IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by, powered by an online computer dictionary
Network Security White Papers (View All Report Types)
76 - 100 of 828 Matches Previous Page  |  Next Page
Assumption of Breach: A New Approach to Cyber Security
sponsored by Carousel Industries
WHITE PAPER: According to an RSA Survey, 75% of companies have significant cybersecurity risk exposure. This white paper reveals how a layered approach to cybersecurity can help with turning 3 key elements—people, processes and technology—from security vulnerabilities to strengths.
Posted: 24 Jan 2018 | Published: 24 Jan 2018

Carousel Industries

Big Switch Networks and Dell EMC: Next-generation Data Center Networking
sponsored by Big Switch Networks
WHITE PAPER: Software-defined data center workloads are increasing the cost and complexity of configuring, visualizing and securing the network. In this white paper, discover how to deploy and manage the next-generation software-defined data center.
Posted: 19 Jan 2018 | Published: 30 Jun 2017

Big Switch Networks

PCI DSS Endpoint Security
sponsored by enSilo
WHITE PAPER: Take a look at this white paper to learn more about the PCI DSS compliance regulation and how to secure your endpoints to comply with the policy.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

The Theory Behind Google's Beyond Corp Security Model
sponsored by Duo Security
WHITE PAPER: Google's BeyondCorp security model states no traffic within an enterprise's network is any more trustworthy by default than traffic coming in from the outside. This resource offers insight into advancing enterprise security based on Google's BeyondCorp model.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Duo Security

Data Security Under GDPR: How to Prepare for the Inevitable
sponsored by Fortinet, Inc.
WHITE PAPER: Access this white paper to gain guidance on how to comply with GDPR when developing data protection policies.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Fortinet, Inc.

How to Build a Soc with Limited Resources
sponsored by LogRhythm, Inc.
WHITE PAPER: Having a security operations center (SOC) has become an absolute necessity for implementing threat lifecycle management to minimize damage caused by successful attacks. This white paper offers a guide to building an SOC with limited resources and provides the basics of the cyberattack lifecycle through the threat lifecycle management framework.
Posted: 09 Jan 2018 | Published: 09 Jan 2018

LogRhythm, Inc.

Security Comparison: MDR, MSSP, and SIEM
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Gain valuable insights into the pros and cons of MDR, MSSP and SIEM to help build your cybersecurity protection protocols against today's threats – and tomorrow's.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

Arctic Wolf Networks, Inc.

DTMF Masking for PCI DSS Compliance
sponsored by Semafone
WHITE PAPER: PCI DSS is made up of 12 requirements, including securing networks, protecting data, access control measures, information security practices, and monitoring and testing. This resource provides insight into becoming PCI DSS compliant by implementing dual-tone multi-frequency.
Posted: 04 Jan 2018 | Published: 04 Jan 2018


10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: Discover the 10 network security tools and tests that you should consider implementing and know how to use.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

Global Knowledge

A Network Blueprint for the Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: Learn the 5 strategies to overcome the latest network challenges for the digital workplace. Then, discover how to future-proof your network-based business processes to enjoy, benefits ranging from improved communication and collaboration to enhanced productivity and reduced operating expenses.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

Aruba Networks

10 Reasons Smart Power-Over-Ethernet Switches are the Wise Choice for Upgrading IP Surveillance Networks
sponsored by D-Link
WHITE PAPER: In this white paper, uncover the top 10 reasons to upgrade to Smart (managed) PoE Switches for IP surveillance networks.
Posted: 30 Nov 2017 | Published: 20 Nov 2017


Solution Brief: Dyn Secondary DNS
sponsored by Oracle + Dyn
WHITE PAPER: In this white paper, learn about a cloud-based secondary DNS system that serves as a redundant compliment to your existing offering. This will ensure your most critical apps are always online and protected against DDoS attacks 24/7.
Posted: 30 Nov 2017 | Published: 31 Dec 2015

Oracle + Dyn

Servers, Servers, Everywhere: How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: With the vast shift to the cloud, securing workloads in multiple locations has become more complex than ever before. Access this white paper to gain valuable insights into the security challenges of the hybrid cloud and how you can overcome these challenges.
Posted: 29 Nov 2017 | Published: 31 Mar 2017


Check Point and Silver Peak Securing the Internet for SD-WAN
sponsored by Silver Peak
WHITE PAPER: Explore how to use SD-WAN to enable enterprise WAN networks to be built using broadband Internet service along with MPLS as the underlying transport, and find out how you can integrate security throughout your SD-WAN.
Posted: 28 Nov 2017 | Published: 31 Dec 2016

Silver Peak

Integrated Security Solution for SD-WAN
sponsored by Silver Peak
WHITE PAPER: This solution brief offers an integrated security approach for SD-WAN in order to achieve end-to-end security for broadband and hybrid WANs.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Silver Peak

What IT K-12 Managers Need to Know About IP Surveillance
sponsored by D-Link
WHITE PAPER: In this white paper, learn how the automation and scalability that comes with IP surveillance is expanding its range of video surveillance applications especially for IT K-12 decision makers. Then, uncover the top considerations when building the best IP surveillance solution for your organization.
Posted: 20 Nov 2017 | Published: 20 Nov 2017


IP Surveillance Solutions that Connect Businesses to More Peace of Mind
sponsored by D-Link
WHITE PAPER: In this solution brief, learn how to make the transition to IP surveillance and how network switches ease integration. Then, uncover the benefits of IP surveillance cameras including improved image quality and reliability.
Posted: 20 Nov 2017 | Published: 20 Nov 2017


Top Cyber Threats to The Retail Sector
sponsored by Digital Shadows
WHITE PAPER: Given the frequent number of transactions taking place using payment cards, retail companies are frequently the target of financially-motivated threats. Explore this white paper to uncover the top 3 cyber threats to the retail sector to help you monitor and manage digital risks.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

DNS Threats to Network Availability
sponsored by Men and Mice
WHITE PAPER: In this white paper, gain a clear understanding of how DNS redundancy can boost DNS availability to help improve the performance and reliability of your network.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

Men and Mice

Managing BitLocker in the Enterprise with SecureDoc
sponsored by WinMagic
WHITE PAPER: Microsoft offers built-in encryption software known as BitLocker, and it is designed to protect data. But how do you simplify BitLocker management? Explore this technology brief to discover if the combination of SecureDoc and BitLocker is right for your encryption and data protection needs.
Posted: 08 Nov 2017 | Published: 08 Nov 2017


Do Great Network Teams Need Great DNS, DHCP and IPAM?
sponsored by Men and Mice
WHITE PAPER: In this white paper, gain a clear understanding of DNS, DHCP and IPAM so your network can maintain strong connectivity, efficiency and security.
Posted: 03 Nov 2017 | Published: 03 Nov 2017

Men and Mice

The Top 4 Myths of Network Security and Compliance
sponsored by FireMon
WHITE PAPER: Each year, fraudulent activity accounts for $600 billion in losses in the United States. Explore this resource to gain insight into policy regulations and how to secure your data while maintaining regulatory compliance.
Posted: 08 Jan 2018 | Published: 08 Jan 2018


Recommendations for Secure Policy Configuration Assessment
sponsored by FireMon
WHITE PAPER: According to Gartner, secure configuration assessment is essential for identifying risks arising out of weak and misconfigured systems and devices. This resource offers strategies for achieving Gartner's 4 recommendations for secure policy configuration assessment.
Posted: 04 Jan 2018 | Published: 04 Jan 2018


The Top 5 Requirements to Look for in Your Network Security Policy Management Solution
sponsored by FireMon
WHITE PAPER: In the last 20 years, network security policies have grown by more than 3,500%, according to FireMon.This resource examines the top 5 requirements to look for in your networking security policy management strategy.
Posted: 04 Jan 2018 | Published: 04 Jan 2018


Cloud-based Apps: For Better or Worse
sponsored by Verizon
WHITE PAPER: In this white paper, gain a stronger understanding of the questions you should be asking when implementing SaaS, as more business apps move to the cloud.
Posted: 31 Oct 2017 | Published: 28 Feb 2017

76 - 100 of 828 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement