IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
1 - 25 of 1704 Matches Previous Page  |  Next Page
Enterprise Network Security in a Post-COVID World
sponsored by Cato Networks
ANALYST REPORT: The current global situation did not create network reliability and security initiatives – rather, it merely exacerbated the need for them due to the increase in remote employees. Bandwidth has decreased, and vulnerability has increased, but there may be a way to kill both of these birds with one stone. See this brief to learn about SASE.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Cato Networks

The Clock is Always Ticking: 24/7 Cybersecurity Monitoring Takes its Toll
sponsored by Dell SecureWorks
WHITE PAPER: 65% of Security Operations Center (SOC) professionals say stress has caused them to think about quitting. Needless to say, security is stressful, but relief is possible. Read this white paper to explore the issue of increasing demands on security practitioners and to explore several avenues for automating and reducing workloads for team members.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Dell SecureWorks

Virtual Fireside Chat: Current Work from Home Paradigm
sponsored by McAfee
VIDEO: The security needs of the modern remote workforce require specific protection and access needs that differ from the pre-pandemic workforce that largely worked in offices. Watch this Virtual Fireside Chat to learn more about how security should shift its focus to account for these changing needs.
Posted: 20 Oct 2020 | Premiered: 20 Oct 2020

McAfee

Keeping Tabs on a Constantly Evolving Threat Landscape
sponsored by Dell SecureWorks
WHITE PAPER: Criminal threat actors aren’t just developing their tactics and techniques – they’re updating their ‘business’ strategies, too. Cybercriminal operators are adopting strategies often seen in the legitimate business world to increase return on investment (ROI) and operational efficiency. Jump into this white paper to learn more.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Dell SecureWorks

How to Terminate Your MPLS Contract Early
sponsored by Cato Networks
EBOOK: In this e-book, dive into the nitty gritty of MPLS contracts and uncover tips, steps, and an overall strategy you can use to transition from MPLS to newer, more affordable, agile WAN alternatives without break the bank.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Cato Networks

Cybersecurity in the Remote Work Era: A Global Risk Report
sponsored by Keeper Security Inc
WHITE PAPER: One of the business functions most affected by the spread of COVID-19 and the subsequent era of remote work is IT security. Read this comprehensive research report, Cybersecurity in the Remote Work Era: A Global Risk Report, for a closer look at the new risks to look out for, how security postures have changed, and other key findings.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Keeper Security Inc

Accelerate Threat Resolution With DNS
sponsored by Infoblox
ANALYST REPORT: Security and risk (S&R) professionals rely on DNS for 3 priorities: early detection and blocking of threats, investigation and response to threats and quick identification of compromised devices. How can organizations get a holistic view of the importance of DNS to security? Browse this Forrester report to learn why DNS is crucial in DLP.
Posted: 19 Oct 2020 | Published: 31 Jul 2020

Infoblox

Endpoint Security: Protecting Your Business Wherever It Goes
sponsored by Dell SecureWorks
WHITE PAPER: The spread of COVID-19 forcing organizations to quickly shift towards working from home introduced a litany of new endpoint security risks while also amplifying existing ones. Read this white paper for a closer look at these challenges and best practices for addressing them.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Dell SecureWorks

Empower Your Security Analysts
sponsored by McAfee
WEBCAST: Are you looking to drive SOC efficiency? Are you seeking greater automation, threat hunting and endpoint visibility and control than your current solution delivers? Watch this webcast to go in-depth on security operations with a focus on alert quality, SOC efficiency and securing endpoints at scale.
Posted: 19 Oct 2020 | Premiered: Oct 19, 2020

McAfee

New Account Fraud: Uncovering the Tools And Tactics Of A New Breed Of Scams
sponsored by Buguroo
WHITE PAPER: To enhance customer experience, banks are closing branches in favor of digital services to meet the growing demand of tech-savvy users. A big risk of this change is new account fraud, which is a cyber scam where bad actors use stolen or synthetic identities to open accounts and borrow money. Read this white paper to get a closer look.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Buguroo

Assuring the Promise of a Secure 5G Future: 5 Steps to Taming the Complexity and Exploiting 5G Opportunities
sponsored by Spirent
WHITE PAPER: 5G will radically improve mobile broadband services, enable connectivity to billions of global devices and create an IoT boom. So what’s holding up 5G deployment in real-world use cases? The answer is security – particularly in that 5G networks need to be tested and validated. Read this white paper to learn 5 steps to 5G security.
Posted: 16 Oct 2020 | Published: 31 Jul 2019

Spirent

Analyzing the Economic Benefits of Proofpoint Insider Threat Management
sponsored by Proofpoint
ANALYST REPORT: With cybersecurity talent in short supply, organizations have turned to technology to manage threats. SecOps and risk reduction have both been high on the list of priorities for security professionals, and now they may be able to take these functions a step further. Open this report to learn about Insider Threat Management from Proofpoint.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Proofpoint

Responding to Public Sector Cybersecurity Threats: Views of Public Sector Professionals and Where-to From Here
sponsored by BlackBerry
WHITE PAPER: If you’re working in the public sector in Australia, look at this in-depth report about the state of cybersecurity on the continent, presented by Blackberry. It details key findings, presents critical themes for a rock-solid cybersecurity strategy and outlines the ‘Essential Eight’ Maturity Model for security technology.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

BlackBerry

At the Edge of Change
sponsored by Aruba Networks
RESOURCE: As the volume of network data explodes it must be processed, stored and analyzed nearer its source – at the edge. What do IT decision makers (ITDMs) think of this change, and how are they preparing? What barriers to they need to overcome to utilize the edge? Jump into this infographic to find out.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Aruba Networks

Driving Real Behaviour Change
sponsored by Proofpoint
EBOOK: There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.
Posted: 16 Oct 2020 | Published: 30 Jun 2020

Proofpoint

The New Normal of Securing Remote Workers
sponsored by Palo Alto Networks
WEBCAST: 67% of organizations plan on keeping work from home policies in place long-term or permanently, according to a recent survey. As a result, organizations need to turn their focus to building and scaling a work-from-anywhere workforce. In this webcast, uncover best practices for enabling a work-from-anywhere workforce.
Posted: 16 Oct 2020 | Premiered: Oct 16, 2020

Palo Alto Networks

The Future of Network Visibility
sponsored by Cumulus
WEBCAST: Cloud services and products are putting new demands on networks and infrastructure to scale and support high-availability applications. IT and networking staff are under pressure to alleviate bottlenecks in cloud infrastructure, which can be done by optimizing the network itself. Download this white paper to learn more.
Posted: 15 Oct 2020 | Premiered: Oct 15, 2020

Cumulus

Deliver Business-Critical Communications with Enterprise Grade Private LTE
sponsored by Motorola, Inc.
WHITE PAPER: To address the shortcomings of Wi-Fi, the U.S. Federal Communications Commission (FCC) has approved the use of a new type of radio spectrum– Citizens Broadband Radio Service (CBRS). Download this white paper to learn more about CBRS and Motorola's Nitro platform which is powered by CBRS.
Posted: 15 Oct 2020 | Published: 09 Oct 2020

Motorola, Inc.

Aruba 360 Secure Fabric
sponsored by TechData
DATA SHEET: Today, a number of technology disruptions – mobile, BYOD, virtualization, cloud, big data, and IoT – have rendered a perimeter-based security approach insufficient. Modern threat defense requires constant assessment of device risk with analytics-ready secure infrastructure. View this data sheet to learn about Aruba 360 Secure Fabric.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

TechData

The Future of Network Security Is in the Cloud
sponsored by Palo Alto Networks
ANALYST REPORT: Network security architectures were designed for an era that is waning, and they are unable to effectively serve the dynamic secure access requirements of digital business. In this Gartner report, learn why security and risk management leaders should consider a converged, cloud-delivered, secure access service edge to address this shift.
Posted: 15 Oct 2020 | Published: 30 Aug 2019

Palo Alto Networks

Market Guide for Zero Trust Network Access
sponsored by Palo Alto Networks
RESOURCE: ZTNA augments traditional VPN technologies for application access and removes the excessive trust once required to allow employees and partners to connect and collaborate. Piloting ZTNA projects as a part of a SASE strategy or to expand remote access may be a wise move. Read the full Gartner article to learn the specifics of their findings.
Posted: 15 Oct 2020 | Published: 08 Jun 2020

Palo Alto Networks

The Industry’s First Next-Generation SD-WAN
sponsored by Palo Alto Networks
WEBCAST: Cloud adoption, high performance broadband availability and the need for infrastructure automation are 3 fundamental factors driving network transformation today. Unfortunately, legacy SD-WAN solutions aren’t cutting it. In this webcast, learn how Palo Alto Networks, with CloudGenix, is delivering the next-generation of SD-WAN.
Posted: 15 Oct 2020 | Premiered: Oct 15, 2020

Palo Alto Networks

The 10 Tenets of an Effective SASE Solution
sponsored by Palo Alto Networks
EBOOK: In order for organizations to protect themselves from today’s security threats, they need to deploy multiple point products. However, managing these point products creates an administrative burden that introduces cost, complexity and gaps in security. In this e-book, learn how Secure Access Service Edge (SASE) can help address this challenge.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

Palo Alto Networks

Palo Alto Networks CloudGenix SD-WAN: ROI
sponsored by Palo Alto Networks
ANALYST REPORT: Forrester recently spoke with multiple Palo Alto Networks customers regarding their investment in CloudGenix SD-WAN as part of a Total Economic Impact (TEI) study. Download this Forrester report to explore key findings from the study.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

Palo Alto Networks

The 5 Phases of Incident Response
sponsored by BlackBerry
WHITE PAPER: According to an IBM study, the “vast majority” of organizations today are unprepared to respond effectively to a serious security incident. Most often, this is due to chronic resource issues and inadequate planning. Get in the know – read this white paper to learn the 5 phases of incident response and how to implement them.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

BlackBerry
1 - 25 of 1704 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info