IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
26 - 50 of 1458 Matches Previous Page  |  Next Page
Applying Machine Learning to Outstanding Network Asset Detection
sponsored by Delve
WHITE PAPER: In this white paper, learn about the concept of “Gold Nuggeting,” or how to dig for outstanding network devices using machine learning.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

Delve

Webinar: Application Fluency through Automated SD-WAN
sponsored by Oracle Communications
WEBCAST: How can software-defined networking optimize network architecture to enhance application performance? This Doyle Research webcast, presented by Oracle, gives an overview of SD-WAN and how it helps you get the most out of your mission-critical apps.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Oracle Communications

How Okta’s IT + Workplace Teams Are Getting Ready for Dynamic Work
sponsored by Okta
WEBCAST: While the trends and practices within workplace optimization have varied over the last few decades, the main objective has remained the same: Optimize the productivity of people and processes. Watch this webinar and listen to 2 distinguished Okta leaders as they discuss the future of workplace optimization.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Okta

You've Got BEC!
sponsored by Proofpoint
EBOOK: BEC attacks have become bigger and costlier than ever. Toyota Boshoku, a subsidiary of the car manufacturer, lost $37 million to a BEC scam. Toyota is one of many companies that has suffered a loss from this type of email fraud. The good news? There is a layered approach to keep your email accounts and data safe. Open this e-book to learn more.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

Proofpoint

Hunt for Data Protection Ends with Encryptionizer®
sponsored by NetLib Security
CASE STUDY: In this case study, discover how a medical device manufacturer (MDM) was able to address the risks targeting their patient data and overcome internal challenges related to protecting PHI, encrypting devices and ensuring compliance with increasingly stringent regulations.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

NetLib Security

Data Catalogs for Privacy
sponsored by BigID
WHITE PAPER: The growing need for data privacy is a driving force for data catalogs: organizations need to be able to layer in context from personal, sensitive, and situational data to get value out of data management. Download this white paper to learn more about evolving traditional data catalogs to reflect the needs of the privacy age.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

BigID

Securing the New Normal: A Virtual Happy Hour on Moving Forward
sponsored by RSA Conference
WEBCAST: In this webcast, a panel of industry leaders discuss the future of cybersecurity, highlighting what’s next for the industry, and the ways in which cybersecurity will evolve as we come to understand the “new normal” – focusing on business processes, procedures and policies, network security architecture and much more.
Posted: 08 Jul 2020 | Premiered: Apr 7, 2020

RSA Conference

An Introduction to Ranking a Vulnerability’s Priority Based on its Network Context
sponsored by Delve
WHITE PAPER: To help organizations quantify their vulnerabilities, they need to understand its context within their network. Download this white paper for an introductory look at contextual prioritization, an approach to vulnerability risk scoring that works to understand context and uses that information to identify potential risk areas.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Delve

The CISO Speaks: Insights from the Frontlines
sponsored by RSA Conference
EBOOK: In today’s increasingly complex cybersecurity landscape, CISOs play an essential role both within the C-suite and across multiple critical areas of an organization. With more cybersecurity professionals looking to CISOs for insights on the latest challenges and trends, RSA Conference blogger Tony Kontzer conducts Q&As with today’s leaders.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

RSA Conference

Leveraging AI to Modernize Vulnerability Management and Remediation
sponsored by Delve
WHITE PAPER: Advances in AI provide organizations with the ability to automate workloads and offer intelligent decision-making capabilities, easing the burden on IT and security teams and allowing them to focus on strategic imperatives. Download this white paper to learn more about embracing AI to modernize vulnerability management and remediation.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Delve

From 30% to 100% Remote: How to Lead the Rapid Shift to a Remote Workforce
sponsored by Okta
WEBCAST: Connecting and communicating is critical for maintaining a semblance of normality, especially during times of crisis. Achieving this in the era of COVID-19, which saw the remote workforce jump from 30% to 100%, has been particularly challenging. Watch this webinar to see how IT and workplace technology experts at Okta handled this transition.
Posted: 07 Jul 2020 | Premiered: Jul 7, 2020

Okta

Remote Working: How to Make the Laptop Lifestyle Flow Sweetly (and Securely) for Your Business
sponsored by Kaspersky Lab
WHITE PAPER: 58% of staff are motivated by the flexibility offered by working from home. Take a glimpse at this white paper released before the outbreak of COVID-19 outlining WFH benefits, trends and challenges.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Kaspersky Lab

10-Step Executive Action Plan for Collective Defense
sponsored by IronNet
EBOOK: A collective approach may be beneficial to organizations searching for security advantages.Indeed, a heightened security posture often begins and ends with collaboration. In this e-book, read more about how a combination of organizational preparedness and advanced technology can aid in defending against threats.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

IronNet

How to Get the Most Value out of Your Penetration Test
sponsored by RSA Conference
WEBCAST: At RSA Conference, Ed Skoudis from the SANS Institute facilitated a problem-solving discussion in the RSAC Engagement Zone. Jump into this webcast to see how he follows up on that discussion. He shares insights into what he learned from the community on getting the most value from penetration testing.
Posted: 07 Jul 2020 | Premiered: May 5, 2020

RSA Conference

The 5 Most Dangerous New Attack Techniques and How to Counter Them
sponsored by RSA Conference
VIDEO: What are the most dangerous new techniques attackers are employing? This fast-paced briefing features three experts from the SANS Institute best-positioned to provide answers: the nation’s top expert on mobile forensics, the director of the Internet Storm Center and the top hacker exploits expert in the US.
Posted: 07 Jul 2020 | Premiered: 28 Feb 2020

RSA Conference

Prioritizing Network Vulnerabilities: A Survey and Comparison of Today’s Options
sponsored by Delve
WHITE PAPER: In the current network security climate, there are three methods organizations can use to assess whether they are putting their eggs in the right baskets when it comes to vulnerability. Browse this white paper to get a closer look at these methods and see which can be best employed in your department.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Delve

What SMBs Need to Know to Survive a Ransomware Attack
sponsored by RSA Conference
WEBCAST: Ransomware is costly and can be catastrophic for businesses—but it doesn’t have to be. This webcast focuses on the cybersecurity needs of small to medium-sized businesses. Industry leaders walk you through the steps you can take (regardless of your budget) to ensure that your business survives a ransomware attack.
Posted: 06 Jul 2020 | Premiered: Apr 9, 2020

RSA Conference

7 Ways AI Can Automate and Improve Vulnerability Management Operations
sponsored by Delve
WHITE PAPER: Although under-utilized, AI has the potential to streamline operations through automation while reducing vulnerability risk for vulnerability management operations. Read this white paper to discover 7 ways AI can automate and enhance traditional or stagnant vulnerability management operations.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Delve

Remote Work Cybersecurity: Best Practices & Trends
sponsored by Kaspersky Lab
EGUIDE: The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.
Posted: 06 Jul 2020 | Published: 30 Jun 2020

Kaspersky Lab

Kaspersky Lab’s COVID-19 Relief Initiatives
sponsored by Kaspersky Lab
EGUIDE: Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.
Posted: 06 Jul 2020 | Published: 29 Jun 2020

Kaspersky Lab

Better Protection. Less Tools. 7 Benefits of Security Consolidation.
sponsored by Koncise
WHITE PAPER: Security architecture is difficult to nail down. With a myriad of companies specializing in various technologies, creating a good posture can be an arduous task. What you may not know is that reliance on one vendor alone can provide benefits not noticed until they are closely examined. This white paper gives an overview of security consolidation.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Koncise

Guide to Software Defined Perimeter (SDP) Delivered as Part of a SASE Platform
sponsored by Cato Networks
DATA SHEET: As network bandwidths increase, there is a growing need for secure remote access options than can handle increased availability, performance, and security. View this data sheet to discover the potential of SDP as part of a SASE platform.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

Cato Networks

Light Agent or Agentless
sponsored by Kaspersky Lab
PRODUCT OVERVIEW: Virtual environments require a cybersecurity approach that goes beyond the scope of traditional systems. Download this features guide for an in-depth look at Kaspersky Security for Virtualization, an advanced network protection offering designed to improve threat detection speeds while offering the scalability needed for modern environments.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

Kaspersky Lab

How Okta’s Cloud-First IT Strategy Enables a Dynamic Work Environment
sponsored by Okta
WEBCAST: Cloud is most relevant in an age where employees are working from home. Network security is moving to the cloud, and in this webcast, Okta, a company with no data centers, explains why.
Posted: 02 Jul 2020 | Premiered: Jul 2, 2020

Okta

BlackBerry AI-Powered Zero Trust
sponsored by BlackBerry
WEBCAST: Endpoint security affects all aspects of an organization, not least when workforces are remote. To this end, Zero Trust can be a double-edged sword for leaders in industry. Namely, they want to stock up on security without sacrificing user experience. How can this be done in a mature manner? This webcast presents models that organizations can use.
Posted: 02 Jul 2020 | Premiered: Jul 2, 2020

BlackBerry
26 - 50 of 1458 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info