IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
1 - 25 of 1280 Matches Previous Page  |  Next Page
Secure SD-WAN & SASE: Your 2021 Guidebook
sponsored by TechTarget
RESOURCE: Gartner describes SASE as the future of network security, with secure SD-WAN as the cornerstone of this development. What do you need to know about these technologies now to plan for the road ahead? Start by downloading our expert guide, Secure SD-WAN & SASE: Your 2021 Guidebook.
Posted: 30 Jul 2021 | Published: 31 Jul 2021

TechTarget

The Future of the Firewall
sponsored by Cisco
WHITE PAPER: As networks grow and evolve, so too should firewall strategies. In this white paper, take a closer look at the evolution of network security and discover the essential steps needed to ensure a future-proof firewalling strategy.
Posted: 26 Jul 2021 | Published: 26 Jul 2021

Cisco

Every Unique Network Transformation Journey Starts with These Three Steps
sponsored by TATA Communications
EBOOK: PH
Posted: 23 Jul 2021 | Published: 23 Jul 2021

TATA Communications

Build Zero Trust Networks Between Any Cloud Or Data Center Environment.
sponsored by AWS & Trustgrid
DATA SHEET: Yesterday’s VPNs and SD-WANs often lack the scale and usability needed for today’s hybrid IT environments. Read this data sheet to learn how Trustgrid is integrating cloud-native networking capabilities with secure remote access to create a next-generation SD-WAN powered by Zero Trust.
Posted: 20 Jul 2021 | Published: 20 Jul 2021

AWS & Trustgrid

A Computer Weekly e-guide on Network Visibility, Performance and Monitoring
sponsored by ComputerWeekly.com
EGUIDE: Traditional discourse around networks is centred around the basic premise of if you build it they will come. And if they come, they will be able to use the network to its fullest extent and everyone will be happy.
Posted: 06 Jul 2021 | Published: 06 Jul 2021

ComputerWeekly.com

The CISO's guide to supply chain security
sponsored by ComputerWeekly.com
EGUIDE: Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021

ComputerWeekly.com

A Computer Weekly Buyers Guide to 5G
sponsored by ComputerWeekly.com
EGUIDE: Despite the fears of many that rollouts of the next generation infrastructure would be delayed or just not be possible due mainly to the adverse economic conditions caused by Covid-19, the prospects are actually quite bright for the 5G industry in 2021.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

ComputerWeekly.com

Executive Summary: The Total Economic Impacttm Of Palo Alto Networks For Network Security And SD-WAN
sponsored by Palo Alto and Redspam
ANALYST BRIEF: Access the executive summary of Forrester’s recent report, The Total Economic Impact of Palo Alto Networks for Network Security and SD-WAN to unlock an exclusive look at the features, costs and risks associated of Palo Alto’s network security and SD-WAN offerings.
Posted: 28 Jun 2021 | Published: 28 Jun 2021

Palo Alto and Redspam

How Next-Gen SD-WAN is driving the SASE revolution
sponsored by Palo Alto Networks
WEBCAST: In response to growing networking and security challenges in the digital era, Gartner created the concept of Secure Access Service Edge (SASE) to help organizations embrace the future of network security. Watch this webinar to learn more about the SASE revolution and why it’s dependent on a new approach to SD-WAN.
Posted: 24 Jun 2021 | Premiered: May 31, 2021

Palo Alto Networks

ROI Strategies with Frictionless Zero Trust
sponsored by CrowdStrike
EBOOK: Zero Trust security needs have changed as we enter the digital era. Read this Frost & Sullivan e-book for a closer look at how digital transformation has changed Zero Trust, the benefits and challenges of SIEM-based threat detection, ROI strategies for frictionless Zero Trust, and more.
Posted: 08 Jun 2021 | Published: 08 Jun 2021

CrowdStrike

CrowdStrike Zero Trust
sponsored by CrowdStrike
PRODUCT OVERVIEW: As we enter the digital age, more and more organizations are embracing the Zero Trust security philosophy of “never trust, always verify”. However, traditional Zero Trust approaches are static and tricky to manage. Read this solution brief to learn about CrowdStrike’s key principles of Zero Trust and explore their frictionless approach.
Posted: 08 Jun 2021 | Published: 08 Jun 2021

CrowdStrike

The rise of edge computing
sponsored by ComputerWeekly.com
EGUIDE: The growing momentum around 5G has spurred the rise of edge computing applications designed to crunch and process data at the edge of the network. In this e-guide, read more about edge computing developments in the Asia-Pacific region, as well as the pros and cons of adding edge computing to a cloud architecture
Posted: 18 May 2021 | Published: 19 May 2021

ComputerWeekly.com

Pass-the-Hash and Pass-the-Ticket
sponsored by Verizon
WHITE PAPER: Pass-the-hash and its relative, pass-the-ticket, are attack techniques commonly used by adversaries to compromise enterprise servers after some other attack has created a foothold inside the enterprise. Inside this white paper, learn how Verizon Software Defined Perimeter (SDP) uses multi-factor authentication to mitigate these attacks.
Posted: 12 May 2021 | Published: 12 May 2021

Verizon

WEBINAR: ZTNA is the Evolution of VPN
sponsored by Fortinet, Inc.
WEBCAST: Learn why organizations are shifting away from VPN in favor of zero-trust network access, why a traditional VPN tunnel is not ideal for secure access, the advantages of an automatic, secure connection, and how ZTNA ensures only the right users and devices are given access.
Posted: 11 May 2021 | Premiered: May 11, 2021

Fortinet, Inc.

National Gas Distributor Achieves Pipeline Visibility
sponsored by Nozomi Networks
CASE STUDY: Midstream oil and gas companies operate within complex environments. Their industrial control systems (ICS) include dozens of equipment types and cover vast distances. This makes it challenging to monitor, manage and secure pipeline systems that aren’t thoroughly documented or easy to visualize.
Posted: 10 May 2021 | Published: 10 May 2021

Nozomi Networks

Fortisase—Cloud-Delivered Security To Every User, Everywhere
sponsored by Fortinet, Inc.
PRODUCT OVERVIEW: In order to extend secure access and high-performance connectivity to a growing remote workforce, organizations are looking to integrate Secure Access Service Edge (SASE) solutions. Read this solution brief for a closer look at the key features and capabilities of Fortinet’s SASE offering – known as FortiSASE.
Posted: 10 May 2021 | Published: 10 May 2021

Fortinet, Inc.

Securing The Digital Workplace
sponsored by TATA Communications
DATA SHEET: Organizations are challenged by the need to provide seamless application experience, unified platform support for preventative protection, secure data exchanges and more. Solutions such as VPN and zero trust are helping, but still more can be done. View this data sheet to explore how Tata Communications’ Secure Remote Access can help.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TATA Communications

The State of Security Segmentation Report
sponsored by Illumio
RESEARCH CONTENT: This report summarizes the results of a survey of over 300 IT professionals conducted by Virtual Intelligence Briefing (ViB) to understand how companies segment today and what difficulties they face.
Posted: 19 Apr 2021 | Published: 19 Apr 2021

Illumio

HGC Accelerates Zero Trust with Illumio
sponsored by Illumio
CASE STUDY: Find out how telecommunications leader HGC Global Communications Ltd implemented micro-segmentation that keeps pace with their fast growing business – enabling a zero-trust security posture while reducing operational effort by 25%.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

Illumio

Delivering a More Secure Network From the Start
sponsored by Aruba Networks
RESOURCE: Remote work has accelerated the move to cloud. What’s your plan to deliver the network performance improvements and close security gaps? A Zero Trust Edge solution can help by securely connecting and transporting traffic in and out of remote sites leveraging cloud-based security and networking services. Download this infographic to learn more.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

Aruba Networks

Introducing The Zero Trust Edge Model For Security And Network Services
sponsored by Aruba Networks
ANALYST REPORT: To support the digitalization of a company using cloud and IoT, many networking teams turned to SD-WAN. However, SD-WAN doesn’t address many new security requirements. In this Forrest report, gain a better understanding of Zero Trust edge, an emerging Zero Trust solution that will help unify networking and security infrastructure.
Posted: 15 Apr 2021 | Published: 05 Apr 2021

Aruba Networks

Companies Boost Home/Mobile Remote Access Performance, Scalability and Security with Cato
sponsored by Cato Networks
WHITE PAPER: The COVID-19 pandemic led to the largest global work-at-home experiment in history. Unfortunately, home users often wrestle with the slow performance, latency and unreliability that come with backhauling remote connections to a data center. In this white paper, learn how 3 organizations were able to overcome these challenges with the help of Cato.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

Cato Networks

15 Experts' Questions and Answers about SASE
sponsored by Cato Networks
WHITE PAPER: SASE is, in brief, a new enterprise networking technology category introduced by Gartner in 2019. SASE solutions are cloud services that connect and secure all enterprises “edges” – datacenters, branch offices, mobile uses, and cloud resources. To learn more about SASE and explore an expert Q&A, check out this white paper.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

Cato Networks

Why CISOs need advanced network security strategies now
sponsored by SearchSecurity.com
EZINE: Network security has to move beyond the basics. With systems and data under assault by sophisticated attackers, CISOs and other security leaders need to put in place advanced network security strategies that incorporate the latest technologies -- AI, machine learning and more.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

SearchSecurity.com

Threat detection and response demands proactive stance
sponsored by SearchSecurity.com
EBOOK: Cyberthreat volume, velocity and vectors are surging, taxing already stressed security teams. The time for a new cybersecurity approach is here. Threat detection and response tools are evolving just in time, as are the techniques to combat security alert fatigue.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

SearchSecurity.com
1 - 25 of 1280 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences