IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
151 - 175 of 1162 Matches Previous Page  |  Next Page
Exploiting a Pandemic White House COVID-19 Phishing Scams
sponsored by Inky Technology
EBOOK: It is important to understand that we are living in a time of extreme vulnerability, and this is no less apparent than to those who are working in security. Increased internet use has led to an increase in phishing scams of all kinds. View this e-book to understand what it looks like when a phisher imitates the White House and the President.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Inky Technology

Around the World in 34 Phish: Covid-19 Phishing Examples
sponsored by Inky Technology
RESOURCE: The state of the world has left email servers more vulnerable to attack than ever. As phishing is the most used method of cyberattack in the world, there have been plenty of examples to identify and dissect to help people develop a more watchful eye. Browse this article to see 34 different examples of phishing scams across the globe.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

Inky Technology

C-Suite Perspectives: Accelerated Cloud Migration but Lagging Security
sponsored by Radware
ANALYST REPORT: By now, “quick acceleration to the cloud compromised by lack of security” is a song you’ve heard 2500 times. But it’s true – businesses have forced their hand when it comes to cloud migration, and the resulting lapse in security has left them vulnerable. Get in the know – read this in-depth report to learn perspectives from C-suite executives.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

Radware

Brave the new normal: How companies in Asia-Pacific are overcoming security challenges in a remote workplace.
sponsored by Barracuda
WHITE PAPER: According to a recent study, 62% of APAC organizations said they wouldn’t have implemented remote working for another 5 years if it weren’t for COVID-19. The rapid adoption of the new normal has left many of these organizations vulnerable – read this white paper to learn how APAC organizations are addressing these security challenges.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Barracuda

Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.
Posted: 21 Sep 2020 | Published: 21 Sep 2020

ComputerWeekly.com

GoSecure Cybersecurity Perceptions Versus Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

GoSecure

Ransomware Decoded
sponsored by Cybereason
WHITE PAPER: Ransomware has reemerged, and ransom payments have shot up in tandem, with the average payout at $80,000 in Dec. 2019. In addition, it’s evolving to avoid detection, and with the advent of Ransonware-as-a-Service (RaaS), even non-technical users can create an attack. Stay vigilant, read this white paper to learn what modern ransomware looks like.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Cybereason

Cybereason EDR
sponsored by Cybereason
DATA SHEET: Endpoint detection & response (EDR) allows organizations to monitor their environments with force, so they can know when a threat is present and respond in seconds, rather than days. Plus, it correlates an attack across all endpoints to give a single view of an attack in real time. View this data sheet to get a closer look at key capabilities.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Cybereason

A web of weak spots: Securing your supply chain with NDR and Collective Defense
sponsored by IronNet
WHITE PAPER: Today’s supply chain is an extended enterprise with many back doors. Indirect attacks against weak links in the supply chain now account for 40% of security breaches. How can you better protect your data? Dig into this white paper to learn the 5 most common attacks and how network detection & response can help prevent them.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

IronNet

SD-WAN: Accelerating network transformation in APAC
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read more about SD-WAN's momentum in the Asia-Pacific region, and how the technology can support the requirements of a multi-cloud environment.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

ComputerWeekly.com

XDR: Extended Detection and Response
sponsored by Palo Alto Networks
WHITE PAPER: Extended detection & response (XDR) has emerged in the wake of a need to detect, investigate and respond to threats across all threat vectors in a company’s infrastructure (network, endpoint and cloud) rather than just one. Dive into this white paper to learn about XDR and how it uses integration and orchestration as defense.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Palo Alto Networks

The Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation
sponsored by Palo Alto Networks
ANALYST REPORT: Endpoint detection and response (EDR) is quickly becoming a ubiquitous security technology in the age of remote work. As such, it is critical for security professionals to be aware of the vendors in the space. Tap into the Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation to help you pick the right tool for your organization.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

Security Orchestration For Dummies
sponsored by Palo Alto Networks
EBOOK: Security orchestration is a new term to the market, but it could simplify the lives of security professionals. It refers to the integration of security tools, unifying intelligence and automating tasks, resulting is a more effective security operations center that better detects and responds to threats. Dive into this e-book for a detailed guide.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

Next-Generation Firewall Buyer’s Guide
sponsored by Palo Alto Networks
RESOURCE: Cloud adoption, big data analytics, machine learning and automation are all accelerating the delivery of applications, which in and of themselves are becoming increasingly accessible. However, this also means that apps are more vulnerable than ever. Browse this guide to learn how Next-Gen Firewalls can minimize risk without slowing you down.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

Assessing the Economic Impact of Cybereason
sponsored by Cybereason
ANALYST REPORT: As the security threat landscape continues to grow in complexity, organizations are looking for the best solutions to protect their endpoints without overextending their already overworked security and IT teams. For help, read this Forrester report to get an in-depth look at key findings for the Cybereason Defense Platform.
Posted: 25 Aug 2020 | Published: 29 May 2020

Cybereason

Achieving Resilience in Your Distributed Workforce Environment During the COVID-19 Pandemic and Beyond
sponsored by Tanium
WHITE PAPER: To accommodate the transformation to remote work, organizations have upended their traditional IT infrastructure and adopted decentralized networks, cloud-based services, and widespread usage of employees’ personal devices. This has revealed critical gaps in visibility. Use this white paper to learn how to fill these gaps and remain resilient.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Tanium

Danger within: email and security awareness training strategies for effective account takeover protection
sponsored by Mimecast
WHITE PAPER: It’s a common misconception that email-borne attacks come only from outside the organisations. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Mimecast

Cybereason Mobile
sponsored by Cybereason
DATA SHEET: Mobile devices are now more popular for enterprise use and workplace productivity than desktops or laptops. With millions of malware threats for a growing variety of devices and OS’s alongside cloud and mobile-first apps, the risks are complex and expanding. Don’t get left behind, view this data sheet to learn how to keep mobile devices secure.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Cybereason

Seton Hall University Uncovers Ongoing Threats and Lowers Cost with Cybereason
sponsored by Cybereason
CASE STUDY: A prominent university on the east coast was not confident in its network’s visibility and protection. They searched for a powerful solution that could provide both the visibility they needed and strong detection through the use of a single agent. Read this case study to learn the details of Seton Hall’s choice of Cybereason for security.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Cybereason

Cybereason MDR Packages
sponsored by Cybereason
DATA SHEET: Detection and response are vital to any organization’s security. With managed detection and response (MDR), you can efficiently prevent data breaches, eliminate false positives, and because it’s managed, you can optimize security operations and reduce total cost of ownership. Dive into this data sheet to learn about MDR from Cybereason.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Cybereason

work from anywhere
sponsored by Silver Peak
WEBCAST: With many employees working from home amid COVID-19, every user and their home network is now a new branch site that network administrators must support. In this webcast, learn how to reliably and securely connect your users to business-critical applications wherever they are working from.
Posted: 19 Aug 2020 | Premiered: Aug 19, 2020

Silver Peak

zero to 400 in just two weeks
sponsored by Silver Peak
WEBCAST: In this webcast, learn how pharmaceutical solutions leader TrialCard responded quickly and efficiently to support an immediate transition to a remote workforce with the help of Silver Peak.
Posted: 18 Aug 2020 | Premiered: Aug 18, 2020

Silver Peak

State of Ransomware
sponsored by BlackBerry
ANALYST REPORT: The increased reporting of cyber incidents among large companies in ANZ in the first half of 2020 has been evident. A handful of ransomware families are dominating these attacks. Browse this report to investigate some of the tactics used by these ransomware families, their high profile victims, and strategies used to defend against these threats.
Posted: 14 Aug 2020 | Published: 14 Aug 2020

BlackBerry

Maximizing LTE & 5G Inside & Beyond Retail Stores
sponsored by Cradlepoint
WHITE PAPER: The ways and places that retailers serve customers have changed a great deal recently. Whether it’s a long-term location or a self-serve kiosk, one of the biggest necessities is dependable connectivity. In this white paper, learn why retailers are turning to Wireless WAN to support the unique challenges of retail connectivity.
Posted: 14 Aug 2020 | Published: 14 Aug 2020

Cradlepoint

Why You Should Consider Endpoint Detection & Response
sponsored by Claranet
EGUIDE: Endpoint security has become an especially hot topic over the past few months. Organizations need to put clamps on hackers who attempt to breach their infrastructure. As such, traditional legacy endpoint security systems may not be able to stand up to modern threats. Read this expert guide to learn about endpoint detection & response.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Claranet
151 - 175 of 1162 Matches Previous Page    5 6 7 8 9 10    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences