IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
26 - 50 of 1343 Matches Previous Page  |  Next Page
The Security Challenges of Today’s Accelerated Digital Initiatives
sponsored by Corsa Technology Inc
RESOURCE: Today security pros need to tackle the growing attack surface, as well as challenges like rightsizing, a skills shortage, and the need for automation if they are to keep their organization safe. Take a brief survey to learn more on why network security leaders need to automate and simplify virtualization of their infrastructure.
Posted: 30 Apr 2021 | Published: 30 Apr 2021

Corsa Technology Inc

Five Steps to Automated Firewall Virtualization
sponsored by Corsa Technology Inc
EBOOK: PH
Posted: 30 Apr 2021 | Published: 30 Apr 2021

Corsa Technology Inc

Securing The Digital Workplace
sponsored by TATA Communications
DATA SHEET: Organizations are challenged by the need to provide seamless application experience, unified platform support for preventative protection, secure data exchanges and more. Solutions such as VPN and zero trust are helping, but still more can be done. View this data sheet to explore how Tata Communications’ Secure Remote Access can help.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TATA Communications

The State of Security Segmentation Report
sponsored by Illumio
RESEARCH CONTENT: This report summarizes the results of a survey of over 300 IT professionals conducted by Virtual Intelligence Briefing (ViB) to understand how companies segment today and what difficulties they face.
Posted: 19 Apr 2021 | Published: 19 Apr 2021

Illumio

HGC Accelerates Zero Trust with Illumio
sponsored by Illumio
CASE STUDY: Find out how telecommunications leader HGC Global Communications Ltd implemented micro-segmentation that keeps pace with their fast growing business – enabling a zero-trust security posture while reducing operational effort by 25%.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

Illumio

Delivering a More Secure Network From the Start
sponsored by Aruba Networks
RESOURCE: Remote work has accelerated the move to cloud. What’s your plan to deliver the network performance improvements and close security gaps? A Zero Trust Edge solution can help by securely connecting and transporting traffic in and out of remote sites leveraging cloud-based security and networking services. Download this infographic to learn more.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

Aruba Networks

Introducing The Zero Trust Edge Model For Security And Network Services
sponsored by Aruba Networks
ANALYST REPORT: To support the digitalization of a company using cloud and IoT, many networking teams turned to SD-WAN. However, SD-WAN doesn’t address many new security requirements. In this Forrest report, gain a better understanding of Zero Trust edge, an emerging Zero Trust solution that will help unify networking and security infrastructure.
Posted: 15 Apr 2021 | Published: 05 Apr 2021

Aruba Networks

New Priorities for IT Operations: Be Ready for Whatever Comes Next
sponsored by Tanium
WHITE PAPER: With remote work operationalized, IT teams can now strategically evaluate recent decisions and determine what needs to be done to update and align processes and infrastructure without additional disruption. How does ITOps get this done? Download this white paper by ESG to discover a pragmatic roadmap to IT sustainability. 
Posted: 13 Apr 2021 | Published: 31 Mar 2021

Tanium

Companies Boost Home/Mobile Remote Access Performance, Scalability and Security with Cato
sponsored by Cato Networks
WHITE PAPER: The COVID-19 pandemic led to the largest global work-at-home experiment in history. Unfortunately, home users often wrestle with the slow performance, latency and unreliability that come with backhauling remote connections to a data center. In this white paper, learn how 3 organizations were able to overcome these challenges with the help of Cato.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

Cato Networks

15 Experts' Questions and Answers about SASE
sponsored by Cato Networks
WHITE PAPER: SASE is, in brief, a new enterprise networking technology category introduced by Gartner in 2019. SASE solutions are cloud services that connect and secure all enterprises “edges” – datacenters, branch offices, mobile uses, and cloud resources. To learn more about SASE and explore an expert Q&A, check out this white paper.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

Cato Networks

SASE as a Gradual Deployment
sponsored by Cato Networks
WHITE PAPER: Gartner recently introduced a new architecture called SASE that converges networking and security capabilities. Moving to a new architecture can be daunting, which is why any SASE architecture should support enterprises moving at their own pace. In this white paper, explore 5 use cases of gradual deployment that a SASE architecture should support.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

Cato Networks

IT Managers Share Lessons Learned from Shifting to Work-from-Home
sponsored by Cato Networks
WHITE PAPER: The global COVID-19 pandemic exploded suddenly, with an unprecedented impact on enterprise work styles. In a matter of days, thousands of organizations had to shift to a remote workforce. In this white paper, find out how 3 organizations were able to ramp up their COVID-19 WFH strategy fast and seamlessly with the help of Cato’s SASE platform.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

Cato Networks

Securing Digital Innovation Demands Zero-trust Access
sponsored by Fortinet, Inc.
WHITE PAPER: As more organizations innovate digitally, apps and data disperse, and the network perimeter disappears. With malware-infected endpoints having increased 53% in the last 12 months, it’s safe to assume that threats are always present. View this white paper to learn how a zero-trust approach mitigates this constant threat presence.
Posted: 05 Apr 2021 | Published: 24 Sep 2020

Fortinet, Inc.

Comparison and Analysis of Security Aspects of LoRaWAN and NB-IoT
sponsored by Telekom Deutschland GmbH
WHITE PAPER: The two most commonly used LPWA technologies today are NarrowBand IoT (NB-IoT) and Long Range Wide Area Network (LoRaWAN). While more and more IoT use cases use NB-IoT or LoRaWAN technology, security specialists have observed IoT-related attacks increasing sharply for years. In this white paper, take a look at the security of NB-IoT and LoRaWAN.
Posted: 05 Apr 2021 | Published: 05 Apr 2021

Telekom Deutschland GmbH

SASE: A How-to Guide
sponsored by TechTarget
RESOURCE: Gartner defined a new cloud-based multifunction architecture service model called Secure Access Service Edge, or SASE, pronounced "sassy," in 2019. In our all new expert guide, SASE: A How-to Guide, learn everything you need to know about SASE. This guide is available for immediate download after participating in our brief survey.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

Gartner Market Guide to Zero Trust Network Access
sponsored by Axis Security
RESOURCE: If your organization is looking into zero trust network access (ZTNA), download this Gartner ZTNA Market Guide outlining key findings, recommendations, market direction and various ZTNA models and vendors.
Posted: 31 Mar 2021 | Published: 08 Jun 2020

Axis Security

Extreme Networks Video 1
sponsored by Extreme Networks
WEBCAST: As the internet of things (IoT) becomes increasingly popular, it changes the way organizations approach securing the devices connected to their network. Watch this webinar to learn more about IoT, including a comprehensive definition, and overview of associated security challenges, strategic best practices and more.
Posted: 29 Mar 2021 | Premiered: Mar 29, 2021

Extreme Networks

Building a better relationship with Zero: Why Zero Trust needs a Zero Touch approach
sponsored by BlackBerry
RESOURCE: BlackBerry's Zero Trust model is built on the concept of minimal, or indeed zero, disruption – a framework known as 'Zero Touch'. This means utilizing AI to learn the users' behavior and usage patterns, and only challenging the user when they deviate from the learned model. Access this resource to learn more about Blackberry's Zero Trust model.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

BlackBerry

The Total Economic Impact Of Palo Alto Networks For Network Security And SD-WAN
sponsored by Palo Alto Networks
ANALYST REPORT: Palo Alto Networks commissioned Forrester Consulting to conduct an objective Total Economic Impact study and examine the potential ROI enterprises realize when deploying Palo Alto Networks for network security and SD-WAN. Download this report to explore key findings from the study.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

Palo Alto Networks

Availability and Buying Options in the Emerging SASE Market
sponsored by Palo Alto Networks
ANALYST REPORT: Separate networking and security infrastructures no longer fit enterprise needs. Secure access service edge, or SASE, converges the two, creating an identity-centric network environment that improves service delivery with security built in. View this research report to learn buying options for SASE and how vendors compare.
Posted: 23 Mar 2021 | Published: 26 Feb 2021

Palo Alto Networks

Getting started with SASE: A guide to secure and streamline your network infrastructure
sponsored by Cloudflare
WHITE PAPER: SASE, or secure access service edge, simplifies traditional network architecture by merging network and security services on one global network. This white paper explores the evolution of network security that led to SASE, outlines the breadth of services included in a SASE solution and offers practical steps to move toward SASE adoption.
Posted: 22 Mar 2021 | Published: 01 Dec 2020

Cloudflare

The iboss cloud Zero Trust Network Access (Z TNA) Private Access Platform architecture
sponsored by iBoss
WHITE PAPER: Organizations deploying and using legacy network security appliances to protect cloud connectivity and internet access are faced with the problem of the disappearing network perimeter. But zero trust network access can ensure fast, compliant and secure connections from anywhere. Download this white paper to explore zero trust in detail.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

iBoss

7 ways to work from anywhere
sponsored by Cloudflare
WHITE PAPER: Today, workforces are drastically more mobile and distributed. Where it was once feasible to draw a perimeter around corporate resources, the rise of SaaS, cloud computing, and remote work has rendered this approach obsolete. In this e-book, learn 7 best practices that can help you protect your global workforce without sacrificing productivity.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Cloudflare

Why CISOs need advanced network security strategies now
sponsored by SearchSecurity.com
EZINE: Network security has to move beyond the basics. With systems and data under assault by sophisticated attackers, CISOs and other security leaders need to put in place advanced network security strategies that incorporate the latest technologies -- AI, machine learning and more.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

SearchSecurity.com

Threat detection and response demands proactive stance
sponsored by SearchSecurity.com
EBOOK: Cyberthreat volume, velocity and vectors are surging, taxing already stressed security teams. The time for a new cybersecurity approach is here. Threat detection and response tools are evolving just in time, as are the techniques to combat security alert fatigue.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

SearchSecurity.com
26 - 50 of 1343 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences