IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
1 - 25 of 1470 Matches Previous Page  |  Next Page
How to Successfully Move your UCC Strategy to the Cloud
sponsored by Cisco
EGUIDE: This e-guide explores unified communication and collaboration (UCC) challenges IT networking pros need to overcome, as well as how to craft cloud UC strategies to aid in overcoming these challenges.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Cisco

Application Security Testing Magic Quadrant
sponsored by Whitehat Securities
RESOURCE: Application security testing (AST) is growing faster than any other market. Gartner predicts that by 2019, 80% of application security testing vendors will include software composition analysis in their offerings. This Gartner report reveals strengths and cautions of different vendor's AST programs as well as a market overview.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Whitehat Securities

Big Switch Networks and Dell EMC: Next-generation Data Center Networking
sponsored by Big Switch Networks
WHITE PAPER: Software-defined data center workloads are increasing the cost and complexity of configuring, visualizing and securing the network. In this white paper, discover how to deploy and manage the next-generation software-defined data center.
Posted: 19 Jan 2018 | Published: 30 Jun 2017

Big Switch Networks

Innovation Insight for Security Orchestration, Automation and Response
sponsored by ServiceNow
RESEARCH CONTENT: This Gartner report analyzes security orchestration, automation, and response (SOAR) tools and explores how they can help you improve security operations efficiency, quality and efficacy for your organization.
Posted: 18 Jan 2018 | Published: 30 Nov 2017

ServiceNow

Potential ROI and Benefits of ServiceNow Security Operations
sponsored by ServiceNow
RESEARCH CONTENT: This report provides a framework for evaluating the potential financial impact of investing in ServiceNow Security Operations to improve security incident and vulnerability response processes.
Posted: 18 Jan 2018 | Published: 31 Jan 2018

ServiceNow

Unified MTD + MARS is the Best Practice for Mobile Security
sponsored by Lookout
WEBCAST: Download this webcast to understand the full mobile risk matrix and discover how mobile threat defense (MTD) combined with mobile app reputation services (MARS) can protect your organization from mobile threats to apps, devices, networks and more.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

Lookout

PCI DSS Endpoint Security
sponsored by enSilo
WHITE PAPER: Take a look at this white paper to learn more about the PCI DSS compliance regulation and how to secure your endpoints to comply with the policy.
Posted: 15 Jan 2018 | Published: 15 Jan 2018


The Theory Behind Google's Beyond Corp Security Model
sponsored by Duo Security
WHITE PAPER: Google's BeyondCorp security model states no traffic within an enterprise's network is any more trustworthy by default than traffic coming in from the outside. This resource offers insight into advancing enterprise security based on Google's BeyondCorp model.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Duo Security

Data Security Under GDPR: How to Prepare for the Inevitable
sponsored by Fortinet, Inc.
WHITE PAPER: Access this white paper to gain guidance on how to comply with GDPR when developing data protection policies.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Fortinet, Inc.

Case Study: How to Secure Endpoints even at Low Internet Bandwidth
sponsored by Seqrite
CASE STUDY: With the evolving complexities and volume of threats, Posco wanted a one-stop security tool that could help secure their network even at low Internet bandwidth. Learn about why Posco choose an endpoint security tool to overcome this challenge.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Seqrite

How to Build a Soc with Limited Resources
sponsored by LogRhythm, Inc.
WHITE PAPER: Having a security operations center (SOC) has become an absolute necessity for implementing threat lifecycle management to minimize damage caused by successful attacks. This white paper offers a guide to building an SOC with limited resources and provides the basics of the cyberattack lifecycle through the threat lifecycle management framework.
Posted: 09 Jan 2018 | Published: 09 Jan 2018

LogRhythm, Inc.

The Top 4 Myths of Network Security and Compliance
sponsored by FireMon
WHITE PAPER: Each year, fraudulent activity accounts for $600 billion in losses in the United States. Explore this resource to gain insight into policy regulations and how to secure your data while maintaining regulatory compliance.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

FireMon

Security Comparison: MDR, MSSP, and SIEM
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Gain valuable insights into the pros and cons of MDR, MSSP and SIEM to help build your cybersecurity protection protocols against today's threats – and tomorrow's.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

Arctic Wolf Networks, Inc.

The 5-Minute Companion for the Cyber-Conscious Employee
sponsored by Arctic Wolf Networks, Inc.
EBOOK: Recent studies have pointed fingers at employees, often referring to them as the "weakest link" in cybersecurity. However, more often than not employees haven't received the proper training. Access your 5-minute guide to cyber-consciousness.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

Arctic Wolf Networks, Inc.

Recommendations for Secure Policy Configuration Assessment
sponsored by FireMon
WHITE PAPER: According to Gartner, secure configuration assessment is essential for identifying risks arising out of weak and misconfigured systems and devices. This resource offers strategies for achieving Gartner's 4 recommendations for secure policy configuration assessment.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

FireMon

The Top 5 Requirements to Look for in Your Network Security Policy Management Solution
sponsored by FireMon
WHITE PAPER: In the last 20 years, network security policies have grown by more than 3,500%, according to FireMon.This resource examines the top 5 requirements to look for in your networking security policy management strategy.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

FireMon

The 3 Keys to Faster Threat Response
sponsored by RSA
WHITE PAPER: According to the latest RSA study rating organizations' cybersecurity maturity, 74% of those surveyed have inadequate systems to quickly recover from an attack. Explore this e-book to uncover a deeper understanding into 3 keys to a faster threat response.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

RSA

The 7 Building Blocks of Better Threat Visibility
sponsored by RSA
WHITE PAPER: According to RSA, the anticipated losses to cybercrime by 2021 are $6 trillion. Explore this e-book to uncover how to advance your threat visibility with 7 building blocks.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

RSA

Next-Gen Firewall Buyer's Guide
sponsored by Sophos
RESOURCE: It is difficult to know where to start when evaluating firewalls; most are incredibly complex, lacking in essential features, and provide little if any visibility into what's happening on your network. Explore this next-generation firewall buyer's guide to gain insight into evaluating the right firewall for your organization's needs.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Sophos

DTMF Masking for PCI DSS Compliance
sponsored by Semafone
WHITE PAPER: PCI DSS is made up of 12 requirements, including securing networks, protecting data, access control measures, information security practices, and monitoring and testing. This resource provides insight into becoming PCI DSS compliant by implementing dual-tone multi-frequency.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Semafone

How Automated Security Workflows Help you Stay Above Water
sponsored by VMware
WHITE PAPER: Explore the changing nature of risk in the data center and how network virtualization enables automation of your security operations.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

VMware

Enable Single Switch Configuration with Compact Switches
sponsored by Cisco
VIDEO: Watch this brief video to find out how you can transform and simplify your Ethernet setup with compact switches. Discover how to enable single switch configuration, increase network security, reduce cabling costs, and more.
Posted: 21 Dec 2017 | Premiered: 18 Dec 2017

Cisco

Securing Dynamic Networks: A Guide for CISO and CIOs
sponsored by BT
WHITE PAPER: According to BT, 93% say security is a 'must have or should have' for customers of SD-WAN technology. As networks evolve, so must an organization's approach to security. This paper provides a summary of key security considerations in the hybrid network landscape, as well as suggestions for overcoming the challenges.
Posted: 18 Dec 2017 | Published: 18 Dec 2017

BT

How CIO's are Shaping their Networks for a Digital Future
sponsored by BT
EBOOK: Discover the 4 ways CIOs are shaping their networks for a digital future.
Posted: 18 Dec 2017 | Published: 31 Oct 2017

BT

How SMBs are Changing their Security Tactics
sponsored by Booz Allen Hamilton
EGUIDE: Security has changed dramatically over the decades. In this e-guide, learn why firms look to security analytics to keep pace with cyber threats and how closer collaboration between departments, such as business continuity and information security, could help raise staff awareness.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

Booz Allen Hamilton
1 - 25 of 1470 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement