IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
26 - 50 of 1409 Matches Previous Page  |  Next Page
The Benefits of Using Managed Secure Devices Integrated With Cloud Communications Services
sponsored by NWN Corporation
WHITE PAPER: For users, business communications is a holistic experience: They use their devices to go online, using networks to connect to their applications and data. Additionally, they don’t want to worry about security. In this white paper, learn how IT teams can make this possible by using managed secure devices as a cloud service.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

NWN Corporation

Five Key Steps To Securely Connect Your Remote Workforce
sponsored by Intrado
WHITE PAPER: After the initial scramble to enable employees to stay safe by working from home, companies are now able to take stock of the situation and address any security gaps. In this white paper, uncover 5 key steps to help you create a long-term sustainable plan for secure remote working.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Intrado

Accelerate Network Detection and Response with Gigamon ThreatINSIGHT
sponsored by Gigamon
DATA SHEET: Information security and incident response teams struggle because they cannot see what is happening on the network, cannot detect threats with high confidence, and cannot respond to attacks quickly effectively due to a lack of visibility and context. In this brief, learn how the Gigamon ThreatINSIGHT solution can help.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Gigamon

Ofcom raise over £1.3bn in new 5G spectrum auction
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: After announcing their plans to extend and improve basic 4G connectivity around the country, the UK's mobile operators are celebrating their principal gains in the 5G arena with low-band and mid-band spectrum.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

ComputerWeekly.com

4 Key Elements Of An ML-Powered NGFW: How Machine Learning Is Disrupting Network Security
sponsored by Palo Alto Networks
WHITE PAPER: Bad actors and security teams are trading blows when it comes to leveraging automation, with both sides scaling their operations. But as more and more organizations leverage cloud, environments become more complex and more vulnerable. Delve into this white paper to learn how machine learning (ML) can aid in securing your network.
Posted: 17 Mar 2021 | Published: 17 Mar 2021

Palo Alto Networks

Iot Security For Healthcare
sponsored by Palo Alto Networks
DATA SHEET: Learn about an IoT Security service that allows you to prevent threats and control the risk of IoMT, IoT, and IT devices on your network across all sites.
Posted: 16 Mar 2021 | Published: 16 Mar 2021

Palo Alto Networks

SIG - How Maryland's leading healthcare provider has adopted a SASE approach to improve security and build patient trust with Cisco Umbrella
sponsored by Cisco Umbrella
CASE STUDY: Frederick Health needed a secure and efficient solution at the cloud edge that could provide granular controls for users no matter where they connect from. Frederick Health turned to Cisco to provide a SASE architecture and deployed DNS-layer security, secure web gateway and firewall functionality from Cisco Umbrella.
Posted: 16 Mar 2021 | Published: 16 Mar 2021

Cisco Umbrella

DNS - Top cybersecurity trends 2021: Pandemic-related content used for attack propagation
sponsored by Cisco Umbrella
WHITE PAPER: In the face of new and rising pandemic-related threats, it's more important than ever to ensure that all web traffic is inspected and protected, so people can get the information they need — without getting compromised. Find out how to keep your employees safe from these types of attacks in 2021.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

Cisco Umbrella

New In Google Cloud Vmware Engine: Improved Reach, Networking And Scale
sponsored by Google
RESOURCE: Google Cloud VMware Engine can help simplify the challenges of moving and modernizing critical workloads to the cloud, letting you seamlessly migrate your VMware workloads from on-premises data centers directly into Google Cloud. In this blog post, learn more about the innovative features that can help to improve networking and security.
Posted: 15 Mar 2021 | Published: 18 Feb 2021

Google

DNS - The Top Six Network Security Pitfalls
sponsored by Cisco Umbrella
RESOURCE: Trying to get ahead by staying behind a firewall won’t work in 2021. A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Avoid these six common network security pitfalls that put your users, their devices, and your data at risk.
Posted: 12 Mar 2021 | Published: 12 Mar 2021

Cisco Umbrella

Better Together: Prisma Access And CloudGenix SD-WAN
sponsored by Palo Alto Networks
DATA SHEET: In this brief, learn how CloudGenix SD-WAN and Prisma Access have joined together to deliver hybrid applications to branch offices over any network while providing consistent, cloud-delivered security.
Posted: 11 Mar 2021 | Published: 11 Mar 2021

Palo Alto Networks

What is secure SD-WAN?
sponsored by Infovista
RESOURCE: As more and more organizations leverage cloud resources, network threats loom larger and larger. But secure SD-WAN lets you secure and control the extended edge, contracting your attack surface. And with web security gateways (WSGs) and firewalls, you’ve got a security 1-2 punch. Dive into this guide to discover secure SD-WAN & firewalls.
Posted: 11 Mar 2021 | Published: 11 Mar 2021

Infovista

The 3 keys to achieving SASE
sponsored by Cisco Umbrella & Presidio
EBOOK: In this e-book, you will learn the three fundamentals of SASE: Simplicity, security, anywhere and everywhere scalability. Evolve to meet changing network and security needs. Download this e-book and connect with a Presidio expert today!
Posted: 11 Mar 2021 | Published: 11 Mar 2021

Cisco Umbrella & Presidio

Five Tips To Enable A Remote Workforce Securely
sponsored by Silver Peak and Red Swan
RESOURCE: It’s been almost a year now – for many, remote work has become the standard, and as such, security professionals are always on high alert. Want to stay on top of secure remote work best practices and strategies to ensure end user safety? Read these 5 tips for maintaining WFH culture while securing your workers and assets.
Posted: 05 Mar 2021 | Published: 29 May 2020

Silver Peak and Red Swan

Transforming IT Security with SASE
sponsored by Cisco Umbrella
WEBCAST: With the adoption of cloud-delivered services, SD-WAN has proved that it can deliver improved application performance, reduced costs and simplified branch operations. But despite all these benefits, security remains one of the biggest concerns. Watch this webinar to see how SASE can deliver multiple security functions from the cloud.
Posted: 05 Mar 2021 | Premiered: Apr 8, 2020

Cisco Umbrella

How To Solve 6 Of The Biggest It Challenges In 2021
sponsored by Viavi
EBOOK: Driven by a surge in remote access and increasing cost pressures, IT is amidst great upheaval that will impact how networks and applications are managed. This will bring many challenges to the forefront as IT teams work to securely deliver the best experience to their workforces. Download this e-book to learn how to solve 6 of these challenges.
Posted: 03 Mar 2021 | Published: 03 Mar 2021

Viavi

It's Not A Mystery —It's Your Network
sponsored by Viavi
ANALYST REPORT: Network professionals get headaches from issues concerning user productivity, business agility and threat mitigation. Now that employees are working from anywhere, these issues are amplified. Dive into this IDC report to learn how networking and security monitoring tools can help you meet these challenges head-on.
Posted: 03 Mar 2021 | Published: 29 Jan 2021

Viavi

A Cost-Benefit Analysis of VMware NSX
sponsored by VMware
ANALYST REPORT: Legacy network architectures are holding organizations back. What they need to consider now is a unified approach to management, automation and security – this is what VMware’s NSX Platform strives to deliver. Access this Forrester Total Economic Impact report to see the prospective business benefits and cost savings of VMware’s NSX Platform.
Posted: 03 Mar 2021 | Published: 31 May 2021

VMware

Centrally Orchestrated End-to-End Segmentation
sponsored by Silver Peak
DATA SHEET: Network security has historically been device-centric, and a lack of network orchestration, automation and segmentation have contributed to inconsistent security policies. The Aruba EdgeConnect SD-WAN edge platform strives to enforce granular security policies across LAN, data center and cloud. Access this solution brief to learn more.
Posted: 03 Mar 2021 | Published: 03 Mar 2021

Silver Peak

The Optimal SASE Enabling Plaform
sponsored by Apcela
RESOURCE: Gartner predicts that by 2024, at least 40% of enterprises will have explicit strategies to adopt secure access service edge (SASE). What do you need to know about SASE and how it will influence your network architecture? Examine this 3-part guide, provided by Apcela, to see why SASE is the next step in the digital evolution.
Posted: 03 Mar 2021 | Published: 03 Mar 2021

Apcela

The Journey to SASE
sponsored by NetMotion
RESOURCE: Learn about the core concepts behind SASE, and the wider movements taking place to contextualize it. This report draws upon the latest research from Gartner, as well as original and previously unpublished data from an extensive January 2021 study on SASE.
Posted: 03 Mar 2021 | Published: 03 Mar 2021

NetMotion

Can a zero-trust approach fill the security perimeter void?
sponsored by SearchSecurity.com
EBOOK: Zero-trust security means more than trusting nothing and no one. It's the best way devised yet to fill the void that the disappearance of the enterprise perimeter left. Learn what steps security pros need to take to implement an effective, zero-trust approach to IT security.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

SearchSecurity.com

How To Protect Your Business By Limiting Attack Dwell Time
sponsored by Viavi
WHITE PAPER: For security teams, it may be more realistic to assume that successful attacks against your IT resources can and will occur, rather than trying to prevent them altogether. For such an approach to work, you must minimize the dwell time of attacks. Examine this white paper to see how VIAVI’s Observer platform could help you do so.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

Viavi

Internal Firewalls for Dummies
sponsored by VMware
EBOOK: Although some operating systems are more secure than others, most used today were not designed for security from the ground up, leaving many holes in IT infrastructure as a result. Security teams need to think about compartmentalizing their network to limit damage from intrusions. Leverage this e-book to see how internal firewalls can help.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

VMware

Staying ahead of disruption
sponsored by Cisco Systems, Inc.
RESOURCE: Can you afford downtime? According to an IBM survey, the cost of one critical application failure can range from $500K to $1M. To avoid this catastrophe, consider leveraging Cisco Business Critical Services, as they aim to help your team preempt, identify and resolve network issues faster. Download this infographic to learn more.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

Cisco Systems, Inc.
26 - 50 of 1409 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences