IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
1 - 25 of 1602 Matches Previous Page  |  Next Page
Product Brief: Endpoint Agent
sponsored by Sinefa
WHITE PAPER: Security managers and professionals need endpoint monitoring that allows them to gain actionable insights into end user experience and troubleshoot problems. Most of all, these professionals need visibility over their networks so that they can work to optimize performance. Read this white paper to learn about Sinefa’s Endpoint Agent.
Posted: 24 Sep 2020 | Published: 24 Sep 2020

Sinefa

Executive Summary 2020 Thales Data Threat Report
sponsored by Thales
ANALYST REPORT: Threat intelligence and information has never been more valuable to businesses. As such, an IDC survey commissioned by Thales found that 45% of respondents felt that their organizations would exceed their original 2020 security budgets. In APAC, the time for action is now. Read the full threat report to see how attitudes are changing.
Posted: 24 Sep 2020 | Published: 24 Sep 2020

Thales

Ask These Critical Questions and Consider These Risks When Selecting an MDR Provider
sponsored by GoSecure
RESOURCE: According to Gartner, 25% of organizations will be using managed detection and response (MDR) services by 2024. So when considering key requirements and managing risks associated with outsourcing threat detection and response, it’s critical that you ask the right questions. View this Gartner article to learn these questions and more.
Posted: 23 Sep 2020 | Published: 31 Oct 2019

GoSecure

Secure SD-WAN: The Launch Pad Into Cloud Video
sponsored by Barracuda
WEBCAST: If your organization is considering secure SD-WAN, then there is much to take into consideration. Why does your organization need it? How could it help your network evolve and reach new heights? What about the public cloud? Watch this informative webcast, which includes global survey results about SD-WAN adoption and securing cloud workloads.
Posted: 23 Sep 2020 | Premiered: Sep 23, 2020

Barracuda

Phishing Attacks Advanced Techniques That Evade Detection
sponsored by Vade Secure
WHITE PAPER: The advancement of the phishing attack has left organizations looking for ways to identify the growing number of unique phishing URLs sent to their email servers. From spoofing addresses to exploiting credentials, these attacks grow more complex yearly. Don’t get left behind – read this comprehensive guide on phishing.
Posted: 22 Sep 2020 | Published: 22 Sep 2020


Email Security for Microsoft 365
sponsored by Vade Secure
WHITE PAPER: Cybercriminals are using email to target the weakest link in an organization’s cybersecurity chain: humans. You may have enabled email security add-ons for Microsoft 365, but you’re not as safe as you think. Read this white paper to learn how to keep your email safe from phishing, spear phishing and zero-day attacks.
Posted: 22 Sep 2020 | Published: 22 Sep 2020


Putting the Trust in Zero Trust
sponsored by Lookout
WHITE PAPER: As workforces become more distributed and employees favor their BYOD devices, cybersecurity risks evolve to the point where traditional perimeter tactics are no longer relevant. Enter zero trust for mobile – a scalable approach to protecting every device within the network. Read on to learn more about this.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Lookout

How companies in Asia-Pacific are addressing remote workplace security challenges
sponsored by Barracuda
WHITE PAPER: According to a recent study, 62% of APAC organizations said they wouldn’t have implemented remote working for another 5 years if it weren’t for COVID-19. The rapid adoption of the new normal has left many of these organizations vulnerable – read this white paper to learn how APAC organizations are addressing these security challenges.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Barracuda

Spear Phishing: The Targeted Attacks that Aim for Your Business
sponsored by Vade Secure
WHITE PAPER: Phishing and spear phishing are two of the most common types of cyberattacks. In a growing digital economy, technological assets are coming under greater threat from these two very similar attacks. How do you identify a phishing attack, and how can you take a proactive approach? Read this white paper to learn the answers.
Posted: 21 Sep 2020 | Published: 21 Sep 2020


Boys & Girls Clubs of Puerto Rico Protects Microsoft 365 Users from Targeted Attacks While Improving Performance
sponsored by Vade Secure
CASE STUDY: The Boys & Girls Clubs of Puerto Rico needed a way to secure their Microsoft 365 platforms while receiving quicker responses from their helpdesk. Confronted with a rise in phishing, spear phishing and malware attacks, they needed to act fast. Jump into the case study to look up-close at how they solved their problem.
Posted: 21 Sep 2020 | Published: 21 Sep 2020


What’s Driving Multi-Location Networks
sponsored by Frontier Communications
RESOURCE: The “new normal” facing multi-location businesses is driving many to reassess their IT environments. And there’s a reason bandwidth is at the top of a lot of priority lists. In this brief, learn how Telecoms have responded to this need for higher bandwidth and performance connectivity with Ethernet.
Posted: 21 Sep 2020 | Published: 21 Sep 2020

Frontier Communications

Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.
Posted: 21 Sep 2020 | Published: 21 Sep 2020

ComputerWeekly.com

Costs of the Status Quo for Multi-Location Businesses
sponsored by Frontier Communications
RESOURCE: Urgency is rising for multilocation businesses to put bandwidth under the microscope.Unfortunately, triaging remote workforce support requests and managing multiple network vendors can make it difficult for overburdened IT leaders to know where to start their bandwidth reassessment. Download this guide to learn how to get started.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

Frontier Communications

How to secure and automate branch office connectivity to AWS with Cisco SD-WAN
sponsored by Cisco & AWS
WEBCAST: Watch this webinar to learn how international energy provider ENGIE is leveraging Cisco SD-WAN on AWS to establish secure, automated connectivity between their branch locations and cloud workloads.
Posted: 17 Sep 2020 | Premiered: Sep 2, 2020

Cisco & AWS

How Wi-Fi 6 Will Deliver Secure, Stable, and Superior Customer Experiences Across Industries
sponsored by Comcast Business
RESOURCE: With the advent of Wi-Fi 6, IT leaders are considering whether their businesses require the improved speed and performance promised by the latest revision of the wireless standard. But if customer experience is any measure of business success, then it is sure to be on many IT wish lists. Download this blog to learn more about Wi-Fi 6.
Posted: 17 Sep 2020 | Published: 31 Aug 2020

Comcast Business

Cybersecurity Perceptions vs Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

GoSecure

The Ultimate Balancing Act: Enabling Emerging Technologies. Ensuring Security
sponsored by Frontier Communications
RESOURCE: In order to defend against today’s fast-evolving threats, cybersecurity experts are recommending a multi-layered approach to network security that doesn’t prevent innovation. Read on to learn more about achieving this balancing act.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

Frontier Communications

IT Considerations for Change Management
sponsored by Comcast Business
RESOURCE: As stay-at-home advisories and non-essential business closures begin to ease up, businesses will need to undergo sweeping operational changes as workplaces slowly begin shifting back to a more normal environment. In this blog post, learn how your network and network monitoring tools can help enable your organization’s return to work.
Posted: 16 Sep 2020 | Published: 13 May 2020

Comcast Business

Real World SD-WAN: Gaining Agility, Enhancing CX & EX, and Cutting Costs
sponsored by Comcast Business
WHITE PAPER: SD-WAN is one of the fastest growing enterprise technologies, with adoption projected to grow at ~30% annually. The benefits of this technology have been widely communicated, and now, the onus lies on IT to capitalize. Read this white paper to view real-world success stories on SD-WAN and how it has improved productivity and cut costs.
Posted: 15 Sep 2020 | Published: 18 Aug 2020

Comcast Business

Beyond COVID-19 Webinar
sponsored by Hyperproof
WEBCAST: COVID-19 has both introduced new risks and amplified existing ones. Business continuity, security, crisis management and customer acquisition have all been put to the test, and all the while, the economy has become totally unpredictable. Watch this webinar to learn how to manage new risks and stay compliant throughout COVID-19 and beyond.
Posted: 14 Sep 2020 | Premiered: Sep 14, 2020

Hyperproof

Replacing Branch Appliances With SASE
sponsored by Cato Networks
CASE STUDY: SASE is a cloud-native architecture that converges networking and security together in lieu of integration. Replacing branch appliances with this architecture can provide greater visibility as well as lower operational costs. Jump into this case study to learn 5 IT manager perspectives on SASE.
Posted: 14 Sep 2020 | Published: 14 Sep 2020

Cato Networks

Ransomware Decoded
sponsored by Cybereason
WHITE PAPER: Ransomware has reemerged, and ransom payments have shot up in tandem, with the average payout at $80,000 in Dec. 2019. In addition, it’s evolving to avoid detection, and with the advent of Ransonware-as-a-Service (RaaS), even non-technical users can create an attack. Stay vigilant, read this white paper to learn what modern ransomware looks like.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Cybereason

Remote Education: Prepping for the Long Game
sponsored by Comcast Business
RESOURCE: According to the UN, more than 850 million students worldwide have been forced out of the classroom due to COVID-19, and many can no longer participate in school as a result. Action must be taken to ensure that students will be back in the classroom, virtually or not. Read this blog to learn how to prepare your network for the future of learning.
Posted: 11 Sep 2020 | Published: 20 May 2020

Comcast Business

The Hacker Infrastructure and Underground Hosting
sponsored by Trend Micro
RESOURCE: How are criminals able to host service and infrastructure on the internet without a takedown or an arrest? What makes them hard to track down? Read this research paper to learn how criminal forums have evolved to adapt to the demands of the underground market and the ways they have enabled easier access to underground hosting.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Trend Micro

5 Manufacturing Case Studies
sponsored by Cato Networks
CASE STUDY: The high cost and rigidity of MPLS are driving WAN transformation in the manufacturing arena. Using SASE architecture, enterprises may be able to benefit from the convergence of SD-WAN capabilities and a full network security stack, which can improve network performance overall. Open to read 5 SASE case studies for manufacturing.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Cato Networks
1 - 25 of 1602 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info