IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
1 - 25 of 1668 Matches Previous Page  |  Next Page
NTT Ltd. and Palo Alto Networks – Secure Access Ecosystem
sponsored by NTT
DATA SHEET: Today’s businesses have to address a rapid increase in mobile workers, the sudden need for additional branch offices, cloud adoption, data security needs and the growing enforcement of governance, risk and compliance laws. How can they handle all these challenges? View this data sheet to see how NTT and Palo Alto Networks may be able to help.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

NTT

Top 10 Use Cases for User and Entity Behavior Analytics
sponsored by Exabeam
WHITE PAPER: Enterprises are implementing user and entity behavior analytics (UEBA) to determine what is “normal” behavior on a network. Gartner projects a 48% compound annual growth rate for this technology. Want to learn more about UEBA? Read this white paper to learn the top 10 use cases for UEBA and see if it’s right for your security architecture.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Exabeam

ExtremeCloud IQ Cloud Services Platform
sponsored by Extreme Networks
DATA SHEET: Extreme Networks ExtremeCloud IQ Cloud Services Platform is a globally distributed cloud-based infrastructure offered as Software-as-a-Service (SaaS). ExtremeCloud IQ provides access to configuration and network monitoring statistics for all managed Extreme Networks devices. Download this data sheet to learn more.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Extreme Networks

Taking Control of Your Post-COVID-19 Budget
sponsored by DomainTools
WEBCAST: With attackers taking advantage of the pandemic, threat surfaces increasing with remote work and budgets being reduced or postponed, security teams face a trifecta of challenges in maintaining or obtaining the resources they need to defend their organization. Watch this webcast featuring a CISO to learn how to make the most of the tools you have.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

DomainTools

Detecting and Defending Against SSRF
sponsored by WhiteHat Security
WEBCAST: Server-side request forgery (SSRF) attacks are a critical threat to be aware of in today’s landscape – targeting restricted information by manipulating server sent requests in order to gain access. This WhiteHat webinar provides a comprehensive overview of SSRF, how it operates, common weak points, and how to defend against it – watch now.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

WhiteHat Security

ExtremeCloud IQ for Manufacturing
sponsored by Extreme Networks
DATA SHEET: Cloud-driven network technologies can help to support the specific requirements of manufacturing operations and their complex environment today. In this brief, learn how ExtremeCloud IQ leverages 4th generation cloud architecture, equipping manufacturing teams with a solution that can help deliver flexibility, agility, security and technology.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Extreme Networks

Why Now is the Time to Move to Cloud Managed Networks
sponsored by Extreme Networks
WHITE PAPER: The move to cloud-managed networks has gained momentum over the past few years, but 2020 has accelerated interest and deployment of such solutions. Why? More organizations than ever are seeking operational flexibility and bottom-line impact. In this white paper, explore 5 benefits that are driving growth and adoption of cloud managed networks.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Extreme Networks

Smart Buildings: Establishing Trust with IoT Security
sponsored by Archetype
RESOURCE: An increasing number of business leaders now see the value of using IoT devices to provide data and insight into the indoor environment, and they’re calling these new smarter spaces ‘connected spaces’. So, what are the benefits of these new spaces, and what hurdles need to be overcome? Read this article to find out.
Posted: 24 Nov 2020 | Published: 24 Sep 2020

Archetype

Preventing Insider Threats with UEBA
sponsored by Exabeam
WHITE PAPER: Protecting against insider threats is a tough task for organizations, mainly because harm can be caused maliciously or unintentionally. Tracking user behavior is the key to success in mitigating insider threats, and by reading this white paper, you can learn about User and Entity Behavior Analytics (UEBA) a platform that may be up to the task.
Posted: 24 Nov 2020 | Published: 08 Sep 2020

Exabeam

How to Identify Threats Faster and Increase Productivity
sponsored by DomainTools
WEBCAST: With the rapid-fire speed of alerts and multitasking required in infosecurity, security operation center (SOC) professionals often must determine the potential outcomes of events with limited context. How can your teams reduce operational risk and be more productive? Watch this webinar to learn how to address this challenge and others.
Posted: 24 Nov 2020 | Premiered: Nov 24, 2020

DomainTools

How to Build a Robust Cyber Threat Intelligence Program
sponsored by DomainTools
WEBCAST: Organizations looking to implement cyber threat intelligence (CTI) grapple with two challenges: lack of trained staff or lack of skills needed to fully utilize CTI, and lack of time to implement new processes. Watch this SANS webinar to see how to develop an effective CTI program despite these challenges.
Posted: 24 Nov 2020 | Premiered: Aug 18, 2020

DomainTools

IDC Technology Spotlight: Threat Visibility and Management are Critical in Managed Security Services
sponsored by Comcast Business
RESOURCE: As cyberattackers become better, faster and more sophisticated, security teams are forced to upgrade their ability to detect and respond to intrusions. These professionals face a growing number of security alerts that may or may not reveal a true threat. Read this article to see how managed service providers may be able to help.
Posted: 24 Nov 2020 | Published: 05 Oct 2020

Comcast Business

The Role of Wi-Fi in Reimagining the Workplace
sponsored by Energy Communications
WHITE PAPER: Organizations are planning for a partial return to the office (if employees choose to do so) that will precede the inevitable era of the hybrid workplace. It appears that one technology will be at the center of this workplace transformation, and that technology is Wi-Fi. View this white paper to see where Wi-Fi will play its role.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Energy Communications

3 Steps to Building Business-Centered Data Protection
sponsored by InteliSecure
EGUIDE: Even though research suggests that security focused on protecting the perimeter is obsolete, organizations continue to invest resources towards this effort. Modern threats require a shift in cybersecurity mindset – an approach focused on protecting the people. Read on to learn more about this approach and how to implement it.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

InteliSecure

Cyber Resilience as a Competitive Advantage
sponsored by Comcast Business
RESOURCE: Now more than ever, customers are attuned to the impact of security threats to their own data. As a result, having strong cyber resilience may grant your organization an unexpected competitive advantage. Read this article to learn 6 cybersecurity best practices that will build your resilience in a way that can help you stand out from the crowd.
Posted: 24 Nov 2020 | Published: 08 Oct 2020

Comcast Business

5 Ways a CISO Can Tackle the Cybersecurity Skills Shortage Now
sponsored by Claranet
WHITE PAPER: Every CISO knows that finding skilled security staff these days is not only hard but getting harder. In this white paper, uncover 5 practical steps you can take to help you tackle the cybersecurity skills shortage now.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Claranet

DDoS Response Guide
sponsored by Radware
WHITE PAPER: DDoS attacks can flood your network with malicious traffic, bringing applications down and preventing legitimate users from accessing your services. The good news, however, is that there is plenty to be done about it. In this white paper, explore 3 steps that will allow you to minimize the impact of a DDoS attack.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Radware

Farsight DNSDB Overview
sponsored by Farsight Security
VIDEO: The internet is powered by the domain name system, also known as DNS. In this short video, learn about DNS and how Farsight Security’s DNSDB can help security professionals gain global DNS visibility.
Posted: 24 Nov 2020 | Premiered: 13 Mar 2018

Farsight Security

Real World SD-WAN from MTM Technologies + CISCO
sponsored by MTM Technologies
VIDEO: Recently, MTM Technologies deployed a SD-WAN solution to a financial services company with multiple locations across the U.S. and Canada. They were looking to reduce costs associated with their existing MPLS-based WAN through the power of software-defined networking on the WAN. Download this brief video to learn more.
Posted: 24 Nov 2020 | Premiered: 24 Nov 2020

MTM Technologies

Fixed vs. Chassis-Based Switching
sponsored by Extreme Networks
WHITE PAPER: For years, a debate has raged on the pros and cons of fixed stackable switches versus chassis-based switches within the enterprise wiring closet. In this white paper, review the benefits and applicability of fixed versus Chassis-based Switching within the access layer of the enterprise campus network.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Extreme Networks

Digital Transformation Efforts Powered by Network Automation, Simplicity, Security, And Intelligence
sponsored by Extreme Networks
CASE STUDY: ŠKODA AUTO began to outgrow their network infrastructure as a result of their growth and expansion. Their previous network infrastructure was complex, with operations spread across multiple networks. In this case study, learn how ŠKODA AUTO was able to condense all their networks into one with the help of Extreme Networks.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Extreme Networks

Cybersecurity: The Human Challenge
sponsored by Sophos
ANALYST REPORT: If your organization is looking for a direction to turn regarding cybersecurity, then it may help to see what others have been prioritizing. View this Sophos report to learn perspectives from 5,000 IT managers across 26 countries. It will provide brand new insights into the state of cybersecurity skills and resources across the globe.
Posted: 23 Nov 2020 | Published: 30 Oct 2020

Sophos

Remote Working Is New To A Lot Of Organizations, But Not To Williams Racing
sponsored by Dtex
CASE STUDY: It’s no secret that to be successful in Formula 1, racing teams need to have a cohesive, synchronized strategy on race day – but what about the team members that aren’t at the track on race day? Read this case study to see how Williams Racing protects their remote workers and the role cybersecurity plays in their success.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Dtex

NJ TRANSIT Deploys Robust Network Solution to Ensure Critical Uptime And Security
sponsored by Extreme Networks
CASE STUDY: Similar to the way customers heavily depend on NJ TRANSIT’s services every day, NJ TRANSIT needed a purpose-built IT network solution that aligned with the central goals of the organization. In this case study, learn how NJ TRANSIT was able to reach their goals with the help of Extreme Networks.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Extreme Networks

Your Guide to DNS Security
sponsored by TechTarget
RESOURCE: Which of the following web and application security technologies is your company planning to purchase within the next 12 months? Secure application development and testing, web security, or application and container security? Let us know in our Web & Application Security Survey. As a thank you, you'll receive our expert guide.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

TechTarget
1 - 25 of 1668 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info