IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
1 - 25 of 1229 Matches Previous Page  |  Next Page
How to Simplify Security and Shrink the Attack Surface
sponsored by VMware
WHITE PAPER: Modern applications are dynamic and distributed – and the attack surface keeps growing as a result. To secure your business, you need security integrated into your infrastructure, not bolted-on. Download the e-book to learn how to reduce the attack surface and simplify security.
Posted: 18 Jun 2019 | Published: 31 Aug 2018

VMware

How to Protect Your VDI Environment from Ransomware
sponsored by Fhoosh
EGUIDE: One major security risk to VDI environments is ransomware. Ransomware has the potential to be more damaging in VDI than in a physical desktop environment. In this e-guide, explore 3 tips IT administrators can take to better secure VDI environments.
Posted: 18 Jun 2019 | Published: 18 Jun 2019

Fhoosh

Guide to Implementing Network Security for Kubernetes
sponsored by Tigera
WHITE PAPER: Kubernetes brings new requirements for networking and security teams. This is because applications, that are designed to run on Kubernetes, are usually architected as microservices that rely on the network. In this white paper, learn how to implement network security for a Kubernetes platform.
Posted: 14 Jun 2019 | Published: 30 Sep 2018

Tigera

Salesforce Uses Bug Bounties to Protect Customer Data
sponsored by HackerOne
CASE STUDY: Salesforce's Bug Bounty program is one of their many efforts that contributes to the security of their products, and therefore, their customers. In this case study, learn how Salesforce has worked with HackerOne to successfully implement their bug bounty program. Also, explore the benefits Salesforce has seen.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

HackerOne

Securing Multi-Cloud Environments with SD-WAN
sponsored by Cisco Systems, Inc.
WHITE PAPER: As more organizations are adopting a multi-cloud architecture, IT teams are faced with the challenge of delivering a high quality user experience while maintaining security. In this white paper, learn how SD-WAN can combat these challenges by delivering secure, reliable connectivity across a multitude of cloud platforms, including multi-cloud.
Posted: 13 Jun 2019 | Published: 13 Jun 2019

Cisco Systems, Inc.

PCI Network Security Compliance For Kubernetes Platforms
sponsored by Tigera
WHITE PAPER: PCI DSS requires proper monitoring at the network level. The challenge with traditional network monitoring tools is that they generate inaccurate data for Kubernetes. In this white paper, learn how Tigera supports continuous PCI compliance that gives teams the ability to pinpoint any point in time and say with certainty if they were in compliance.
Posted: 13 Jun 2019 | Published: 13 Jun 2019

Tigera

5 Best Practices for Kubernetes Network Security and Compliance
sponsored by Tigera
WHITE PAPER: As businesses look to modernize their applications, many have turned to Kubernetes because of the benefits containerized workloads bring. However, businesses need to think about securing their applications. In this white paper, explore 5 best practices for securing Kubernetes at the network level.
Posted: 13 Jun 2019 | Published: 13 Jun 2019

Tigera

Enterprise SD-WAN in the Real World
sponsored by Forcepoint
WEBCAST: While many companies identify a need to evolve to SD-WAN, they are not always convinced SD-WAN can deliver the necessary enterprise capabilities. In this webcast, learn how Link-Connect implemented Forcepoint NGFWs to deliver enterprise-class SD-WAN to manage more than 400 sites from a single management console.
Posted: 12 Jun 2019 | Premiered: Jun 12, 2019

Forcepoint

Explore Enterprise Network Firewalls
sponsored by Forcepoint
RESEARCH CONTENT: There are many options for Enterprise Network Firewalls, which all provide a variety of protection features. Although they all offer a standard set of features, there are often signification differences in each option. In this Gartner Magic Quadrant, explore the strengths and cautions of key vendors in the Enterprise Network Firewalls market.
Posted: 12 Jun 2019 | Published: 04 Oct 2018

Forcepoint

Secure Your Office 365 Environment With Forcepoint
sponsored by Forcepoint
WEBCAST: Driving Office 365 adoption is an important goal. Yet few organizations have fully migrated due to concerns around security, compliance, and poor user experience. In this webcast, learn how Forcepoint's Office 365 platform can help you move past these barriers by providing the confidence you need to fully adopt the suite.
Posted: 12 Jun 2019 | Premiered: Jun 12, 2019

Forcepoint

Phishing in the Age of SaaS
sponsored by SonicWall
WHITE PAPER: Phishing attacks have become the primary hacking method used against organizations. While the roots of the attack trace back to the beginning of email adoption, the proliferation of SaaS has led to a resurgence in this hacking method. In this white paper, learn how SonicWall Cloud App Security can help you defend against SaaS phishing attacks.
Posted: 11 Jun 2019 | Published: 11 Jun 2019

SonicWall

A Massively Scalable Approach to Network Security
sponsored by SonicWall
WHITE PAPER: Learn about a new approach securing your network in this white paper. It explores a network-based model for scaling a next-generation firewall (NGFW) that can help provide better performance, increase resiliency and lower TCO.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

SonicWall

Quantifying the Operational and Security Results of Switching to Forcepoint NGFW
sponsored by Forcepoint
RESEARCH CONTENT: The distributed nature of many organizations and the changing nature and scale of threats are creating new pressures related to network security. In this IDC study, learn how Forcepoint Next Generation Firewall can serve as a core component of organizations' efforts to protect their networks against common threats.
Posted: 10 Jun 2019 | Published: 31 May 2017

Forcepoint

Restricting Device Communications to Select Destinations
sponsored by Aeris
PRODUCT OVERVIEW: Gaining security for your IoT devices is a critical step for any deployment, large or small. Keeping your data secure can be business critical. The key to all of this is the ability to restrict device communications only to select web destinations of your choosing. Read on to learn how Aeris ConnectionLock makes this possible.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Aeris

Modernize Your Data Protection
sponsored by Forcepoint
WEBCAST: Navigating your data protection journey can be complex. In this webcast, Angelica Torres-Corral, Senior Product Marketing Manager at Forcepoint gives insights to gaining visibility & control of your data, optimizing a Data Loss Prevention (DLP) software and adopting a more proactive security strategy.
Posted: 10 Jun 2019 | Premiered: Jun 10, 2019

Forcepoint

Executive Brief: Securing the Next Wave of Wireless
sponsored by SonicWall
WHITE PAPER: Learn about securing the next wave of wireless networks in this brief white paper.
Posted: 07 Jun 2019 | Published: 07 Jun 2019

SonicWall

Is a Browser Isolation Solution the New "Sandbox" for Security?
sponsored by Menlo Security
VIDEO: Protecting organizations from web threats has typically been done with a proxy or DNS solution but a new approach has emerged. In this webcast, learn more why remote browser isolation technology adoption is on the rise, 3 critical requirements when selecting a practical isolation solution, and more.
Posted: 07 Jun 2019 | Premiered: 07 Jun 2019

Menlo Security

Apcela Improves Office 365 Performance by 60%
sponsored by Apcela
PRODUCT OVERVIEW: While it's true that digital transformation can lead to productivity growth, the key to unlocking that growth is not purely about the cloud-based applications. Just as important as the applications is the network performance. In this product brief, explore how Apcela's Office 365 Accelerator can improve your network performance.
Posted: 05 Jun 2019 | Published: 05 Jun 2019

Apcela

Beyond Application Performance
sponsored by Apcela
PRODUCT OVERVIEW: Apcela strives to enable enterprises to easily manage application performance in hybrid IT environments. The platform is designed to securely accelerate applications and data between legacy enterprise data centers and the cloud. In this solution brief, explore key benefits that Apecela's Office 365 Accelerator can bring to your business.
Posted: 05 Jun 2019 | Published: 05 Jun 2019

Apcela

Application-Centric Security
sponsored by Nutanix
EBOOK: Relying on antiquated methods of protecting IT is no longer feasible. It's time to consider a new application-centric approach that delivers the protection you need with more agility, more flexibility, and above all, better security. Download this e-book to learn how application-centric security can benefit your organization today.
Posted: 05 Jun 2019 | Published: 05 Jun 2019

Nutanix

Networks Get Strategic with SD-WAN
sponsored by SonicWall
WHITE PAPER: A critical element of SD-WAN solutions today is an integrated security approach. Learn about 1 SD-WAN vendor and their approach to security in this white paper.
Posted: 05 Jun 2019 | Published: 05 Jun 2019

SonicWall

Who needs malware? How Adversaries use Fireless Attacks to Evade your Security
sponsored by CrowdStrike
WHITE PAPER: According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

Cyber Intrusion Services
sponsored by CrowdStrike
WHITE PAPER: In this report, discover how the CrowdStrike Falcon can deliver the visibility and operational expertise necessary to stop breaches before adversaries can take control of your entire network, as well as stories from the front lines of incident response in 2018 and insights that matter for 2019.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

Advanced Threat Protection Beyond the AV
sponsored by Cynet
WHITE PAPER: While large enterprises can cover attack surfaces with a SIEM or employ a staff of skilled SOC analysts, mid-sized organizations have to address similar cyber-risks with significantly less resources. In this white paper, discover strengths and weaknesses of two Advanced Threat Protection approaches: Endpoint Protection and Network Analytics.
Posted: 04 Jun 2019 | Published: 04 Jun 2019


AV Replacement Guide
sponsored by CrowdStrike
WHITE PAPER: Antivirus is virtually universal, so why are so many attacks succeeding? Attackers expect their targets to be running some form of protection and have adapted their tools, techniques and procedures to evade detection. In this white paper, learn the most important elements to consider when replacing an antivirus or endpoint protection solution.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike
1 - 25 of 1229 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement