IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
1 - 25 of 1314 Matches Previous Page  |  Next Page
Rise of the Machines: Transforming Cybersecurity Strategy for the Age of IoT
sponsored by Forescout
WHITE PAPER: Information technology (IT) & operational technology (OT) were, for a long time, regarded as two distinct areas within an organization. Now these two domains are interconnected, thanks to the Internet of Things (IoT) revolution.But what are these “things”, what do they have to say & are we listening? Read on to learn more.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Forescout

How to Use Evaluation Factors to Select the Best Microsegmentation Model
sponsored by ShieldX
ANALYST REPORT: Security and risk management leaders deploying microsegmentation face difficult technical choices, which can be facilitated by Gartner's 4 microsegmentation models. Download Gartner’s research to select which of the 4 models is best suited to your enterprises' needs.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

ShieldX

Autonomous Networks Lay the Foundation for Digital Transformation
sponsored by Extreme Networks
ANALYST REPORT: Organizations are embracing new technology to enable flexible work styles, new business models and rapid service delivery. Leading firms are treating autonomous networking as the foundation for creating hyper-adaptive organizations. In this research report, find 3 things that IT should look for when assessing an autonomous network.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Extreme Networks

Fabric Networking for Dummies
sponsored by Extreme Networks
EBOOK: Many organizations still use a legacy network infrastructure that is inadequate for today’s ever-changing business. However, fabric networking can help to address the need for a network that adapts and changes on demand. In this e-book, learn everything you need to know about fabric networking.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

Extreme Networks

Quantifying the Value of Extreme Networks: The Impact to Healthcare Environments
sponsored by Extreme Networks
ANALYST REPORT: The healthcare industry is advancing at a rapid pace. With these advancements, the network is becoming more relevant to healthcare organizations and enabling key initiatives like digital transformation, IoT, and cloud computing. This ESG report validates Extreme’s ability to help healthcare organization overcomes these challenges.
Posted: 11 Nov 2019 | Published: 30 Sep 2019

Extreme Networks

The Future of Network Security Is in the Cloud
sponsored by Apcela
ANALYST REPORT: Network and network security architectures were designed for an era that is waning, and they are unable to effectively serve the dynamic secure access requirements of digital business. In this Gartner report, learn why security and risk management leaders need a converged cloud-delivered secure access service edge to address this shift.
Posted: 11 Nov 2019 | Published: 30 Aug 2019

Apcela

Common and Best Practices for SOCs: Results from the 2019 Survey
sponsored by Siemplify
WHITE PAPER: In the 2019 edition of the Security Operations Center (SOC) Survey, security leaders & professionals provided responses in order to better understand:Common barriers & best practicesWhere to focus to enhance security What to highlight when requesting additional SOC resourcesDownload the report to uncover the key results.
Posted: 08 Nov 2019 | Published: 08 Nov 2019

Siemplify

K-12 Education Playbook: Game Day is Every Day When the Network is Involved
sponsored by Extreme Networks
WHITE PAPER: Educational technology is enabling primary and secondary school districts to reshape how students are taught. Therefore, school networks must adapt to support these technologies. In this white paper, learn how Extreme Networks provide campuses with the elements to create open, software-driven educational networking solutions.
Posted: 08 Nov 2019 | Published: 08 Nov 2019

Extreme Networks

Healthcare Playbook: Game Day is Every Day When the Network is Involved
sponsored by Extreme Networks
WHITE PAPER: It is no longer sufficient for healthcare networks to be fast and reliable; real-time health systems require data and intelligence to achieve proactive situational awareness and clinical efficiency. In this white paper, learn how with an autonomous network, healthcare providers can improve business agility and clinical operations.
Posted: 08 Nov 2019 | Published: 08 Nov 2019

Extreme Networks

Aeris ConnectionLock: Restricting Device Communications to Select Destinations
sponsored by Aeris
PRODUCT OVERVIEW: Without any network restrictions in place, IoT devices can send data to or receive data from any unintended destination. This increases the risk of application data getting compromised. In this brief, learn about The Aeris Intelligent IoT Network which can help your organization restrict data delivery to only designated IP addresses or endpoints.
Posted: 08 Nov 2019 | Published: 31 May 2019

Aeris

Network Security for SD-WAN
sponsored by Cisco Umbrella
EBOOK: In today’s business environment, satellite offices are more important than ever. However, in most organizations, security at the branch office is limited, if it exists at all. In this e-book, find out how to easily deliver network security for today's evolving networks, and protect remote and roaming users with cloud-delivered protection.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Cisco Umbrella

Aeris Connectivity-Aware OTA APIs: Streamlining OTA Update Process
sponsored by Aeris
PRODUCT OVERVIEW: Device makers use a combination of homegrown processes and tools to deliver remote updates to IoT devices. However, a key challenge is the lack of visibility into the device’s connectivity information. In this brief, learn how Aeris Intelligent IoT Network can help organizations solve visibility issues.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Aeris

Cyber Hygiene: Doing the Basics with Microsoft
sponsored by Snow Software
WEBCAST: Cybersecurity is an easily defined term but achieving a secure environment & security protocol takes diligent planning. So, what are the basics of cyber hygiene & what steps must my organization take towards cybersecurity?In this webinar, leverage industry expertise to uncover some of the fundamentals of cyber hygiene.
Posted: 07 Nov 2019 | Premiered: Nov 7, 2019

Snow Software

Italy's Largest Service Provider Leverages Security to Address Cybercrime Threats
sponsored by Cisco Umbrella
CASE STUDY: As multiple studies revealed that Italy’s businesses grew increasingly vulnerable to data breaches & cyberattacks, Telecom Italia (TIM) was already working on a way to protect its 600,000+ customers from cybercrime. In this case study, discover how TIM was able to leverage security to meet this challenge.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Cisco Umbrella

The No-Nonsense Guide to Security Operations Metrics
sponsored by Siemplify
WHITE PAPER: Given that it’s difficult to define & measure success when it comes to cybersecurity, companies must carefully consider the appropriate KPIs to use when setting their security goals. In this guide, learn about how business, operational & improvement metrics can measure the efficacy of your cybersecurity operations program.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Siemplify

Remote Vendor Access: A Growing Attack Vector
sponsored by Cyber-Ark Software
WHITE PAPER: Organizations today rely on 3rd party vendors more than ever. Although these arrangements can provide valuable services, they also bring with them significant security considerations and risk. In this white paper, learn about CyberArk Alero which is designed to provide fast, easy and secure privileged access for remote vendors.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Cyber-Ark Software

The CISO’s Handbook for Certificate Management
sponsored by AppViewX
WHITE PAPER: Certificate-related outages usually stem from persistent cases of mismanagement. Even the simplest of errors have large impacts. However, most events can be circumvented by simply using a certificate management system. In this white paper, uncover 3 steps technology leaders can take to implement certificate management.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

AppViewX

Vormetric Data Security Platform Architecture
sponsored by Thales
WHITE PAPER: As enterprise security teams struggle to defend against more frequent & intricate attacks, data encryption has become a vital safeguard. When it comes to encryption, configuration is a constant trade-off between security & complexity. Read on for an overview of the advantages & limitations of different encryption approaches.
Posted: 06 Nov 2019 | Published: 31 Jul 2019

Thales

Network Security Made Simple
sponsored by Cisco Umbrella
EBOOK: The volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses are not enough. In this e-book, discover challenges facing today’s security professionals and explore some simple actions you can take to reduce malware, simplify security and improve network performance.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Cisco Umbrella

Certificate Lifecycle Management and Automation
sponsored by AppViewX
WHITE PAPER: Certificate management is a complex process. Without constant management, certificates are vulnerable to attacks, breaches, & system downtime. This white paper outlines why you should automate the certificate lifecycle, the consequences for not applying it & 5 steps to quickly implement automation in your organization.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

AppViewX

Elevating Enterprise Security with Fidelis Cybersecurity: Endpoint Security Capabilities
sponsored by Fidelis
ANALYST REPORT: When it comes to developing a security strategy, organizations should strive to view their entire environment as a single landscape. Critical to this is endpoint security, which enables organizations to monitor activity, track behavior & detect threats. In this paper, dive deeper into the advantages of endpoint security capabilities.
Posted: 05 Nov 2019 | Published: 30 Sep 2019

Fidelis

Cisco Umbrella: Reporting You Can Count On
sponsored by Cisco Umbrella
RESOURCE: Deploying a Cisco Umbrella free trial is simple, but it can be hard to figure out where to start. Download this resource to find 3 reports that will help you get started.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Cisco Umbrella

Learnings from The Frontlines: 4 Steps to Protect What Attackers Are Really After
sponsored by Cyber-Ark Software
WHITE PAPER: Forrester estimates that 80% of security breaches involve privileged credentials & it makes sense why: attackers are targeting those who have access to sensitive data & infrastructure. In this guide, discover how to think like an attacker in order to develop a security strategy to protect your critical assets.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Cyber-Ark Software

Riverbed SD-WAN: Simple, Powerful, Transformative
sponsored by Riverbed
VIDEO: Every once in a while, a technology emerges that greatly simplifies how things get done. For IT networking professionals, Riverbed SD-WAN can be one of those technologies. It can help to improve how networks are designed, deployed, and managed. Watch this quick video to learn more about key features of Riverbed SD-WAN.
Posted: 05 Nov 2019 | Premiered: 17 Jul 2018

Riverbed

10 Must-Ask Questions When Choosing a SOAR Solution
sponsored by Siemplify
RESOURCE: With an increasing number of SOAR solutions in the market, each with a different approach, asking the correct questions to get the right platform is key. Dive into this brief infographic to discover the 10 questions you should ask when selecting the best SOAR platform for your organization.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Siemplify
1 - 25 of 1314 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement