IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
26 - 50 of 1228 Matches Previous Page  |  Next Page
Transform Your Branches With Secure SD-WAN
sponsored by Fortinet, Inc.
PRODUCT OVERVIEW: Businesses continue to strive for better WAN performance and visibility, but security now tops their priorities when it comes to the challenges with their WAN. In this white paper, learn about a secure SD-WAN that enables organizations to rapidly adopt cloud applications while keeping security at the forefront.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

Fortinet, Inc.

Quarterly Threat Landscape Report
sponsored by Fortinet, Inc.
RESEARCH CONTENT: In this research report, find a summary of statistics culled from billions of threat events observed by Fortinet devices in live production environments around the world. The report also digs into and adds context around those key findings.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

Fortinet, Inc.

2019 Global Threat Report
sponsored by CrowdStrike
RESEARCH CONTENT: Nation-state adversaries were continuously active throughout 2018. Looking forward, there is ample evidence that adversaries will be forced to adapt and deploy stealthier tactics in order to continue their profitable operations. In this white paper, explore CrowdStrike's recommendations to maintain a strong defense.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

CrowdStrike

Managed Detection and Response
sponsored by Trend Micro, Inc.
RESOURCE: As attackers become more sophisticated, enterprises must turn to advanced detection and response capabilities. Correlating threats to get a complete picture of a targeted attack is an effective detection strategy. However, the shortage in cybersecurity skills causes enterprises struggle with this. In this resource, learn how Trend Micro can help.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

Trend Micro, Inc.

Endpoint Sensor: Understand the source, impact, and spread of advanced threats with endpoint detection and response (EDR)
sponsored by Trend Micro, Inc.
RESOURCE: Malware can manifest itself in your enterprise networks, bypassing traditional security technology. Fortunately, Trend Micro's Endpoint Sensor gives insight to detections by allowing threat investigators to explore detections and hunt for new threats. In this resource, learn more key features of Endpoint Sensor.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

Trend Micro, Inc.

Malicious Power Shell Usage
sponsored by Symantec
WEBCAST: In living-off-the-land attacks, attackers take advantage of common tools living in your network. One common type of a living-off-the-land attack is a PowerShell attack. This webcast shows how PowerShell attacks take place and how your organization can avoid being a target.
Posted: 05 Mar 2019 | Premiered: Mar 5, 2019

Symantec

Distributed Denial Of Service
sponsored by Neustar
VIDEO: How can you avoid outages from DDoS attacks? In this short video, learn about SiteProtect NG that offers, quick detection and alerting, integrated intelligence, PCI DSS compliance, and much more.
Posted: 04 Mar 2019 | Premiered: 04 Mar 2019

Neustar

2019 Internet Security Threat Report: Executive Summary
sponsored by Symantec
RESEARCH CONTENT: Like flies to honey, miscreants swarm to the latest exploits that promise quick bucks with minimal effort. Ransomware and cryptojacking had their day; now it's formjacking's turn. In the Symantec Internet Security Threat Report, discover the latest insights into global threat activity, cybercriminal trends, and attacker motivations.
Posted: 04 Mar 2019 | Published: 28 Feb 2019

Symantec

Internet Security Threat Report: Big Numbers
sponsored by Symantec
RESOURCE: In this infographic, discover key findings from the Internet Security Threat Report. Also, learn about the state of many threats including malicious URLs, ransomware and malware.
Posted: 04 Mar 2019 | Published: 28 Feb 2019

Symantec

Neustar IP Intelligence Family
sponsored by Neustar
VIDEO: Today, organizations need to be able to differentiate real-user traffic from "non-human" traffic. In this short video, learn how your organization can get deep insight into the risks associated with a specific IP address, a user's location, and much more.
Posted: 01 Mar 2019 | Premiered: 01 Mar 2019

Neustar

Is Your DNS At Risk?
sponsored by Neustar
VIDEO: DNS downtime, no matter how short, is never good. So, what preventative security measures can you take? In this short video, learn how your organization can prevent DNS downtime and ensure excellent latency and quick, reliable global coverage today.
Posted: 01 Mar 2019 | Premiered: 01 Mar 2019

Neustar

Key Principles and Strategies for Securing the Enterprise Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how to create a multi-cloud network security strategy based on 3 key principles, and examine use cases to see how other organizations keep themselves secure.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

Fortinet, Inc.

Protect Against a Perfect Storm of Cyber Threats
sponsored by Symantec
RESEARCH CONTENT: Fresh digital security threats are continually emerging from new and unexpected sources. Cyber criminals adapt to your defenses by designing new malware variants to evade network and endpoint security. In this report, discover the enormous number of malware variants that Symantec detects daily.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

Symantec

AI-Driven Cyber Crime Puts Network Engineering in the Hot Seat
sponsored by Fortinet, Inc.
WHITE PAPER: Cyber criminals are leveraging AI and agile development techniques to outpace human security analysts and outmaneuver even the newest network defenses. In this white paper, learn different ways to revamp your network security strategy to help keep you protected from an evolving threat landscape.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

Fortinet, Inc.

2018 State of the Internet/Security – Credential Stuffing Attacks Report
sponsored by Akamai Technologies
RESEARCH CONTENT: This 2018 State of the Internet/Security – Credential Stuffing Attacks report studies botnet behavior and is based on more than 8.3 billion malicious login attempts on the Akamai Intelligent Edge Platform from May and June 2018. Learn about the latest botnet trends behind the rise of credential stuffing attacks, and how you can defend against them.
Posted: 28 Feb 2019 | Published: 30 Sep 2018

Akamai Technologies

Using Trend Micro's Hybrid Cloud Security Solution to Meet PCI DSS 3.2 Compliance
sponsored by Trend Micro, Inc.
WHITE PAPER: This white paper examines the applicability of Trend Micro's Hybrid Cloud Security Solution, specifically Trend Micro Deep Security, to secure Payment Card Industry (PCI) data in accordance with the PCI DSS when used in physical, virtual, cloud, or container environments.
Posted: 27 Feb 2019 | Published: 31 Aug 2017

Trend Micro, Inc.

Why Corelight Is Your Best Next Move in Enterprise Security
sponsored by Corelight
WHITE PAPER: The most sophisticated enterprises continue to be breached, attacked, and compromised. Most large organizations have deployed endpoint security solutions, but often times are still not enough. As a result, many companies are adding network-wide visibility for protection. In this white paper, learn about the benefits of Corelight Sensors.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Corelight

What to Look for in a Network Access Control Tool
sponsored by Fortinet, Inc.
WHITE PAPER: Download this to learn what you should look for when choosing a network access control (NAC) tool to help you stay protected in the face of changing network infrastructure and sophisticated endpoint attacks.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Fortinet, Inc.

Using AI to Address Advanced Threats
sponsored by Fortinet, Inc.
WHITE PAPER: Read this white paper to learn how AI and machine learning can help you improve network security and keep up with the evolving nature of threats by automating and speeding up detection and remediation.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Fortinet, Inc.

Ensure Secure Passage with Enhanced Transportation Communications
sponsored by Motorola, Inc.
WHITE PAPER: This resource explores how investing in unified communications and enhanced perimeter security can help put the right data in the right hands at the right moment, and keep logistics moving forward at the pace of digital business. Find out how to enable secure, nationwide push-to-talk communications with WAVE two-way radios and more.
Posted: 27 Feb 2019 | Published: 30 Sep 2018

Motorola, Inc.

2019 Report: State of the Phish
sponsored by Proofpoint
RESEARCH CONTENT: Proofpoint complied and analyzed data from tens of millions of simulated phishing emails sent to end users. They also ran surveys with end-users and infosec professionals. Download the report to discover key findings form their research and recommendations to better protect your organizations from phishing attacks.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Proofpoint

UK IT Priorities 2019
sponsored by ComputerWeekly.com
EGUIDE: The results of our 2019 IT Priorities survey are in, and they show the good news that IT budgets are rising faster than they have for many years. Cloud remains the top spending priority for this year, but IT automation is growing fast as a major investment area.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

ComputerWeekly.com

Bridging the NOC-SOC Divide
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how you can strengthen security by bridging the gap between siloed network operations centers (NOCs) and security operations centers (SOCs) to provide the needed agility, scalability and better use of technical resources.
Posted: 26 Feb 2019 | Published: 26 Feb 2019

Fortinet, Inc.

Four Ways to Improve Endpoint Security
sponsored by Fortinet, Inc.
WHITE PAPER: Endpoint devices continue to be one of the favorite targets for cyberattacks. To address this vulnerability, security leaders must integrate endpoint security into their network security architecture. In this white paper, learn how a deep connection between endpoint and network security offers key improvements to holistic enterprise protection.
Posted: 26 Feb 2019 | Published: 27 Aug 2018

Fortinet, Inc.

NPMD for Network Security Forensics
sponsored by Viavi
WHITE PAPER: Download this white paper to learn about network performance monitoring and diagnostics (NPMD) and network forensics and how they can help strengthen protection against ever-increasing cyberattacks, malware, and internal espionage threats.
Posted: 25 Feb 2019 | Published: 25 Feb 2019

Viavi
26 - 50 of 1228 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement