IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security White Papers (View All Report Types)
1 - 25 of 562 Matches Previous Page  |  Next Page
A Field Guide to Understanding the Tactics, Techniques and Attack Vectors Used by Cybercriminals
sponsored by Radware
WHITE PAPER: The threat landscape is as diverse as it is sophisticated, thanks largely to the fact that the skills and tools behind launching cyberattacks have become commoditized. In Radware's Hacker's Almanac, gain an understanding the threat landscape and current tactics, techniques and procedures used by today's cybercriminals.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Radware

Comprehensive Security for Your Applications
sponsored by VMware
WHITE PAPER: Despite cybersecurity being a top priority, organizations continue to fall short protecting against threats. In this white paper, learn how VMware can help your organization to architect security into your infrastructure to better secure your applications and data.
Posted: 17 Sep 2019 | Published: 31 Dec 2018

VMware

Security Readout: 2019 Trends for Remote and Roaming User Security
sponsored by Cisco Umbrella
WHITE PAPER: It's no secret that the way people work has changed dramatically over the past few years. In this white paper, explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today's increasingly distributed enterprise.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Cisco Umbrella

Advancing ICS Visibility and Cybersecurity with the Nozomi Networks Solution
sponsored by Nozomi Networks
WHITE PAPER: The industrial sector is digitizing and automating processes at an increasingly rapid rate. While connected systems deliver new value and improved productivity, they also heighten cyber risk. Read this white paper to learn about Nozomi Networks security tool and how it can give you the reliability and visibility you need to keep OT networks safe.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Nozomi Networks

You Need to See It to Protect It: How Real-Time Visibility and IT Hygiene Drive AWS EC2 Security
sponsored by Amazon Web Services
WHITE PAPER: Organizations are increasingly connecting mission-critical apps and data to AWS and taking advantage of its scalable Elastic Compute Cloud (EC2). But, managing and securing your own EC2 environment can become a challenge. In this white paper, learn how real-time visibility and good IT hygiene can drive AWS EC2 security.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Amazon Web Services

Trend Report: Employees Like to Use Unsanctioned Apps — and Don't Plan to Stop
sponsored by Cisco Umbrella
WHITE PAPER: Employees are downloading apps to do their work faster, but this is causing risk to the business. IT can't secure what it can't see, which means threats can creep in. In this white paper, learn how Cisco Umbrella can help you discover which SaaS apps are being used, who's using them, and what risks they pose to your organization.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Cisco Umbrella

Financial Services: How to Achieve the Proper Network Visibility
sponsored by Gigamon
WHITE PAPER: In this white paper, learn about the Gigamon Visibility Platform and how it enables financial services firms to build an effective network security infrastructure, maximize tool efficiency without compromising network resiliency, and ensure compliance with strict industry mandates.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Gigamon

Defending the Digital Enterprise
sponsored by Gigamon
WHITE PAPER: Given the amount of encrypted traffic and the threat vector it now poses, you need a way to efficiently decrypt traffic, share it with tools and then re-encrypt it. In this white paper, discover 7 things you need to do to successfully decrypt your SSL and TLS traffic.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Gigamon

Network Packet Broker for the Next Generation
sponsored by Gigamon
WHITE PAPER: In this white paper, learn about network packet brokers designed for digital business. Find out how they help ensure that IT security and performance monitoring tools have comprehensive visibility into network traffic across the enterprise to operate at peak efficiency.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Gigamon

HIPAA Compliance: Delivering Privacy and Security for ePHI with a Business-driven SD-WAN
sponsored by Silver Peak
WHITE PAPER: HIPAA compliance puts a lot of demands on covered entities and "business associates." Find out how Silver Peak's EdgeConnect SD-WAN helps to address critical compliance areas while maintaining reliable connectivity.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Silver Peak

Trend Report: More Organizations are Using a Secure Internet Gateway for Secure Access
sponsored by Cisco Umbrella
WHITE PAPER: Security leaders need to find a way to give users back their freedom while still protecting sensitive data. In this white paper, learn how a Secure Internet Gateway (SIG) can do just that by providing workers with safe access to the internet – no matter what device they're using or where they're located.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Cisco Umbrella

Advanced AD Bridging for Prodigious IT Gains
sponsored by Centrify Corporation
WHITE PAPER: Although AD Bridging was able to address common pain-points of the past, it is not designed to help with today's modern hybrid cloud environments. In this white paper, learn how Centrify was able to further enhance their AD Bridging solution to support Zero Trust Privilege for today's modern hybrid cloud requirements.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Centrify Corporation

5 Considerations for Evaluating a Modern Enterprise Security Platform.
sponsored by Verizon
WHITE PAPER: Security teams will be stretched thin. The jobs they perform will become increasingly more complex given the continued proliferation of attacks. To meet these challenges, practitioners are considering new solutions and approaches. Download this white paper to explore 5 considerations for evaluating a modern enterprise security platform.
Posted: 03 Sep 2019 | Published: 28 Feb 2019

Verizon

Magic Quadrant for Network Services, Global
sponsored by Verizon
WHITE PAPER: In the past 12 months, Gartner has observed continued evolution of enterprise requirements and buying criteria for global networks. Dive into this document to discover the Magic Quadrant for network services, to learn about various vendors' strengths, cautions, and more.
Posted: 03 Sep 2019 | Published: 25 Feb 2019

Verizon

The Perimeter at the Data Object: Zero Trust and Data Protection
sponsored by Virtru
WHITE PAPER: Discover how to use a data-centric approach to embrace the core tenets of Zero Trust, how the Trusted Data Format (TDF) fulfills the least privileged access approach of a Zero-Trust strategy, and how to get started with Zero Trust today.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Virtru

6 Reasons Why Your Security Appliance Solution is Failing Your Business
sponsored by Avast Software
WHITE PAPER: A decade ago it was easier to secure most businesses. With less advanced threats, most SMBs were protected with a combination of Unified Threat Management and Secure Web Gateways. In this white paper, uncover the most common reasons these security application solutions are now failing your business.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Avast Software

Ransom(Every)Ware
sponsored by Neustar
WHITE PAPER: In what would become a troubling theme, WannaCry, and subsequent strains of ransomware, could have been prevented from becoming a public nuisance had proper maintenance and diligence been employed. In this white paper, learn how to prevent a ransomware attack at your organization.
Posted: 22 Aug 2019 | Published: 22 May 2019

Neustar

Are Your Communications At Risk?
sponsored by Verizon
WHITE PAPER: Unsecured mobile devices and apps that connect to your network can leave communications, passwords and other sensitive data open to theft. Find out how companies are fighting back by adopting cloud-based communications platforms with built-in end-to-end security.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Verizon

Securing Cloud Transformation with a Zero Trust Approach
sponsored by Zscaler
WHITE PAPER: Cybersecurity wasn't designed for the cloud, and even though traditional network security solutions are being retrofitted for "cloud" usage, security is getting in the way of the adoption of zero trust strategies. In this white paper, learn why transforming to the cloud calls for zero trust network access (ZTNA) services.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Zscaler

The SIEM Buyer's Guide for 2020
sponsored by Splunk
WHITE PAPER: The importance of a SIEM solution in today's enterprise is magnified by the growing sophistication of attacks and the use of cloud services which only increases the attack surface. In this buyer's guide, learn everything you need to know about a SIEM including what it is, its evolution and how to determine if it is right for your organization.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

Splunk

How to Keep up with the Shifting Landscape of Password Attacks
sponsored by Zoho
WHITE PAPER: Hackers are evolving, and apart from implementing technology to help avoid cyberthreats, personal awareness plays a big role in defending against the mechanisms cybercriminals use to steal credentials. In this white paper, explore password theft methods used by hackers, and learn how simple tweaks can reduce the risk of a password compromise.
Posted: 15 Aug 2019 | Published: 15 Aug 2019

Zoho

Shortcomings of Traditional Security and Digital OT
sponsored by Fortinet, Inc.
WHITE PAPER: The rapid adoption of digital tools and services has caused internet-connected information technology (IT) networks to increasingly intersect with previously isolated operations technology (OT) networks. Find out what this means for your security posture in this white paper.
Posted: 15 Aug 2019 | Published: 15 Aug 2019

Fortinet, Inc.

Networks in Transition: How Leaders are Addressing Multifaceted Challenges
sponsored by Verizon
WHITE PAPER: Digital transformation efforts are skyrocketing – and these projects rely on a variety of resources across your IT networks. What's your network's threshold for handling these workloads? Take this whitepaper to figure out the top network deliverables you should prioritize when supporting digital transformation projects in 2019.
Posted: 15 Aug 2019 | Published: 15 Aug 2019

Verizon

Fortinet SD-Branch Secures the Network Edge at the Branch
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, discover how Fortinet SD-Branch consolidates the network access layer within a secure platform that provides visibility and security to a network and all devices connected.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Fortinet, Inc.

Securing Industrial Control Systems With Fortinet
sponsored by Fortinet, Inc.
WHITE PAPER: In recent years, the industrial control systems (ICS) upon which much of our critical infrastructure and manufacturing industry depends, have come under increasingly frequent and sophisticated cyberattacks. In this white paper, learn how, in spite of these challenges, Fortinet's solutions can help to ensure the safety and reliability of ICS.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Fortinet, Inc.
1 - 25 of 562 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement