IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
1 - 25 of 1291 Matches Previous Page  |  Next Page
Accedian Skylight’s Metadata Helps Drives Complete Visibility
sponsored by Accedian
VIDEO: Full visibility is important. But, sometimes full visibility can’t be achieved because of the complexity, a lack of access, or excessive costs. In this short video, learn about Accedian Skylight which captures 100% of the network traffic to help provide your organization with complete visibility.
Posted: 31 Mar 2020 | Premiered: 31 Mar 2020

Accedian

The Hard Truth About Winning Against Cyber Threats
sponsored by Dell SecureWorks
WHITE PAPER: When developing security strategies, today’s organizations make the mistake of being overly reliant on specific tools and technologies rather than focusing on hygiene and culture. This white paper overviews key characteristics of a hygienic security approach, and highlights 5 focus areas for developing a security strategy.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Dell SecureWorks

Smooth the Transition to the Cloud with Radware’s Secure ADC Solutions
sponsored by Radware
DATA SHEET: Many enterprises are transitioning to the cloud. As a result, their focus shifts from infrastructure-centric environments to application-centric solutions. This creates the unique challenge of how to make advanced services, such as application delivery and security simpler to consume and maintain. In this brief, learn how Radware’s ADC can help.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Radware

MicroScope – April 2020: Seeking sustainability in the channel
sponsored by MicroScope
EZINE: In this issue, we look at sustainability in the channel, with customers increasingly wanting to know that their reseller has a handle on their carbon footprint. Also, read about SCC's insight on mobile working and workforce security, and take a closer look at Riverbed's return to its roots
Posted: 30 Mar 2020 | Published: 01 Apr 2020

MicroScope

Secure the Cloud: Cloud-Enabled Mobile Workforce
sponsored by Palo Alto Networks
WHITE PAPER: As organizations adopt the cloud, new requirements for protecting mobile users are emerging. In this white paper, learn how Prisma Access can help provide cloud-delivered security infrastructure that makes it possible for your organization to connect users to a cloud gateway, enable secure access to all applications and maintain full visibility.
Posted: 27 Mar 2020 | Published: 27 Mar 2020

Palo Alto Networks

Mobile Access Optimization and Security for the Cloud Era
sponsored by Cato Networks
EBOOK: Mobile and the cloud are the new normal for today's business. But traditional access solutions are poor choices when mobile users "live" in AWS, Office 365, and the rest of the cloud. This whitepaper will explain the pros and cons of the three ways mobile users can securely access the cloud: direct access, legacy VPN, and cloud SD-WAN.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Cato Networks

Secure Transformation: Replacing Remote Access VPN with Prisma Access
sponsored by Palo Alto Networks
WHITE PAPER: Remote access VPN has been an enterprise network staple for years; however, enterprises are rapidly adopting cloud applications that are changing the requirements for security and networking. In this white paper, learn about the limitations of VPNs and how Prisma Access can help provide secure access to all applications.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Palo Alto Networks

What Wipros Intent-Based Networking Means for Your Organization
sponsored by Wipro
VIDEO: In this short video, learn about Wipro's IBN, powered by Cisco DNA, and how it can help align your network with the business intent of sales executives.
Posted: 26 Mar 2020 | Premiered: 26 Mar 2020

Wipro

Top 3 Security Risks for your SD-WAN Implementation
sponsored by BT
WEBCAST: The visibility, control and agility that an SD-WAN can deliver to a global organization makes it very attractive, but it can come with significantly higher risks. In this webcast, Kevin Brown, Adrian Comley and Peter Sader discuss the top 3 security risks you need to consider to make sure your SD-WAN implementation is secure.
Posted: 25 Mar 2020 | Premiered: Mar 25, 2020

BT

A Unified Wired and Wireless Access Edge Is Business Critical
sponsored by Cisco
ANALYST REPORT: A critical step in the journey to becoming a digital business is becoming an agile organization. The challenge is that an organization can only be as agile as its least agile IT component, which today is the network—particularly the access edge. In this research report, learn how organizations can change this by implementing a unified edge.
Posted: 24 Mar 2020 | Published: 31 Mar 2020

Cisco

Cisco Digital Network Architecture
sponsored by Cisco Systems, Inc.
RESOURCE: In this resource, learn how Cisco Digital Network Architecture (Cisco DNA), built on intent-based networking principles, helps you build a new network and deliver better experiences more securely, so you can focus on your business, not on your network.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

Cisco Systems, Inc.

Intent-Based Networking Explained
sponsored by Cisco Systems, Inc.
VIDEO: In this short video, explore the basics of intent-based networking (IBN) and how to benefit from IBN solutions.
Posted: 20 Mar 2020 | Premiered: 01 Oct 2019

Cisco Systems, Inc.

Intent-Based Networking at a Glance
sponsored by Cisco Systems, Inc.
WHITE PAPER: IT professionals need to bridge the gap between what your business needs and what your network delivers in terms of scalability, operational effectiveness, and security. In this brief, learn how your IT teams can meet these challenges by adopting an intent-based approach across each network domain.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Cisco Systems, Inc.

Definitive Guide to Internet Isolation
sponsored by Menlo Security
EBOOK: In this e-book, learn about Internet isolation which delivers a Zero Trust Internet by separating an enterprise network from the public web, while still allowing users to access the Internet seamlessly.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Menlo Security

Avoiding Top 3 Security Challenges of Digital Transformation
sponsored by Menlo Security
WEBCAST: In the current business landscape, there’s no doubt that the web is now the most important business tool. Critical systems that were once on-prem are moving to the cloud as a widely trusted alternative. In this webcast, learn about the top 3 security challenges of digital transformation.
Posted: 20 Mar 2020 | Premiered: Mar 20, 2020

Menlo Security

InfoSec Pros Should Do These 8 Things During the Coronavirus Outbreak
sponsored by CI Security
WHITE PAPER: With coronavirus, more organizations are changing the way they operate. More people are working remotely than ever before, which leads to new and interesting challenges for information security professionals. Download this white paper for 8 steps InfoSec pros should take now.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

CI Security

Research Reveals: Network Security is Converging in the Cloud
sponsored by Cisco Umbrella
WEBCAST: Network security is no longer confined to the data center. Its new address is in the cloud. In this webcast, learn why Gartner is introducing a new market category, the secure access service edge (SASE), which converges security services in the cloud.
Posted: 19 Mar 2020 | Premiered: Mar 11, 2020

Cisco Umbrella

Consistent Security with SD-WAN
sponsored by Palo Alto Networks
WHITE PAPER: When adopting SD-WAN, decisionmakers often focus on the networking benefits, prioritizing connectivity and cost over security. This can put the network at risk. In this white paper, uncover 4 best practices for selecting and deploying SD-WAN security.
Posted: 18 Mar 2020 | Published: 18 Mar 2020

Palo Alto Networks

The Quantifiable Business Value of Advanced Networking
sponsored by Cisco Systems, Inc.
ANALYST REPORT: Successful IT organizations are embracing advanced networking capabilities across multiple domains of the network. Download this IDC infobrief to explore the quantifiable results some organizations have realized as a result of embracing advanced networking technologies.
Posted: 18 Mar 2020 | Published: 29 Feb 2020

Cisco Systems, Inc.

Microsoft And Morphisec: How to Prevent and Expose Unknown Threats
sponsored by Morphisec, Inc.
WEBCAST: This webinar highlights an emerging threat plaguing today’s organizations at an increasing rate, unknown threats. Join industry experts at Microsoft and Morphisec as they discuss the efficacy of these threats and highlight how to detect and prevent them. Watch the full webinar now.
Posted: 17 Mar 2020 | Premiered: Nov 19, 2019

Morphisec, Inc.

The Future of Network Security Is in the Cloud
sponsored by Menlo Security
ANALYST REPORT: Network and network security architectures were designed for an era that is waning, and they are unable to effectively serve the dynamic secure access requirements of digital business. In this Gartner report, learn why security and risk management leaders need a converged cloud-delivered secure access service edge to address this shift.
Posted: 17 Mar 2020 | Published: 31 Aug 2019

Menlo Security

When the Data Center is No Longer the Center of Data
sponsored by Apcela
RESOURCE: Some enterprises have closed down their data centers, but it doesn’t seem likely that another 7 out of 10 enterprise data centers will go offline in just five years. In this brief, learn why a new paradigm is needed to extend the WAN beyond the data center to the multi- and hybrid cloud environment in which the modern enterprise operates.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

Apcela

Hyperautomated AI-based Security vs VMware NSX
sponsored by ShieldX
DATA SHEET: In this sheet, discover how to secure the modern, multi-cloud data center with hyperautomated AI-based security and compare it to a different network security offering in the market.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

ShieldX

Managing Security Risk and Compliance in a Challenging Landscape
sponsored by Dell
RESOURCE: How can you keep your business secure that amid the proliferation of devices and data? It starts with a trusted technology partner. Download this research report to learn why a trusted partner is key to a successful security strategy.
Posted: 13 Mar 2020 | Published: 13 Mar 2020

Dell

How Can Trend Micro XDR Solve Your Detection and Response Challenges
sponsored by Trend Micro
RESOURCE: In the last 5 years, there’s been a 67% increase in security breaches. Disconnected security layers make analyzing and investigating threats a challenge. Additionally, slow and inadequate response increases the impact of the attack. In this infographic, learn how Trend Micro XDR can help solve your detection and response challenges.
Posted: 13 Mar 2020 | Published: 13 Mar 2020

Trend Micro
1 - 25 of 1291 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info