IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security White Papers (View All Report Types)
101 - 125 of 802 Matches Previous Page  |  Next Page
The Road to a Secure, Compliant Cloud
sponsored by HyTrust
WHITE PAPER: Corporations must innovate to stay ahead of the competition, deliver new services to attract and keep new customers, and keep their costs low. Uncover how a well-designed virtualized cloud offers businesses a solution, by keeping their crucial data secure while providing agility and adaptability.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

HyTrust

Securing Industrial IoT Technology: 4 Key Considerations
sponsored by Bayshore Networks
WHITE PAPER: Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Bayshore Networks

Don't Just Respond – Prevent Attacks before They Happen
sponsored by Cisco Umbrella
WHITE PAPER: Discover how to use cloud-delivered security services to prevent damaging attacks before they're launched. Learn how to create an advanced threat and malware detection strategy that can proactively identify attack infrastructure with statistical models and pre-emptively protect against most zero-day threats.
Posted: 25 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

Case Study: Simplifying Network Operations Across the Globe
sponsored by Indeni
WHITE PAPER: Learn how Travelex set up and monitored configurations for their widely spread devices to keep their networks running smoothly, and ended up significantly reducing downtime due to firewall issues, plus 5 other key benefits.
Posted: 20 Jul 2017 | Published: 20 Jul 2017


The $38 Billion Security Vulnerability Your Enterprise Can't Afford to Ignore: Phone and Video Hacking
sponsored by Vyopta
WHITE PAPER: An architecture firm was surprised by a $166,000 phone bill they accrued in 1 weekend, and found that hackers had placed premium-rate phone calls through their network. Telecom fraud is a multi-billion dollar threat you can't afford. Learn about the impact of this threat, as well as immediate tactics to prevent telecommunications hacking.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Vyopta

Advanced SD-WAN: Accelerating Digital Transformation and Powering the Cloud-Connected Enterprise
sponsored by Silver Peak
WHITE PAPER: With cloud becoming more of a factor in digital business transformation, many are now looking to SD-WAN to help connect their business. This IDC report discusses the current state of SD-WAN and why so many organizations are adopting it. Find out what benefits these organizations expect SD-WAN to deliver, several use cases, and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Silver Peak

A Proactive Approach to Network Operations Management and Cost Reduction
sponsored by Indeni
WHITE PAPER: Explore how to create a real-time window into network health and stability, and reduce the amount of time spent on troubleshooting the seemingly never-ending stream of network issues. Learn how to navigate the myths of using automation in network monitoring and security.
Posted: 06 Jun 2017 | Published: 06 Jun 2017


Information Protection in the Web and Cloud Era
sponsored by Symantec
WHITE PAPER: Explore a modern approach to data protection in the web and cloud era. Uncover 5 requirements for a modern DLP tool.
Posted: 26 May 2017 | Published: 31 Dec 2016

Symantec

On the Radar: Bayshore Networks Protects the Industrial Internet of Things
sponsored by Bayshore Networks
WHITE PAPER: This Ovum report details how to get the network security you need to combat the dangers the Industrial Internet of Things presents.
Posted: 24 May 2017 | Published: 22 Feb 2016

Bayshore Networks

SD-WAN 101: What It Is, What It Does, Why You Need to Know Now
sponsored by Windstream Communications
WHITE PAPER: Learn what you need to know about SD-WAN in this resource, including what it is, what it does and the benefits it can offer your enterprise.
Posted: 16 May 2017 | Published: 01 Feb 2017

Windstream Communications

Securing Digital Healthcare Communities — Addressing 10 Common Security Challenges
sponsored by Cisco Umbrella
WHITE PAPER: In this whitepaper, uncover 10 common security challenges that healthcare organizations are facing today, including malware, legacy applications support, IoT, and more.
Posted: 16 May 2017 | Published: 16 May 2017

Cisco Umbrella

The IoT Explosion's Impact on Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Find out what's driving the IoT explosion and how you can prepare your network for the potential security risks that accompany
Posted: 10 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

What's Driving Hybrid WAN Adoption?
sponsored by Silver Peak
WHITE PAPER: Selecting a hybrid WAN without knowledge of the challenges it needs to address is a recipe for disaster. Learn about these challenges in this white paper.
Posted: 02 May 2017 | Published: 30 Dec 2016

Silver Peak

A Security Leaders Definitive Guide to the Threat Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: This guide goes in-depth on five network trends that are causing security pros to panic, so you can begin to understand what your security infrastructure is up against and how to best prepare for it.
Posted: 02 May 2017 | Published: 30 Jan 2017

Fortinet, Inc.

6 Ways to Use Threat Intelligence Data
sponsored by Splunk
WHITE PAPER: Uncover 6 ways threat intelligence data can help you gain broader perspective of any threat. Discover how it can help you detect malicious activities, provide visibility, save time/resources, and more.
Posted: 02 May 2017 | Published: 31 Dec 2016

Splunk

6 Ways to Improve your Network Security with SD-WAN
sponsored by Silver Peak
WHITE PAPER: Learn 6 ways to improve network security and compliance by implementing SD-WAN.
Posted: 01 May 2017 | Published: 28 Apr 2017

Silver Peak

What's Driving WAN Architecture Simplification?
sponsored by Silver Peak
WHITE PAPER: Learn more about what challenges are driving WAN architecture simplification and how you can take advantage of it in this white paper.
Posted: 01 May 2017 | Published: 30 Dec 2016

Silver Peak

SD-WAN: The Pathway to a Digitally Transformed Branch
sponsored by Windstream Communications
WHITE PAPER: This IDC white paper examines how digital transformation has necessitated a rethinking of WAN connectivity for distributed enterprises.
Posted: 14 Apr 2017 | Published: 28 Feb 2017

Windstream Communications

Prepping for the Oncoming Wave of SD-WANs
sponsored by Windstream Communications
WHITE PAPER: In this TechTarget white paper, learn what the experts are saying about the near future for SD-WANS.
Posted: 12 Apr 2017 | Published: 31 Jan 2017

Windstream Communications

It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web
sponsored by Authentic8, Inc.
WHITE PAPER: Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.
Posted: 28 Jul 2017 | Published: 31 Dec 2016

Authentic8, Inc.

Why a Virtual Browser is Important For Enterprise Security
sponsored by Authentic8, Inc.
WHITE PAPER: More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Authentic8, Inc.

Certificate Management: The Ultimate Guide
sponsored by DigiCert
WHITE PAPER: This guide discusses what you should be thinking about for thorough certificate management. Learn how to take control of all areas of the certificate lifecycle, while leveraging APIs and optimizing your team.
Posted: 26 Jul 2017 | Published: 24 Jul 2017

DigiCert

Array Purpose-Built SSL VPN Overview
sponsored by Array Networks
WHITE PAPER: Learn about the issues with SSL VPN firewall integration and how to overcome them in this white paper.
Posted: 31 May 2017 | Published: 28 Feb 2017

Array Networks

Making Networks SDN-Ready with Segment Routing
sponsored by Cisco Systems, Inc.
WHITE PAPER: This Heavy Reading Report explains why segment routing has emerged as a highly promising and practical tool to end the network issues surrounding SDN.
Posted: 25 May 2017 | Published: 31 Jan 2017

Cisco Systems, Inc.

Fast-Forward Business with On-Demand App Deployments
sponsored by VMware and Presidio
WHITE PAPER: In this e-book, learn how to automate your IT and application delivery process to meet the demands of the cloud.
Posted: 01 May 2017 | Published: 30 Dec 2016

VMware and Presidio
101 - 125 of 802 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement