IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
176 - 200 of 1532 Matches Previous Page  |  Next Page
When it Comes to Optimizing Mid-Market Enterprise Networks, One Size Does Not Fit All
sponsored by Windstream Communications
RESOURCE: This resource stresses the key considerations to make when you are choosing a SD-WAN provider for your enterprise network.
Posted: 25 Sep 2017 | Published: 25 Aug 2017

Windstream Communications

Realizing the Promise of Scale in the Cloud
sponsored by West UC
WHITE PAPER: In this white paper, find out how healthcare organizations depend on UCaaS to provide up-to-date technology and deliver productivity benefits to improve customer satisfaction.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

West UC

Secure Cloud Faxing for Highly Regulated Industries
sponsored by j2 Global
WHITE PAPER: In this white paper, learn how you can seamlessly implement a cloud fax model without impacting functionality and security – all while gaining a better understanding of the traits to consider when selecting a cloud fax vendor.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

j2 Global

Metrics for Success: How does your UC&C stack up?
sponsored by Vyopta
RESOURCE: In this resource, find out how your UC&C strategies compare to competitors and learn how to leverage key performance indicators (KPIs) to bring your monitoring, voice, video, and messaging tools into a single view to track your success.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Vyopta

Driving Voice and Video Usage with Skype for Business
sponsored by Vyopta
RESOURCE: In this resource, learn how to make the transition to new UC strategies - like Skype for Business - without impacting security and customer satisfaction.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Vyopta

Intro to UCaaS: Creating Engaging Experiences in the Digital Workplace
sponsored by Windstream Communications
RESOURCE: In this resource, learn the fundamentals of UCaaS, how to make the switch, and what you qualities you should consider when choosing a UCaaS provider.
Posted: 25 Sep 2017 | Published: 26 Jul 2017

Windstream Communications

Leaving the Traditional Network WANosaurus Behind with SD-WAN
sponsored by Windstream Communications
WHITE PAPER: The biggest challenge for current WAN networks is the cloud. Explore this white paper to learn how SD-WAN technology provides its users with the flexibility to add/change bandwidth in near real-time, while enhancing security and user experience.
Posted: 22 Sep 2017 | Published: 01 Aug 2017

Windstream Communications

Cloud Security Report
sponsored by Alert Logic
RESEARCH CONTENT: According to this Cloud Security report, application attacks account for 75% of verified security incidents beating out brute force attacks, DDoS and more. In this research report, explore an overview of these different types of attacks and how attackers choose their targets.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Alert Logic

Transitioning from Traditional IT to a Secure Cloud
sponsored by Alert Logic
CASE STUDY: This case study explores how Wilbur-Ellis transformed their network infrastructure and the immediate benefits received from leveraging an Amazon Web Services (AWS) cloud platform and security-as-a-service (SaaS) provider.
Posted: 22 Sep 2017 | Published: 31 Dec 2015

Alert Logic

Interconnection: Fueling the Explosion of the Digital Economy
sponsored by Equinix
RESOURCE: In this resource, learn how your bandwidth compares to others with the help of the Global Interconnection Index. Recognize the trends, insights, and projections.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Equinix

Global Interconnection Index
sponsored by Equinix
WHITE PAPER: Evolving business models are placing more importance on real-time engagement, requiring you to scale your digital platforms or risk failing. Access this white paper to learn about a network infrastructure that gives your the power to transfer the entire printed content in the U.S. Library of Congress three times over in one second.
Posted: 18 Sep 2017 | Published: 31 Aug 2017

Equinix

The Total Economic Impact Of xMatters
sponsored by xMatters, Inc.
RESEARCH CONTENT: In this research report, Forrester Consulting shares the ROI from organizations that used xMatters as their communications and notifications platform.
Posted: 15 Sep 2017 | Published: 31 Jan 2017

xMatters, Inc.

The Total Economic Impact of Security-as-a-Service: Alert Logic
sponsored by Alert Logic
RESEARCH CONTENT: This Forrester Consulting report examines the ROI for organizations that used Alert Logic services for cloud security.
Posted: 11 Sep 2017 | Published: 31 Jul 2017

Alert Logic

Building the Agile Enterprise: Maintain Your Competitive Edge
sponsored by Verizon
WHITE PAPER: Enterprise leaders want a network that exceeds their customers' expectations. Explore this white paper to reveal how to collaborate better with employees and open up new business opportunities by virtualizing your network infrastructure.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Verizon

Building the Case for Virtual Network Services
sponsored by Verizon
WHITE PAPER: As the digital economy continues to take hold, organizations need to focus on their applications, and specifically how customers access the services within the business. Read this white paper to reveal benefits you can see from using network functions virtualization.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Verizon

The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure
sponsored by Google Cloud
WHITE PAPER: Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Google Cloud

Guide to Early Application Testing and Understanding Dev and Ops Responsibilities
sponsored by IBM
EGUIDE: Explore the importance of early application security testing. Learn from Owen Garrett, Head of Products for NGINX Inc., while he explains the security risks with containers and developing microservices.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

How to Think like a Hacker to Stop Application Security Threats
sponsored by IBM
EGUIDE: Find out how applying the hacker mindset when setting application security standards can help uncover flaws that vulnerability scanners might not recognize.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

How to Secure Mobile Applications in a Private Cloud
sponsored by IBM
EGUIDE: In this expert e-guide, uncover the benefits and challenges of creating a private app store to control and monitor the delivery of properly secured mobile applications.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

How to Boost Mobile Application Security
sponsored by IBM
EGUIDE: In this expert e-guide, discover ways to boost mobile application security by performing regular assessments to help eliminate an enterprise's vulnerability to data breaches and attacks.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

How to Build an Enterprise Application Security Program
sponsored by IBM
EGUIDE: In this e-guide, learn the key steps to building an enterprise application security program to decrease exposure to potential attackers through statics and dynamic application testing.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

IBM

Discover True Advanced Threat Detection
sponsored by Microsoft
RESOURCE: In this infographic, explore a service that enables you to detect, investigate and respond to complex targeted attacks on your networks.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Microsoft

Five Risk Points To Avoid In Enterprise Security
sponsored by Microsoft
RESOURCE: In this white paper, guide yourself through the 5 step course to detect and prevent advance cyberattacks.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Microsoft

Microsoft Windows Defender Advanced Threat Protection Examined
sponsored by Microsoft
RESEARCH CONTENT: In this Forrester Research Report, learn how, by switching to the Windows Defender Advanced Threat Protection software, 4 businesses in the energy, automotive, food and beverage, and IT industries were able to improve productivity, reduce risk, and more.
Posted: 15 Sep 2017 | Published: 31 Jul 2017

Microsoft

France: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
RESOURCE: Which industries in France are attacked most for malware, phishing and spam?
Posted: 12 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems
176 - 200 of 1532 Matches Previous Page    6 7 8 9 10 11    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement