IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
26 - 50 of 1519 Matches Previous Page  |  Next Page
Experience Monitoring by NetMotion
sponsored by NetMotion
RESOURCE: The ability to gather real-time, actionable data about the experience of workers can have a great impact on business success in a remote world. Experience monitoring uses this ability to help organizations increase uptime, productivity and satisfaction. Click this resource to learn more about NetMotion Digital Experience Monitoring.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

NetMotion

An Introduction to Experience Monitoring
sponsored by NetMotion
WHITE PAPER: Have increases in remote work and the spike public cloud, SaaS and internet application usage made it more difficult for you to manage and troubleshoot devices on your network? Access this report for an in-depth overview of experience monitoring, a tool that gives IT greater visibility over devices for an improved employee experience.
Posted: 13 Jan 2021 | Published: 13 Jan 2021

NetMotion

SASE and the Forces Shaping Digital Transformation Part 3: Government and Industry Regulations, and Global Social and Economic Forces
sponsored by Netskope
WEBCAST: SASE adoption must be done with an awareness of not just governmental and industry regulations, but also shifts in security budgets, the economy at large and even global conflicts and trade wars. View this blog post exploring SASE and these forces shaping digital transformation.
Posted: 12 Jan 2021 | Premiered: Nov 18, 2020

Netskope

Context-Aware Micro-Segmentation with VMware NSX Data Center
sponsored by Tech Data - VMWare
WHITE PAPER: With the increasing number of IoT devices, the more segmented networks are, and threats can’t move laterally within the data center. In this solution brief, learn about the benefits of context-aware micro-segmentation with VMware NSX data center.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Tech Data - VMWare

SASE & the Forces Shaping Digital Transformation
sponsored by Netskope
RESOURCE: With the rise of of digital transformation, SASE, and the continuing effects of the COVID-19 pandemic, there are key forces that security practitioners need to be aware of. This blog outlines and details how security leaders can adapt to these key forces in a digitally transforming, SASE-enabled world – read on to get started.
Posted: 12 Jan 2021 | Published: 05 Nov 2020

Netskope

Enterprise VPN Software Solutions
sponsored by NetMotion
RESOURCE: Modern approaches to remote access such as SDP are emerging, but most enterprises will continue to need a robust VPN that meets the needs of the increasingly mobile workforce. As such, NetMotion has designed a VPN with a focus in optimizing experience for mobile workers. Access this product page to learn more.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

NetMotion

A Computer Weekly Buyers Guide to 5G
sponsored by ComputerWeekly.com
EDITORIAL RESOURCE GUIDE: Despite the fears of many that rollouts of the next generation infrastructure would be delayed or just not be possible due mainly to the adverse economic conditions caused by Covid-19, the prospects are actually quite bright for the 5G industry in 2021.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

ComputerWeekly.com

Palo Alto Networks Video: Learn How SASE Can Help Enable a Secure Remote Workforce
sponsored by Palo Alto Networks
WEBCAST: Businesses worldwide are now remote, and so networking and security professionals now face the challenge of securely scaling access for their mobile workforces. SASE can help address this challenge by convergeing networking and network security capabilities into a single cloud-delivered service. Listen to this panel of experts to learn more.
Posted: 11 Jan 2021 | Premiered: Jan 11, 2021

Palo Alto Networks

Here Comes 2021: 5 Safe Bets and 5 Long Shot Predictions
sponsored by Netskope
WHITE PAPER: Quite often, things don’t go as planned (as least as far as the big events in life go). For networking and security professionals, this was true of plans made in 2019 for 2020. All of 2019’s plans went out the window early on, and organizations had to adjust. So, what are experts saying about 2021? Download this article to find out.
Posted: 11 Jan 2021 | Published: 24 Nov 2020

Netskope

IoT Platform Leader Armis Eliminates Dependency on VPN Technology, Adopts Axis Zero Trust Solution
sponsored by Axis Security
CASE STUDY: Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Axis Security

MyID – Replacing Central Access Management with a State-of-the-Art IAM Solution
sponsored by IC Consult
CASE STUDY: Legacy authentication lacks flexibility, availability and security. Businesses are now searching for future-proof solutions that can optimize the flexibility of IT services by providing innovative and secure authentication methods. Peruse this case study to learn how iC Consult provided an enterprise-wide IAM solution through a hybrid cloud.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

IC Consult

Axis Security Video: Safely Delivering Simple, Secure and Managed 3rd Party Access
sponsored by Axis Security
VIDEO: VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.
Posted: 11 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

NetMotion: Uncompromised Secure Access
sponsored by NetMotion
VIDEO: Workers are now working from everywhere, and VPNs are no longer able to provide ample protection in our increasingly mobile world. You need complete visibility into what’s happening on all your devices, no matter where they are. Where can you get it? Take a pause to watch this short video examining NetMotion’s SDP.
Posted: 11 Jan 2021 | Premiered: 11 Jan 2021

NetMotion

Where CASB and SWG Are Headed
sponsored by Netskope
RESOURCE: Gartner recently released Magic Quadrant reports for both CASB and SWG – but given the trajectory of where network security is headed, should CASB and SWG even be separate capabilities? Read this article to learn more about Gartner’s 2020 findings and Netskope’s 2021 predictions.
Posted: 11 Jan 2021 | Published: 05 Jan 2021

Netskope

Key Reasons Why Your Organization Should Migrate to A UCaaS Provider
sponsored by Datalink Networks
WHITE PAPER: Despite a huge migration of data to the public cloud in recent years most midmarket and enterprise organizations have retained their on-premises phone system. That’s about to change starting in 2021. In this white paper, uncover the underlying reasons driving UCaaS adoption and check out the advantages that UCaaS can bring to your organization.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Datalink Networks

SASE and the Forces Shaping Digital Transformation Part 2: Organizational Culture & Adversaries and Threats
sponsored by Netskope
WHITE PAPER: Amid digital transformation, an industry-wide focus on SASE and the effects of the continuing COVID-19 pandemic, there are key forces that security practitioners need to be aware of and operate within. Read this in-depth blog to understand the forces of organizational culture, as well as adversaries and threats, on SASE initiatives.
Posted: 08 Jan 2021 | Published: 12 Nov 2020

Netskope

Designing Security For Remote-Work-First Enterprises
sponsored by Palo Alto Networks
RESEARCH CONTENT: As a result of the spread of COVID-19, Gartner observed a stark increase in inquiries related to remote access (over 400%), and a recent survey revealed that 41% of employees are going to be working remote post-pandemic. Read this report to discover Gartner’s 3 step process for building cybersecurity for remote workforces.
Posted: 08 Jan 2021 | Published: 30 Jun 2020

Palo Alto Networks

Helpful Answers to Your SASE-est Questions
sponsored by Netskope
WHITE PAPER: Businesses large and small are seeing the cost benefits of moving to a cloud-native control point, with the security posture and risk management tools they need. With that in mind, they still have questions and want clarity about SASE as a concept. In this article, peer through some of the most popular questions (and answers) about SASE.
Posted: 08 Jan 2021 | Published: 18 Dec 2020

Netskope

Software-Defined Perimeter
sponsored by NetMotion
RESOURCE: Now that remote work is nearly ubiquitous, employees are accessing company resources from a variety of devices and networks. This change widens an organization’s attack surface, and therefore, security teams are researching new technologies to protect networks – for example, the software-defined perimeter (SDP). Read more here.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

NetMotion

The 10 Tenets of an Effective SASE Solution
sponsored by Palo Alto Networks
WHITE PAPER: This e-book guides you through the top 10 requirements to keep in mind as you look for an effective SASE offering. Download it now to learn about Zero Trust network access, quality of service (QoS), DNS security, and threat prevention.
Posted: 07 Jan 2021 | Published: 07 Jan 2021

Palo Alto Networks

SIA Product Page
sponsored by Citrix
WHITE PAPER: From transitioning to the cloud to managing an increasingly distributed workforce, it’s more important than ever to secure users, apps and data—without compromising the employee experience. Use this white paper to discover how Citrix Secure Internet Access can help you protect all users, in any location, for all applications via the cloud.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Citrix

A Unified Approach to SASE that Starts with the Digital Workspace
sponsored by Citrix
WHITE PAPER: IT departments have many challenges on their hands. They need to secure users from bad actors, and enterprise data from prying eyes, while said users are working from home or in-office, and they must provide flexible access to business and personal applications wherever they are. In this article, see how a unified approach to SASE can help.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Citrix

Simplify Zero-Trust Security from the Cloud
sponsored by JumpCloud
WHITE PAPER: The surging number of remote users, device types and cloud-based resources calls for a security framework that grants access to identity, device and network rather than only one or two. This is the essence of zero trust. Open this white paper to view a specific outline of zero-trust security and how to implement it with a cloud directory platform.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

JumpCloud

How to Manage macOS Systems Remotely with an MDM
sponsored by JumpCloud
WHITE PAPER: The mobile device management (MDM) and identity and access management (IAM) markets were heavily impacted by the global shift to remote work in 2020. This white paper highlights some of the major changes and offers guidance for remotely securing and managing macOS systems in your fleet.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

JumpCloud

Citrix offers a fully unified, ready-to-deploy SASE solution
sponsored by Citrix
RESOURCE: Your business has new requirements to meet today’s challenges. Legacy, hardware-based networking and security architectures fail to meet the needs of remote workers, manage the shift to the cloud and protect against zero-day threats. It’s time for a change – download this infographic to learn about SASE from Citrix.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Citrix
26 - 50 of 1519 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info