IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
26 - 50 of 1258 Matches Previous Page  |  Next Page
SD-WAN: Security, Application Experience and Operational Simplicity Drive Market Growth
sponsored by Cisco
ANALYST REPORT: IDC's recent Software-Defined WAN Survey suggests continuing strong momentum for SD-WAN, with almost 95% of enterprises surveyed expecting to use SD-WAN within 24 months. Download this IDC research report to explore the top drivers of SD-WAN and look at how enterprises have benefited from adopting SD-WAN.
Posted: 13 Jan 2020 | Published: 30 Apr 2019

Cisco

The Seven Essentials of a Modern Email Security Platform
sponsored by Ironscales
WHITE PAPER: Businesses of all sizes face the risk of data loss from email phishing campaigns, and existing security solutions can’t keep pace with evolving attack methods. In this playbook, uncover the 7 essentials needed to enable email security, and discover why employees are the top method of threat detection.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

Ironscales

Network Security Best Practices
sponsored by Netwrix Corporation
WHITE PAPER: While ensuring the security of your network is a critical task, the amount of tactics and technologies that exist to support this effort can seem overwhelming. This white paper breaks down the basic aspects, tactics, and best practices related to network security in order to help guide your IT security team. Read on to get started.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

Netwrix Corporation

Whack-a-phish
sponsored by Area 1 Security
WHITE PAPER: Traditional email security defenses rely on past data to detect the next attack, and therefore can’t defend against modern continually evolving phishing methods. Protection from modern attacks requires a proactive approach to security. Read on to learn more about forward-looking security technology for phishing attacks.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

Area 1 Security

A Unified Wired and Wireless Access Edge
sponsored by Cisco
ANALYST REPORT: A critical step in the journey to becoming a digital business is becoming an agile organization. The challenge is that an organization can only be as agile as its least agile IT component, which today is the network—particularly the access edge. In this research report, learn how organizations can change this by implementing a unified edge.
Posted: 09 Jan 2020 | Published: 28 Feb 2019

Cisco

IDC's Worldwide Enterprise Networking Predictions, 2019
sponsored by Cisco
ANALYST REPORT: Enterprises around the world are looking to upgrade their networks to ensure they can meet the needs of their digitally transforming businesses. As they do this, a variety of new technologies are being adopted. Download this IDC research report to review 10 trends that will impact the enterprise networking industry.
Posted: 09 Jan 2020 | Published: 28 Feb 2019

Cisco

A guide to SIEM platforms, benefits and features
sponsored by SearchSecurity.com
EZINE: SIEM systems enable organizations to centralize indecent response, detection and handling, as well as data logging for compliance. This e-guide is a collection of resources highlighting SIEM benefits, criteria and tools. Read on to evaluate which SIEM system is right for you.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

SearchSecurity.com

2020 Global Networking Trends Report
sponsored by Cisco
ANALYST REPORT: IT teams are reaching a point where the scale and complexity of networks is exceeding their ability to manage and secure them effectively. They need new systems that simplify operations and augment human decision making. In this report, examine the emerging network technology, operations and talent trends that form the basis of this new network.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

Cisco

Business Value of Cisco SD-WAN Solutions: Studying the Results of Deployed Organizations
sponsored by Cisco
ANALYST REPORT: Through a comprehensive data collection process, IDC recently interviewed enterprises with distributed business operations to understand the impact of deploying Cisco SD-WAN technology. In this IDC white paper, explore the result of the study and learn how the organizations interviewed have generated significant value for their business.
Posted: 09 Jan 2020 | Published: 30 Apr 2019

Cisco

4 Steps to Building a PII Catalog for Privacy
sponsored by BigID
WHITE PAPER: Data catalogs digest an input of data in order to accurately organize what it is and where it comes from. Effective catalogs enable organizations to automate policy, implement data security and maintain compliance. This white paper highlights a 4-step process designed to guide an organization in its catalog journey. Read on to learn more.
Posted: 08 Jan 2020 | Published: 08 Jan 2020

BigID

Architecting the Wired Campus for Increased Capacity
sponsored by Cisco
ANALYST REPORT: As enterprises transform IT to meet the growing amount of applications, networking teams are adopting technologies to better operate their networks and respond to requests quickly and efficiently. In this report, learn how to make the most of these technologies by planning for the future and making the right IT decisions.
Posted: 08 Jan 2020 | Published: 31 Aug 2019

Cisco

Catching Modern Threats: InsightIDR Detection Methodologies
sponsored by Rapid7
PRODUCT OVERVIEW: Modern threat detection is a 2-pronged approach: to protect an organization against loss, an IT security team needs to be able to detect the 2 types of threats (common and targeted), and deal with them accordingly. This solution guide highlights the key benefits and features of InsightIDR’s cloud SIEM for modern threat detection.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

Rapid7

MDR Evaluator’s Guide
sponsored by AT&T Cybersecurity
RESOURCE: Managed detection and response (MDR) services equip organizations with scalable security and threat intelligence. However, the new market can be difficult to navigate. This evaluator’s guide is designed to help with the decision-making process by offering 10 key elements for considerations and questions to ask potential service providers.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

AT&T Cybersecurity

AlienVault USM vs SIEM
sponsored by AT&T Cybersecurity
RESOURCE: Like any other security program, SIEM was helpful at detecting threats for a time. When new compliance regulations began requiring data records, SIEM became unable to handle the increased volume. This white paper highlights the shortcomings of SIEM and explores AlienVault’s Unified Security Management (USM) platform. Read on to learn more.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

AT&T Cybersecurity

The State of Security Segmentation
sponsored by Illumio
WHITE PAPER: As cyberattacks grow increasingly common, it’s critical to look at how criminals operate in order to prevent damage. Read on to uncover the research findings of a recent study designed to shed light on the current state of security segmentation, and why it’s preferable compared to traditional firewalls.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

Illumio

Next-Generation Data Classification
sponsored by BigID
WHITE PAPER: Traditional approaches to data classification relied on manual entries, which fail to meet the scalability needs of today’s ever-expanding environments. In this white paper, discover BigID’s next-generation data classification approach, which builds on the success of its predecessors with sustainability and privacy at its core.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

BigID

Beginners Guide to Open Source Intrusion Detection Tools
sponsored by AT&T Cybersecurity
RESOURCE: Intrusion detection systems (IDS) are a set of technologies that enable IT teams network visibility in order to identify and prevent suspicious activity from becoming a breach. Read this beginner’s guide to explore various IDS detection techniques to help you get started with network visibility and security.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

AT&T Cybersecurity

Westcon-Comstor Boosts Application Performance with Unity EdgeConnect
sponsored by Silver Peak
CASE STUDY: Westcon-Comstor needed to build greater assurance of WAN availability and improve performance for critical applications like SAP ERP, VoIP, and Office 365 while reducing dependence on costly MPLS. In this case study, learn how Westcon-Comstor was able to accomplish this by deploying the Silver Peak EdgeConnect SD-WAN edge platform.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

Silver Peak

ZS Solves Office 365 Security Issue with PortSys TAC
sponsored by PortSys
CASE STUDY: The threat of a data breach can damage an organization’s reputation with both customers and vendors. When ZS made the decision to implement Office 365, they needed enhanced security to cover data encryption and endpoint management. Read this case study to follow ZS’s journey towards a holistic data loss prevention strategy.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

PortSys

SIEM Tools, Future Tech and How to Prepare for What's Ahead
sponsored by SearchSecurity.com
EBOOK: While security tech is evolving, so are the threats. Current IT staffs are feeling overwhelmed and some experts believe AI is the answer. Gartner, however, claims that AI will never be perfect, and SIEM will always need a human touch. In this e-book, look at current SIEM tools, future tech and how to prepare for what’s ahead.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

SearchSecurity.com

What to Look for in a Zero Trust Solution in 2020
sponsored by PortSys
RESOURCE: With massive breaches regularly making headlines, it’s clear that traditional security is ineffective at mitigating today’s evolving attacks. The zero-trust approach to access control enables organizations to mitigate risk in the cloud era, taking belief out of the equation and substituting it with assurance. Read on to learn more.
Posted: 03 Jan 2020 | Published: 03 Jan 2020

PortSys

Zero Trust Access
sponsored by PortSys
WEBCAST: Cyberattacks are becoming increasingly damaging, and the strategies in place are ineffective at mitigating these breaches. Join the CEO of PortSys in this webinar as he discusses why today’s security tactics fall short and how the zero-trust approach can help to better defend data.
Posted: 03 Jan 2020 | Premiered: Jan 3, 2020

PortSys

How to Build a Security Operations Center
sponsored by AT&T Cybersecurity
RESOURCE: Regardless of the size or industry of an organization, network monitoring and threat detection are key strategies for maintaining security. SOC teams are critical for meeting this goal, as they aggregate the resources needed for ensuring protection. Read on to uncover the key roles and responsibilities you need to support a SOC.
Posted: 02 Jan 2020 | Published: 02 Jan 2020

AT&T Cybersecurity

SIEM for Beginners
sponsored by AT&T Cybersecurity
RESOURCE: Security information and event management (SIEM) is all about observing your network through a wide lens and acting accordingly to mitigate risks and protect your organization. Read this beginner’s guide to help you understand the basics of SIEM and why it’s a critical step towards protecting your business.
Posted: 02 Jan 2020 | Published: 02 Jan 2020

AT&T Cybersecurity

SD-WAN and Office 365: What You Need to Know
sponsored by Apcela
WEBCAST: Regardless of what phase of Office 365 adoption you are in, the O365 Network Connectivity Principles always seems to rear its head when performance is not quite what you were expecting. In this webinar, take a look at some of those principles and how technologies like SD-WAN can help (or in some cases hurt) your performance objectives.
Posted: 27 Dec 2019 | Premiered: Dec 27, 2019

Apcela
26 - 50 of 1258 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info