IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
26 - 50 of 1291 Matches Previous Page  |  Next Page
Managing Security Risk and Compliance in a Challenging Landscape
sponsored by Dell
RESOURCE: How can you keep your business secure that amid the proliferation of devices and data? It starts with a trusted technology partner. Download this research report to learn why a trusted partner is key to a successful security strategy.
Posted: 13 Mar 2020 | Published: 13 Mar 2020

Dell

How Can Trend Micro XDR Solve Your Detection and Response Challenges
sponsored by Trend Micro
RESOURCE: In the last 5 years, there’s been a 67% increase in security breaches. Disconnected security layers make analyzing and investigating threats a challenge. Additionally, slow and inadequate response increases the impact of the attack. In this infographic, learn how Trend Micro XDR can help solve your detection and response challenges.
Posted: 13 Mar 2020 | Published: 13 Mar 2020

Trend Micro

What Makes A Standalone IPS So Effective?
sponsored by Trend Micro
WHITE PAPER: In this white paper, explore the guiding principles security researchers need to follow when designing and developing effective vulnerability filters, with examples of how these filters can be used by an IPS to detect and block the latest threats.
Posted: 12 Mar 2020 | Published: 01 Oct 2019

Trend Micro

Coronavirus: How Ready Are You for Remote Access?
sponsored by PortSys
RESOURCE: Coronavirus is already demonstrating the power it can have to upset the interconnectedness of our business world. With the number of Coronavirus victims worldwide rapidly growing, many businesses will need to support employees who work from home. In this blog post, learn how your organization can take a secure approach to remote access.
Posted: 11 Mar 2020 | Published: 09 Mar 2020

PortSys

Protection Inside and Outside the Office: The New State of Cybersecurity
sponsored by Cisco Umbrella
RESOURCE: More and more employees are working outside of the central office — and often outside its protection. To secure these remote workers and locations requires a fundamentally different approach. Learn more about the new state of cybersecurity in this infographic.
Posted: 11 Mar 2020 | Published: 11 Mar 2020

Cisco Umbrella

Exploring the SD-WAN Business Case
sponsored by 128 Technology
ANALYST REPORT: With the right product, the basic business case for SD-WAN can be expanded significantly. However, that doesn’t mean that making an SD-WAN business case is easy. In this report, explore a cost model of enterprise networking to assess the way SD-WAN deployments have impacted costs at many organizations.
Posted: 11 Mar 2020 | Published: 11 Mar 2020

128 Technology

Best Practices to Secure Your Remote Workers
sponsored by Cisco Umbrella
WEBCAST: More organizations are switching to direct internet access (DIA) at satellite offices. But the draw of DIA creates even more gaps in security for IT. Learn how you can improve security, simplify your security environment, and reduce the number of security tools to reduce strain on your limited resources.
Posted: 11 Mar 2020 | Premiered: Mar 11, 2020

Cisco Umbrella

Enhancing Microsoft Services with 128 Technology
sponsored by 128 Technology
DATA SHEET: As businesses seek to migrate and deploy solutions with Microsoft and Azure, they often encounter complexity, inconsistent security, poor performance, unreliable experience, and fairness issues. In this brief, learn how 128T Session Smart Routers can help make these deployments simple, secure, high performing, and reliable.
Posted: 11 Mar 2020 | Published: 11 Mar 2020

128 Technology

MPLS, SD-WAN, Internet, and SASE
sponsored by Cato Networks
WHITE PAPER: The WAN is the backbone of the business. It ties together your remote locations, headquarters and data centers into an integrated network. Yet, the role of the WAN has evolved in recent years. In this white paper, learn about the connectivity, optimization and security options that are needed when building a network for the digital business.
Posted: 10 Mar 2020 | Published: 10 Mar 2020

Cato Networks

Why is Cloud-Native SD-WAN Considered a Top Choice Among IPVPN Alternatives?
sponsored by Cato Networks
WHITE PAPER: While IPVPN can address select small-scale WAN use cases, it simply isn’t designed to meet the demands of the modern digital business. By taking a converged, scalable, and secure approach to WAN connectivity, cloud-native SD-WAN serves as the ideal IPVPN alternative. Download this white paper to learn more.
Posted: 10 Mar 2020 | Published: 10 Mar 2020

Cato Networks

SASE Since Birth!
sponsored by 128 Technology
WHITE PAPER: In its 2019 Hype Cycle for Enterprise Networking report, Gartner defines SASE (secure access service edge) as an emerging market that combines elements of SD-WAN and network security into a single cloud-managed package. In this white paper, learn how 128 Technology has been SASE since birth.
Posted: 10 Mar 2020 | Published: 10 Mar 2020

128 Technology

A Guide to SD-WAN ROI with Riverbed SteelConnect EX
sponsored by Riverbed
ANALYST REPORT: EMA research found that SD-WAN solutions deliver positive ROI, and can do so rather quickly. 65% of enterprises engaged with SD-WAN expect to earn an ROI with the solution within 2 years or less. In this report, explore the potential ROI that an enterprise can earn when it implements Riverbed’s SD-WAN solution, SteelConnect EX.
Posted: 09 Mar 2020 | Published: 31 Jan 2020

Riverbed

DevSecOps and the Problem of Machine-Scale Data
sponsored by Ionic Security
RESOURCE: The amount of data being created daily is growing exponentially, and manual processes can’t scale. With data growth comes increasing complexity and higher importance for security to be integrated into the SDLC. Discover the opportunities and threats of machine-scale data, how to maintain agility, and the implications this has for DevSecOps.
Posted: 06 Mar 2020 | Published: 08 Oct 2019

Ionic Security

Managing SaaS Performance Is Key
sponsored by Riverbed
WEBCAST: While SaaS promises numerous benefits to the business, there are new challenges for IT which, if not properly addressed, can hinder performance, frustrate users, and impact the overall velocity of the business. In this webcast, Brad Casemore of IDC and Alison Conigliaro-Hubbard of Riverbed discuss key factors for improving SaaS performance.
Posted: 05 Mar 2020 | Premiered: Mar 5, 2020

Riverbed

Top 5 Use Cases for Cisco Umbrella
sponsored by Cisco Umbrella
RESOURCE: The modern workplace has evolved to include remote access and mobile devices, while also introducing a new generation of complex security threats. In this e-book, 5 customers share the unique ways Cisco Umbrella protects their network. Read on to unlock the use cases.
Posted: 04 Mar 2020 | Published: 04 Mar 2020

Cisco Umbrella

A Roadmap to SASE
sponsored by Cisco Umbrella
EBOOK: Today’s security pros are contending with an entirely new type of network and new set of security needs. Why? Find out where the security landscape is heading, as well as information on SASE: a new standard of security (according to Gartner) and the steps you can take to keep your organization secure.
Posted: 04 Mar 2020 | Published: 04 Mar 2020

Cisco Umbrella

SD-WAN: Unbox Your Branch Office
sponsored by Wipro
RESOURCE: While cloudification has successfully moved applications to a central location, the people who need to access these apps are distributed across the globe. It’s no longer possible to have an IT staff member in each branch. In this blog, learn how virtualized branch networking can help to address these shortcomings.
Posted: 04 Mar 2020 | Published: 04 Mar 2020

Wipro

Enabling a Zero-Trust Security Strategy
sponsored by Ionic Security
RESOURCE: Organizations are shifting from traditional perimeter security approaches to zero-trust strategies that focus on monitoring individual credentials and accounts in order to identify and isolate potential risks. In this blog post, discover how Ionic may be positioned to help your organization execute its zero-trust security strategy.
Posted: 03 Mar 2020 | Published: 03 Mar 2020

Ionic Security

Application Security: The Easy Way
sponsored by Ionic Security
RESOURCE: Securing internal applications is a top priority among IT security teams. Yet achieving it is time & resource consuming. In fact, 76% of total IT expenditure is spent on securing internal apps. It doesn’t need to be so difficult – this blog post highlights how Ionic’s data-centric Machina Tools may be able to help. Read on to learn more.
Posted: 03 Mar 2020 | Published: 16 Aug 2018

Ionic Security

2020 Cybersecurity Trends: Consolidation, Cloud, and Convergence
sponsored by Cisco Umbrella
EBOOK: As technology enables organizations to improve the way they do business, the cybersecurity landscape evolves to reflect this change – both in terms of cyberattacks and security tactics. This e-book highlights the top cybersecurity trends of 2020, designed to guide organizations towards a secure network, today and in the years to come.
Posted: 03 Mar 2020 | Published: 03 Mar 2020

Cisco Umbrella

Secure Everywhere: The Power of Integrated Internet, Endpoint & Email Security
sponsored by Cisco Umbrella
RESOURCE: Organizations today are struggling to find the resources needed to identify and address security gaps within their networks. This e-book is designed to help get you started by highlighting the challenges that lead to security gaps and overviewing the benefits of an integrated approach to security. Read on to learn more.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Cisco Umbrella

How the Cloud Simplifies Network Security
sponsored by Cisco Umbrella
WHITE PAPER: Many enterprises have seen their digital transformation efforts hindered by their legacy network architectures and cybersecurity models rooted in the past. In this white paper, learn how SASE can help organizations by converging network services with security services into a cloud-based service that connects and secures any enterprise resource.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Cisco Umbrella

Transforming Enterprise Access Network to Software Defined
sponsored by Wipro
WHITE PAPER: The dynamics of user traffic are changing, especially with more IoT devices coming into the access network, along with content-heavy social media, voice, video and data, which puts a lot of stress on the access network. In this blog, learn how Software Defined Access (SDA) can help ensure faster, more secure network access for users.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Wipro

Your Ultimate Guide to SD-WAN
sponsored by TechTarget
RESOURCE: Traditional WANs have many capabilities that SD-WAN also has built-in. However, in traditional WANs, adding on these capabilities can be time-consuming, complex and kludgy. In our expert guide, further explore how SD-WAN differs from traditional WANs. To access this guide, participate in our WAN questionnaire now.
Posted: 28 Feb 2020 | Published: 28 Mar 2020

TechTarget

Understanding Zero Trust Security
sponsored by Atlassian
WHITE PAPER: Inside this white paper, find the current state of workplace security, the basic principles of the Zero-Trust security model, and how you can begin your journey towards a Zero Trust-secure workplace environment.
Posted: 28 Feb 2020 | Published: 28 Feb 2020

Atlassian
26 - 50 of 1291 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info