are seeking access to enterprise resources from a variety of endpoints, both work-provided and personal, as well as various mobile devices. But many of the cybersecurity procedures designed for enterprise facilities won’t work from remote locations. Explore this detailed guide to learn how to secure remote workers intelligently.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Infoblox
1 - 25 of 535 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences