IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
1 - 25 of 1347 Matches Previous Page  |  Next Page
ROI Strategies with Frictionless Zero Trust
sponsored by CrowdStrike
EBOOK: Zero Trust security needs have changed as we enter the digital era. Read this Frost & Sullivan e-book for a closer look at how digital transformation has changed Zero Trust, the benefits and challenges of SIEM-based threat detection, ROI strategies for frictionless Zero Trust, and more.
Posted: 08 Jun 2021 | Published: 08 Jun 2021

CrowdStrike

CrowdStrike Zero Trust
sponsored by CrowdStrike
PRODUCT OVERVIEW: As we enter the digital age, more and more organizations are embracing the Zero Trust security philosophy of “never trust, always verify”. However, traditional Zero Trust approaches are static and tricky to manage. Read this solution brief to learn about CrowdStrike’s key principles of Zero Trust and explore their frictionless approach.
Posted: 08 Jun 2021 | Published: 08 Jun 2021

CrowdStrike

Five Critical Requirements For Internal Firewalling In The Data Center
sponsored by VMware Intel
WHITE PAPER: This white paper looks at the shocking state of network security and how many organizations could benefit by securing traffic in the data center with a new approach: using a distributed, service-defined internal firewall. Download to learn about VMware NSX’s Service-Defined Firewall and its potential impact on visibility, compliance, and more.
Posted: 04 Jun 2021 | Published: 31 Mar 2021

VMware Intel

Securing The Data Center In Just Four Steps
sponsored by VMware Intel
WHITE PAPER: Appliance-based security has proven incapable of keeping up with securing east-west traffic. But this white paper looks at an alternative approach: a distributed internal firewall. Learn about VMware’s own version of this offering – their Service-defined Firewall – and uncover 4 steps to improving security in the data center.
Posted: 04 Jun 2021 | Published: 31 Mar 2021

VMware Intel

Somerford Video 4
sponsored by Somerford
VIDEO: Join this 20-minute Okta webinar to explore Okta’s Zero Trust solution, and learn how it can be implemented to increase security posture for remote working environments.
Posted: 04 Jun 2021 | Premiered: 04 Jun 2021

Somerford

Commscope Ruckus Video
sponsored by Commscope Ruckus
VIDEO: For Leigh Academy, an effective bring your own device (BYOD) strategy means an improved educational experience. However, problems with continuity and standardization quickly began to arise. Watch this customer testimonial to learn how Commscope Ruckus was able to help the academy address these challenges and implement an effective BYOD program.
Posted: 02 Jun 2021 | Premiered: 02 Jun 2021

Commscope Ruckus

Gartner 2021 Strategic Roadmap for SASE Convergence Report
sponsored by Palo Alto Networks
ANALYST REPORT: For more clarity and confidence in your SASE efforts, get the new comprehensive Gartner report, "2021 Strategic Roadmap for SASE Convergence."
Posted: 28 May 2021 | Published: 28 May 2021

Palo Alto Networks

The rise of edge computing
sponsored by ComputerWeekly.com
EGUIDE: The growing momentum around 5G has spurred the rise of edge computing applications designed to crunch and process data at the edge of the network. In this e-guide, read more about edge computing developments in the Asia-Pacific region, as well as the pros and cons of adding edge computing to a cloud architecture
Posted: 18 May 2021 | Published: 19 May 2021

ComputerWeekly.com

Building the Confidence to Connect with Zero Trust Edge Security
sponsored by Zededa
WEBCAST: Learn how Zededa partnered with Accenture Security and Lanner Electronics to provide organizations with the infrastructure foundation and services needed to implement zero-trust security at the edge, powered by software-defined capabilities.
Posted: 13 May 2021 | Premiered: May 13, 2021

Zededa

Tanium Insights: It’s Time to Ditch the VPN for Zero Trust
sponsored by Tanium
WHITE PAPER: In this white paper, examine what kick-started the zero-trust movement, why it's completely changed the conversation around network security, how Tanium and its partners' capabilities contribute to a zero-trust solution.
Posted: 13 May 2021 | Published: 13 May 2021

Tanium

Pass-the-Hash and Pass-the-Ticket
sponsored by Verizon
WHITE PAPER: Pass-the-hash and its relative, pass-the-ticket, are attack techniques commonly used by adversaries to compromise enterprise servers after some other attack has created a foothold inside the enterprise. Inside this white paper, learn how Verizon Software Defined Perimeter (SDP) uses multi-factor authentication to mitigate these attacks.
Posted: 12 May 2021 | Published: 12 May 2021

Verizon

WEBINAR: ZTNA is the Evolution of VPN
sponsored by Fortinet, Inc.
WEBCAST: Learn why organizations are shifting away from VPN in favor of zero-trust network access, why a traditional VPN tunnel is not ideal for secure access, the advantages of an automatic, secure connection, and how ZTNA ensures only the right users and devices are given access.
Posted: 11 May 2021 | Premiered: May 11, 2021

Fortinet, Inc.

Tanium Insights: It’s Time to Ditch the VPN for Zero Trust
sponsored by Tanium
WHITE PAPER: Learn what kick-started the zero-trust movement, why it's completely changed the conversation around network security. The white paper also covers what you need to know about adopting zero trust in your organization. Hint: You don't get up one morning and decide to adopt zero trust.
Posted: 11 May 2021 | Published: 11 May 2021

Tanium

National Gas Distributor Achieves Pipeline Visibility
sponsored by Nozomi Networks
CASE STUDY: Midstream oil and gas companies operate within complex environments. Their industrial control systems (ICS) include dozens of equipment types and cover vast distances. This makes it challenging to monitor, manage and secure pipeline systems that aren’t thoroughly documented or easy to visualize.
Posted: 10 May 2021 | Published: 10 May 2021

Nozomi Networks

Fortisase—Cloud-Delivered Security To Every User, Everywhere
sponsored by Fortinet, Inc.
PRODUCT OVERVIEW: In order to extend secure access and high-performance connectivity to a growing remote workforce, organizations are looking to integrate Secure Access Service Edge (SASE) solutions. Read this solution brief for a closer look at the key features and capabilities of Fortinet’s SASE offering – known as FortiSASE.
Posted: 10 May 2021 | Published: 10 May 2021

Fortinet, Inc.

Automating Firewall Virtualization is Easy
sponsored by Corsa Technology Inc
EBOOK: You have a great opportunity to replace your physical firewalls and begin your enterprise’s journey towards a complete secure access secure edge (SASE) architecture. Participate in a short survey to gain access to this white paper that highlights what to look for in such a platform that can help get you there.
Posted: 30 Apr 2021 | Published: 30 Apr 2021

Corsa Technology Inc

Now is the Time to Virtualize your Network Firewall
sponsored by Corsa Technology Inc
EBOOK: Take this survey to gain access to Corsa’s white paper, which details all the benefits of virtualizing your on-premise network firewalls.
Posted: 30 Apr 2021 | Published: 30 Apr 2021

Corsa Technology Inc

TCO of Automating Network Firewall Virtualization
sponsored by Corsa Technology Inc
EBOOK: After a quick online survey, discover the benefits of virtual firewalls versus physical ones and then the costs of various approaches.
Posted: 30 Apr 2021 | Published: 30 Apr 2021

Corsa Technology Inc

The Security Challenges of Today’s Accelerated Digital Initiatives
sponsored by Corsa Technology Inc
RESOURCE: Today security pros need to tackle the growing attack surface, as well as challenges like rightsizing, a skills shortage, and the need for automation if they are to keep their organization safe. Take a brief survey to learn more on why network security leaders need to automate and simplify virtualization of their infrastructure.
Posted: 30 Apr 2021 | Published: 30 Apr 2021

Corsa Technology Inc

Five Steps to Automated Firewall Virtualization
sponsored by Corsa Technology Inc
EBOOK: PH
Posted: 30 Apr 2021 | Published: 30 Apr 2021

Corsa Technology Inc

Securing The Digital Workplace
sponsored by TATA Communications
DATA SHEET: Organizations are challenged by the need to provide seamless application experience, unified platform support for preventative protection, secure data exchanges and more. Solutions such as VPN and zero trust are helping, but still more can be done. View this data sheet to explore how Tata Communications’ Secure Remote Access can help.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TATA Communications

The State of Security Segmentation Report
sponsored by Illumio
RESEARCH CONTENT: This report summarizes the results of a survey of over 300 IT professionals conducted by Virtual Intelligence Briefing (ViB) to understand how companies segment today and what difficulties they face.
Posted: 19 Apr 2021 | Published: 19 Apr 2021

Illumio

HGC Accelerates Zero Trust with Illumio
sponsored by Illumio
CASE STUDY: Find out how telecommunications leader HGC Global Communications Ltd implemented micro-segmentation that keeps pace with their fast growing business – enabling a zero-trust security posture while reducing operational effort by 25%.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

Illumio

Delivering a More Secure Network From the Start
sponsored by Aruba Networks
RESOURCE: Remote work has accelerated the move to cloud. What’s your plan to deliver the network performance improvements and close security gaps? A Zero Trust Edge solution can help by securely connecting and transporting traffic in and out of remote sites leveraging cloud-based security and networking services. Download this infographic to learn more.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

Aruba Networks

Why CISOs need advanced network security strategies now
sponsored by SearchSecurity.com
EZINE: Network security has to move beyond the basics. With systems and data under assault by sophisticated attackers, CISOs and other security leaders need to put in place advanced network security strategies that incorporate the latest technologies -- AI, machine learning and more.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

SearchSecurity.com
1 - 25 of 1347 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences