IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
1 - 25 of 1235 Matches Previous Page  |  Next Page
Aruba Clearpass Policy Manager
sponsored by TechData - HPE
DATA SHEET: In this data sheet, learn more about Aruba's ClearPass Policy Manager. Key features of the product include advanced policy management, integration with security and workflow systems and advanced reporting and alerting.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

TechData - HPE

How 1 School Manages and Secures its Multi-Vendor Wi-Fi Infrastructure
sponsored by TechData - HPE
CASE STUDY: After announcing a virtual learning initiative for its over 650,000 K-12 students, Los Angeles Unified School District (LAUSD), needed a tool that could help to help unify, manage and secure its multi-vendor Wi-Fi infrastructure. Find out why LAUSD chose Aruba Networks to help them, and learn about the benefits they experienced in this case study.
Posted: 20 Mar 2019 | Published: 20 Mar 2019

TechData - HPE

How 1 Company Addressed Zero-Day Attacks on 60+ Customer Networks
sponsored by Farsight Security
CASE STUDY: LuJam Cyber provides cybersecurity for small and medium organizations, and needed to bring in enterprise threat intelligence to help stop zero-day attacks across their 60+ customer networks. Download this case study to learn how implementing Farsight Security's Newly Observed Domains (NOD) tool helped them prevent more attacks than ever.
Posted: 19 Mar 2019 | Published: 19 Mar 2019

Farsight Security

Log Management Essentials
sponsored by One Identity
WHITE PAPER: In IT environments, a wide variety of sources generate log messages in many different formats. Whether you are trying to enhance security, improve operations or meet compliance objectives, log data contains valuable information and harnessing that data is critical. In this white paper, learn how to properly implement log management.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

One Identity

How to Forward Log Messages to Splunk From syslog-ng
sponsored by One Identity
WHITE PAPER: Splunk is a popular search and analysis platform. Many users of Splunk have also deployed syslog-ng in their environments to help with tasks like collecting and centralizing log messages from network devices. In this white paper, learn about 5 use cases for syslog-ng and how to get them started.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

One Identity

Global Internationalized Domain Name Homograph Report
sponsored by Farsight Security
RESEARCH CONTENT: Internationalized Domain Names (IDNs) are often abused by cybercriminals to conduct malicious activities, such as phishing or malware distribution. In this new research report, Farsight Security Global Internationalized Domain Name Homograph Report, examine the prevalence and distribution of IDN homographs across the Internet.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

Farsight Security

Strengthen Network Security with DNS
sponsored by Farsight Security
WEBCAST: In this webinar, ThreatSTOP Chief Scientist Dr. Paul Mockapetris, the inventor of DNS, and Farsight Security CEO Dr. Paul Vixie, who designed, implemented and deployed several DNS protocol extensions and applications that are used throughout the Internet today, will discuss how you can use DNS to strengthen your network security.
Posted: 15 Mar 2019 | Premiered: Mar 15, 2019

Farsight Security

Why Every Business Needs a Smart Printing Services Strategy
sponsored by HP
RESOURCE: Network-connected printers are more insecure than most organizations realize. With security threats on the rise businesses of all sizes need printing services strategies to protect their organizations and minimize risk. In this article, learn how to craft a printer services strategy.
Posted: 15 Mar 2019 | Published: 13 Apr 2017

HP

Building a Cloud Migration Launchpad: 3 Steps for Network and Security Readiness
sponsored by MASERGY
WHITE PAPER: Establishing an IT launchpad for cloud migration can help you significantly accelerate the process. In this white paper, learn 3 crucial steps you can take to help prepare your network for cloud migration.
Posted: 15 Mar 2019 | Published: 15 Mar 2019

MASERGY

The Modality of Mortality in Domain Names
sponsored by Farsight Security
RESEARCH CONTENT: In this study, Farsight Security monitored an ongoing data feed of newly observed domains (NODs) to generate a cohort data set, and periodically probed those names to determine what happens to them. Learn more about NODs to help your organization create a more secure DNS policy and improve its security posture.
Posted: 15 Mar 2019 | Published: 31 Oct 2018

Farsight Security

Avast Business Secure Web Gateway
sponsored by Avast Business
WEBCAST: It's no secret that users pose one of the biggest threats to business security today – whether it's clicking on suspicious email links or visiting unsafe websites. In this webcast, learn how the new Avast Business Secure Web Gateway protects SMBs from sophisticated web threats while being easily manageable and fully scalable.
Posted: 15 Mar 2019 | Premiered: Mar 4, 2019

Avast Business

Security Analytics Platforms, Q3 2018
sponsored by LogRhythm, Inc.
RESEARCH CONTENT: In Forrester's 30-criteria evaluation of security analytics platform providers, they identified the 13 most significant ones. This report shows how each provider measures up and helps S&R professionals make the right choice.
Posted: 15 Mar 2019 | Published: 21 Sep 2018

LogRhythm, Inc.

Optimizing SIEM
sponsored by One Identity
WHITE PAPER: SIEM solutions form the core of many enterprises' IT Security strategy but they can be expensive to deploy and maintain. Optimizing your SIEM solution can reduce costs and improve performance. In this white paper, learn about the challenges, solutions and benefits of optimizing your SIEM solution.
Posted: 15 Mar 2019 | Published: 15 Mar 2019

One Identity

DreamWorks Animation Applies HP Inc.'s Expertise and Experience to Reinforce Print and Document Security
sponsored by HP
CASE STUDY: In this case study, learn how a large film production studio, DreamWorks Animation, partnered with HP Inc. to address its print security needs. The case study also provides recommendations for addressing your organization's printer security needs.
Posted: 13 Mar 2019 | Published: 31 Mar 2018

HP

2018-2019 Global Application & Network Security Report
sponsored by Radware
RESEARCH CONTENT: This 2018-2019 global application & network security report highlights the major themes shaping cybersecurity of late. Explore the report to help your organization keep its finger on the pulse of the rapidly evolving and increasingly dangerous cybersecurity landscape.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

Radware

HP Managed Print Services: Topics of influence
sponsored by HP
WHITE PAPER: Your organization is continuously creating confidential data that's crucial to operations. And you're probably using multiple security methods to protect this data. But is your printing environment as secure as the rest of your infrastructure? In this white paper, learn how HP strengthens security throughout your printing environment.
Posted: 12 Mar 2019 | Published: 30 Jun 2018

HP

Will I Save Money on my Global WAN if I Move to SD-WAN?
sponsored by BT
WHITE PAPER: A critical question that a lot of enterprises ask is, "Will SD-WAN help us save money while improving the network?" Unfortunately, the answer to that question is very complicated. Read on to find out what factors shape the financial impact of SD-WAN on your network.
Posted: 11 Mar 2019 | Published: 28 Feb 2019

BT

Understanding SD-WAN Solutions: How to Ensure Peak Visibility and Performance
sponsored by MASERGY
WHITE PAPER: In this quick guide, learn about your options with SD-WAN and find out how you can ensure peak network visibility and performance.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

MASERGY

The Hacker Report
sponsored by HackerOne
WHITE PAPER: Many hackers are finding career building opportunities through bug bounties, with companies hiring from within the hacker community at a faster clip than ever before. As hacking grows in popularity, training continues to be a focus. Download this research report that details more than 300,000 individuals who represent the hacker community today.
Posted: 08 Mar 2019 | Published: 08 Mar 2019

HackerOne

Understanding Enterprise WAN Transformation: Survey Report 2019
sponsored by Apcela
RESEARCH CONTENT: Apcela's 2019 Survey Report: Understanding Enterprise WAN Transformation assess current industry trends, ranging from the spread of SD-WAN to the proliferation of new technologies such as AI and IoT, and to see what companies expect to tackle in the upcoming year. Download this research report to discover key findings.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

Apcela

Guide to Understanding SD-WAN: Security Options in Different Networking Architectures
sponsored by Apcela
WHITE PAPER: As enterprises shift more of their workloads to the cloud, they must also evaluate their networking architecture. A big part of this evaluation process is how and where to enforce security on data and applications. Download this white paper to learn about different security options available for SD-WAN and which one is right for you.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

Apcela

Securing Dynamic Networks
sponsored by BT
WHITE PAPER: Networks are changing as new 'internet native' applications and services drive demand for more bandwidth, performance and flexibility. This paper provides a summary of the key security considerations in the hybrid network landscape, as well as some suggestions as to how the challenges can be overcome.
Posted: 07 Mar 2019 | Published: 28 Feb 2019

BT

Bug Bounty Field Manual
sponsored by HackerOne
EBOOK: Bug bounty programs can be very helpful in finding bugs within your system. They allow your engineering team to secure your systems faster and cheaper than ever before. In this e-book, learn everything you need to know to plan, launch and operate a successful bug bounty program.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

HackerOne

A Patch Made in Heaven
sponsored by Kaseya
WHITE PAPER: As breaches become more prevalent, IT professionals must accept patch management for what it is — a way to create a robust security layer with the routine and timely installation of patches. Time being the most critical element. In this white paper, learn about 3 critical components to any effective patch management strategy.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

Kaseya

How To Choose A Reliable Modern Incident Management Solution
sponsored by PagerDuty
EBOOK: The ideal incident management solution decreases downtime; gives teams critical insight into their operational health, efficiency, and response patterns; helps deliver a reliable product; and improves the bottom line for your stakeholders. Download this eBook and uncover the key questions to ask when evaluating an incident management vendor.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

PagerDuty
1 - 25 of 1235 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement