IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
1 - 25 of 1535 Matches Previous Page  |  Next Page
A Quick History of IoT Botnets
sponsored by Radware
WHITE PAPER: Gartner estimates that there will be 20 billion connected devices by 2020. Access this resource to learn about the history of IoT botnets and how the rise of connected devices can bring upon the rise of dangerous bot attacks.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Radware

Evolving Threat of Botnets, Web Scraping and IoT Zombies
sponsored by Radware
WHITE PAPER: By 2020, the number of IoT units installed could reach as many as 20 billion, according to Gartner. This resource examines the severity of dangerous bots, which exploit IoT devices as weapons of attack.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Radware

The Gorilla Guide to Linux Networking 101
sponsored by Cumulus
WHITE PAPER: In this white paper, gain valuable insights into Linux networking basics so your organization can meet the growing demands of users by connecting their applications and data as reliably, securely and efficiently as possible.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Cumulus

Mitigating the SSL/TLS Cybersecurity Threat
sponsored by Radware
EBOOK: 75% of web traffic will be encrypted by 2019, according to NSS Labs. Utilize this e-book to learn how to combat the growing number of complex encrypted web attacks as well as mitigate SSL/TLS cybersecurity threats.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Radware

Why a Unified Approach to IT and OT Network Security is Critical
sponsored by Skybox Security
WHITE PAPER: One of the biggest challenges organizations are struggling with is limited visibility of the IT-OT attack surface. This whitepaper examines the challenges, implications and benefits of a unified approach to managing security in converged IT and OT networks.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Skybox Security

All Together Now: Securing the Internet of Things
sponsored by Juniper Networks
WHITE PAPER: IoT is at the center of many organizations' digital transformation strategies, but often without consideration of the fact that security for IoT is in its infancy. This Nemertes Research report offers insight into the security challenges within IoT and reveals 2 steps for improving security approaches.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Juniper Networks

Vulnerability and Threat Trends Report 2018
sponsored by Skybox Security
RESEARCH CONTENT: This 18-page research report examines trends in vulnerabilities, exploits and threats in order to better align your security strategy with the current threat landscape.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Skybox Security

IoT and the New Security Challenge
sponsored by Juniper Networks
WEBCAST: According to a Juniper Networks survey, 94% of enterprises are changing the way they think about security due to IoT. Explore this webcast to learn about IoT and the need to consider security within your organization's IoT strategy.
Posted: 19 Feb 2018 | Premiered: Feb 19, 2018

Juniper Networks

Making the case for a cloud access security broker (CASB)
sponsored by Oracle Corporation
WHITE PAPER: CASBs are one of the fastest growing security technologies today. According to Gartner, by 2020, 85% of large enterprises will use a cloud access security broker for their cloud services. Explore this resource to learn about why CASBs are important for improving your cloud security and explore key cost considerations.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Oracle Corporation

8 Essential Secure Web Gateway Characteristics
sponsored by Symantec
WHITE PAPER: According to Symantec's Shadow Data Report, most CIOs think their organizations use around 30 to 40 cloud apps; in reality, the average number is 1,232. This resource offers 8 essential characteristics of secure web gateways to ensure effective cloud security.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Symantec

The 12 Essential Tasks of Active Directory Domain Services
sponsored by One Identity
WHITE PAPER: This resource outlines the 12 essential tasks of Active Directory (AD) Domain Services and how utilizing AD can help improve your security needs.
Posted: 16 Feb 2018 | Published: 16 Feb 2018

One Identity

Active Directory Management and Security
sponsored by One Identity
WHITE PAPER: Many organizations expect powerful access controls from their networking operating systems. This resource offers optimized Windows security by implementing an effective IAM approach, including, access control, password management and more.
Posted: 16 Feb 2018 | Published: 16 Feb 2018

One Identity

Large Network Deployment And Mobile Footprint Strategy
sponsored by Entrust, Inc.
CASE STUDY: Explore this case study to gain insight into how a technology provider transitioned to the cloud securely, while protecting sensitive data across its corporate network.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

Entrust, Inc.

Cybersecurity Is Not About Technology: It's about the Business of Cyber Crime. Everywhere.
sponsored by Juniper Networks
WHITE PAPER: Inside this white paper, access your cybersecurity checklist to learn why traditional defenses are not working and how to prevent the increase of cybercrime in today's digital era.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

Juniper Networks

Who needs malware? How Adversaries use Fireless Attacks to Evade your Security
sponsored by CrowdStrike
WHITE PAPER: According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

CrowdStrike

Certificate Management: Policy & Automation
sponsored by Entrust, Inc.
WHITE PAPER: PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. This white paper offers best practices for PKI certificate management policy and how organizations can simplify and streamline their implementation process.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Entrust, Inc.

Public Key Infrastructure (PKI) Buyer's Guide
sponsored by Entrust, Inc.
RESOURCE: Implementing cost-effective security strategies that meet operational needs of end-users while complying with regulatory requirements is challenging. This resource assists organizations in the selection of the best PKI strategy to meet business and security needs.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Entrust, Inc.

Protect High-Value Assets From Internal Security Risks
sponsored by Hewlett Packard Enterprise
RESOURCE: Access this resource to discover how your organization can gain back network security confidence regarding high-value assets and corporate data with user and entity behavior analytics.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Hewlett Packard Enterprise

UEBA Use Case: Insider Attack Identification
sponsored by Hewlett Packard Enterprise
RESOURCE: Allow this resource to teach you how network monitoring through behavioral analytics or user and entity behavior analytics (UEBA) can help detect and prevent advanced attacks.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

Hewlett Packard Enterprise

Compromised User and Host Detection Using Behavioral Analytics
sponsored by Hewlett Packard Enterprise
RESOURCE: Allow this resource to teach you how network monitoring through multi-dimensional analytics enables the creation of high-fidelity entity risk profiles and shrinks the time to detect attacks.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

Hewlett Packard Enterprise

Web Application Firewall
sponsored by NSS Labs
RESOURCE: The web application firewall market is projected to grow to over $650M in 2019, according to NSS Labs. This resource offers an overview of protecting networks and web applications by utilizing web applications firewalls.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

NSS Labs

AV Replacement Guide
sponsored by CrowdStrike
RESOURCE: This guide is designed to help security professionals who are considering replacing their current antivirus and/or endpoint protection programs.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

CrowdStrike

Case Study: Growing Regional Bank Preempts Potential Cyber Attackers
sponsored by Illusive Networks
CASE STUDY: How do you get out in front of growing cyber risk without falling behind on your customer experience needs? This case study details Illusive Network's Deception Management System, a response tool which can help improve your organization's ability to identify and investigate a potentially malicious activity.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

Illusive Networks

Smart PoE Switches
sponsored by D-Link
EBOOK: Smart Power over Ethernet (PoE) switches are ideal for larger, more complex applications such as IP surveillance networks. This resource highlights 7 reasons your organization should consider upgrading to PoE switches today.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

D-Link

Top 5 Reasons to Upgrade your Switches
sponsored by D-Link
RESOURCE: For IT network pros, managed switches optimize highly demanding infrastructures, giving you greater control and more reliable connections. In this resource, discover the top 5 reasons you should upgrade your switches.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

D-Link
1 - 25 of 1535 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement