IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
1 - 25 of 1892 Matches Previous Page  |  Next Page
Why You Shouldn't Gamble on Security When Moving to the Cloud
sponsored by Zscaler
VIDEO: Join this 15-minute webinar to explore the elements that make up a comprehensive security platform, and learn how to enable direct access to the internet and cloud applications for all users in all locations, without gambling on security.
Posted: 15 Jan 2019 | Premiered: 11 Jan 2019

Zscaler

Mobile Endpoint Security
sponsored by Lookout
DATA SHEET: Download this white paper to learn about a comprehensive mobile endpoint security strategy that uses AI to close any potential security gaps – protecting your data at all levels.
Posted: 15 Jan 2019 | Published: 15 Jan 2019

Lookout

DomainTools Guide to Threat Hunting with Splunk and Phantom
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. The first step to integrating threat hunting into your organization is establishing a true threat hunting program. In this webcast, learn about a number of threat hunting essentials.
Posted: 14 Jan 2019 | Premiered: Jan 14, 2019

DomainTools

The Beginner's Guide to Threat Hunting
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents. In this webcast, learn about the key steps to creating a threat hunting process.
Posted: 11 Jan 2019 | Premiered: Dec 31, 2018

DomainTools

SANS Fingerprinting Threat Actors with Web Assets
sponsored by DomainTools
WEBCAST: Threat intelligence helps companies better predict the actions of threat actors to stay ahead of their attacks. In order to do this, organizations must learn more about the enemy. In this webcast, SANS instructor Rebekah Brown and Data Systems Engineer at DomainTools, Mike Thompson discuss ways to better fingerprint threat actors.
Posted: 11 Jan 2019 | Premiered: May 31, 2018

DomainTools

SANS 2018 Threat Hunting Survey Results
sponsored by DomainTools
WHITE PAPER: Threat hunting is a focused and iterative approach to searching out, identifying and understanding adversaries who have entered the defender's networks. Threat hunting is a hypothesis-driven approach to validating the collection, detection and analysis of data ahead of an incident. In this white paper, learn about all things threat hunting.
Posted: 11 Jan 2019 | Published: 30 Sep 2018

DomainTools

The Beginner's Guide to Mitigating Phishing Attacks
sponsored by DomainTools
WEBCAST: Phishings attacks are a common form of fraud that is most commonly done by disguising malicious links to distribute malware. In this webcast, Corin Imani, Senior Security Advisor at DomianTools discusses real world examples, the steps to executing a phishing attack and ways to remediate a phishing attack.
Posted: 10 Jan 2019 | Premiered: Jan 10, 2019

DomainTools

Mission Possible: Decouple Private Application Access from Network Access
sponsored by Zscaler
WHITE PAPER: Download this white paper to learn about a software-defined perimeter (SDP) that uses zero trust technology to securely connect specific users to specific apps, and explore the benefits of upgrading legacy network architecture.
Posted: 10 Jan 2019 | Published: 10 Jan 2019

Zscaler

3 Steps to Better Cloud Performance
sponsored by Digital Realty
PRODUCT OVERVIEW: Download this white paper to discover 3 ways you can boost cloud performance. Plus, learn about a tool that directly connects you to major cloud providers—while bypassing the public internet—keeping your mission-critical workloads safe.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

Digital Realty

Zscaler: Use Cases for Gateway Security Stack as a Service
sponsored by Zscaler
CASE STUDY: Download this white paper to learn how you could shift from a hub-and-spoke architecture to an agile, direct-to-internet architecture by using a gateway security stack as a service.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

Zscaler

The Suspicious Seven: A Network Visibility Checklist
sponsored by OneNeck IT
RESOURCE: Discovering key insights into attackers' behaviors and location within your environment can help you prevent a security event from becoming a full-blown data breach. This checklist provides 7 of the most common types of network blind spots and suspicious activities.
Posted: 07 Jan 2019 | Published: 31 Mar 2017

OneNeck IT

Computer Weekly – 8 January 2019: Technology innovation in music
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.
Posted: 04 Jan 2019 | Published: 04 Jan 2019

ComputerWeekly.com

Siemens on their Secure Cloud Transformation with Zscaler
sponsored by Zscaler
WEBCAST: Watch this brief video to hear insights from Siemens' VP of Global IT Infrastructure, Frederik Janssen about the company's re-architecting of its global hub-and-spoke network to a direct-to-cloud architecture.
Posted: 03 Jan 2019 | Premiered: Jan 3, 2019

Zscaler

Competitive Edge in the Cloud
sponsored by Akamai Technologies
EBOOK: Businesses rely on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business aren't also introducing security risks, impacting customer experience (CX), or costing more than anticipated? This e-book explains how cloud delivery platforms are designed to make the cloud work for you.
Posted: 27 Dec 2018 | Published: 31 Aug 2018

Akamai Technologies

Making a DDoS Protection Plan: 8 Best Practices
sponsored by Akamai Technologies
WHITE PAPER: Having a DDoS protection plan in place when an attack strikes will make the difference between organization-wide panic and an orderly and timely response that keeps business as usual. In this white paper, learn about 8 best practices for building and maintaining a DDoS protection plan.
Posted: 27 Dec 2018 | Published: 30 Sep 2017

Akamai Technologies

Frost and Sullivan: Global Bot Risk Management Award
sponsored by Akamai Technologies
ANALYST REPORT: In this Frost & Sullivan award announcement, explore their research of automated bot attacks, the expected market growth of BRM products and vendors, and why Akamai Technologies was awarded Market Leader.
Posted: 26 Dec 2018 | Published: 26 Dec 2018

Akamai Technologies

Enforce a Zero Trust Security Model in Today's Hostile Environment
sponsored by Akamai Technologies
WHITE PAPER: As infrastructure becomes more permeable to enable new business models, cyber criminals are becoming more sophisticated, and incentivized to find ways to circumvent security measures. Traditional perimeter security weren't designed for today's reality. This white paper describes a security paradigm for today's hostile environment: zero trust.
Posted: 21 Dec 2018 | Published: 28 Feb 2018

Akamai Technologies

Using Splunk Adaptive Response
sponsored by Splunk
WHITE PAPER: Adaptive response enables security analysts – from hunters to less skilled security staff – to better handle threats by speeding the time to make decisions and actions when responding and adapting to them. Read this white paper to learn about the adaptive response framework capabilities and adaptive response initiative partner integrations.
Posted: 17 Dec 2018 | Published: 31 Dec 2018

Splunk

DNS Security with Meraki MR & Umbrella
sponsored by Cisco Meraki - APAC
WHITE PAPER: This white paper explores how to update DNS security so that you can address the potential attacks from malicious actors hiding in the bevy of DNS traffic. Find out what steps you can take to improve your security posture, and learn about the integration of Cisco Umbrella and Meraki's wireless access points.
Posted: 12 Dec 2018 | Published: 30 Sep 2018

Cisco Meraki - APAC

SDN & SD-WAN: Transform Network Infrastructure and Security
sponsored by Dimension Data
EGUIDE: In this expert e-guide, CIO and principal analyst John Burke of Nemertes Research discusses what key considerations to keep in mind when updating your network infrastructure and security with SD-WAN.
Posted: 11 Dec 2018 | Published: 06 Dec 2018

Dimension Data

6 Steps for Building an IoT-Ready Network
sponsored by Cisco Meraki - APAC
WHITE PAPER: Check out this white paper to learn about new cloud-managed network technologies that can enable governments to support the exponential growth of sensors, cameras and other IoT-enabled devices without dramatic increases in network support staff and expenses.
Posted: 10 Dec 2018 | Published: 10 Dec 2018

Cisco Meraki - APAC

Network Security Concerns in a Hybrid Cloud Architecture
sponsored by HPE VMware Intel
EGUIDE: In this expert e-guide, find out what various analysts and network engineers are saying about networking in hybrid cloud architectures, DDoS threats, and other pressing concerns for network operations.
Posted: 06 Dec 2018 | Published: 06 Dec 2018

HPE VMware Intel

Cisco & Google Cloud: Modernize your Enterprise
sponsored by Google
RESOURCE CENTER: In this resource center, you'll learn how Cisco's Hybrid Cloud Platform for Google Cloud is designed to help you create a consistent environment across both public cloud and on-premise assets so that you can rapidly develop and deploy apps anywhere you need to.
Posted: 05 Dec 2018 | Published: 05 Dec 2018

Google

Modernize Your Network with Red Hat Ansible Network Automation
sponsored by Red Hat
WHITE PAPER: Even as underlying technologies have evolved, network management has remained largely unchanged for years. Networks are typically built, operated, and maintained manually. Find out how to automate your network with a simple but powerful IT automation platform so that you can provide a high level of service, improve compliance, and more.
Posted: 21 Dec 2018 | Published: 21 Dec 2018

Red Hat

The Cloud Networking Guide: Why your Access Network Serves you Better in the Cloud
sponsored by Aerohive Networks
WHITE PAPER: This guide examines the characteristics and benefits of cloud-managed access networks as a subset of cloud IT services to help you decide whether cloud networking is right for your organization, or if it's better to stick with more traditional deployment models.
Posted: 05 Dec 2018 | Published: 05 Dec 2018

Aerohive Networks
1 - 25 of 1892 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement