IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
51 - 75 of 1346 Matches Previous Page  |  Next Page
Iot Security For Healthcare
sponsored by Palo Alto Networks
DATA SHEET: Learn about an IoT Security service that allows you to prevent threats and control the risk of IoMT, IoT, and IT devices on your network across all sites.
Posted: 16 Mar 2021 | Published: 16 Mar 2021

Palo Alto Networks

SIG - How Maryland's leading healthcare provider has adopted a SASE approach to improve security and build patient trust with Cisco Umbrella
sponsored by Cisco Umbrella
CASE STUDY: Frederick Health needed a secure and efficient solution at the cloud edge that could provide granular controls for users no matter where they connect from. Frederick Health turned to Cisco to provide a SASE architecture and deployed DNS-layer security, secure web gateway and firewall functionality from Cisco Umbrella.
Posted: 16 Mar 2021 | Published: 16 Mar 2021

Cisco Umbrella

DNS - Top cybersecurity trends 2021: Pandemic-related content used for attack propagation
sponsored by Cisco Umbrella
WHITE PAPER: In the face of new and rising pandemic-related threats, it's more important than ever to ensure that all web traffic is inspected and protected, so people can get the information they need — without getting compromised. Find out how to keep your employees safe from these types of attacks in 2021.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

Cisco Umbrella

Better Together: Prisma Access And CloudGenix SD-WAN
sponsored by Palo Alto Networks
DATA SHEET: In this brief, learn how CloudGenix SD-WAN and Prisma Access have joined together to deliver hybrid applications to branch offices over any network while providing consistent, cloud-delivered security.
Posted: 11 Mar 2021 | Published: 11 Mar 2021

Palo Alto Networks

What is secure SD-WAN?
sponsored by Infovista
RESOURCE: As more and more organizations leverage cloud resources, network threats loom larger and larger. But secure SD-WAN lets you secure and control the extended edge, contracting your attack surface. And with web security gateways (WSGs) and firewalls, you’ve got a security 1-2 punch. Dive into this guide to discover secure SD-WAN & firewalls.
Posted: 11 Mar 2021 | Published: 11 Mar 2021

Infovista

The Optimal SASE Enabling Plaform
sponsored by Apcela
RESOURCE: Gartner predicts that by 2024, at least 40% of enterprises will have explicit strategies to adopt secure access service edge (SASE). What do you need to know about SASE and how it will influence your network architecture? Examine this 3-part guide, provided by Apcela, to see why SASE is the next step in the digital evolution.
Posted: 03 Mar 2021 | Published: 03 Mar 2021

Apcela

The Journey to SASE
sponsored by NetMotion
RESOURCE: Learn about the core concepts behind SASE, and the wider movements taking place to contextualize it. This report draws upon the latest research from Gartner, as well as original and previously unpublished data from an extensive January 2021 study on SASE.
Posted: 03 Mar 2021 | Published: 03 Mar 2021

NetMotion

SASE: A How-to Guide
sponsored by TechTarget
RESOURCE: Gartner defined a new cloud-based multifunction architecture service model called Secure Access Service Edge, or SASE, pronounced "sassy," in 2019. In our all new expert guide, SASE: A How-to Guide, learn everything you need to know about SASE. This guide is available for immediate download after participating in our brief survey.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

TechTarget

Making Sense of Zero-Trust Security
sponsored by TechTarget
RESOURCE: As security professionals continue searching for methods of keeping out intruders, they make clear their thoughts about zero trust and how its philosophy can keep users safer. As it stands, 40% of professionals support zero trust for their organizations – do you? Take our survey to let us know, and receive a FREE zero-trust guide as a bonus.
Posted: 01 Mar 2021 | Published: 01 May 2021

TechTarget

CCNA 200-301 Official Cert: Practice Exam
sponsored by Techtarget
RESOURCE: Achieving your Cisco Certified Network Associate, or CCNA, certification is no small feat. Luckily, searchNetworking is here to help you prepare! We're giving you access to our all new CCNA Practice Exam. Inside, discover 12 questions (and answers) that provide a realistic example of what you can expect on the exam.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

Techtarget

Market Guide for Network Detection and Response
sponsored by Gigamon
ANALYST REPORT: In this Gartner market guide, get key recommendations and market findings for evaluating your network detection and response (NDR) security requirements. Also learn how Gigamon ThreatINSIGHT™ fits into the rapidly growing security market.
Posted: 26 Feb 2021 | Published: 11 Jun 2020

Gigamon

MANAGED XDR - MANAGED DETECTION AND RESPONSE SERVICE
sponsored by Trend Micro
DATA SHEET: Today’s attacks are dangerous – monetizing intellectual property, encrypting essential data for ransom or damaging the flow of information in the case of nation state attacks. Managed extended detection and response (XDR) can provide 24/7 protection from these attacks. View this Trend Micro data sheet to see the full security layer.
Posted: 26 Feb 2021 | Published: 26 Feb 2021

Trend Micro

Sase A Changing World Calls For A Different Kind Of Network
sponsored by VMware
WHITE PAPER: When it comes to digitization, legacy networks are simply not up to the task. The connections of these hub-and-spoke legacy networks are fixed, and the transit of data is limited due to lack of flexibility. Today, SASE’s cloud-based architecture can support networking and security needs. Access this ZK Research white paper to see how SASE works.
Posted: 26 Feb 2021 | Published: 26 Feb 2021

VMware

Sase & Ztna
sponsored by VMware
EBOOK: Already, SASE is playing a big role in conversations about how to improve remote security and increase network efficiency. Now, zero-trust network access (ZTNA) can provide a user’s contextual identity to all the different SASE security services, making for a smarter, more secure edge. Download SASE & ZTNA For Dummies to learn more.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

VMware

Partnering To Deliver An Automated Secure Access Service Edge
sponsored by Aruba Networks
DATA SHEET: Cloud migration is changing traffic patterns and driving the need to transform WAN and security architectures. SASE is changing how companies build their networks, and when combined with SD-WAN, applications perform highly and threats are averted. Access this data sheet to learn about Silver Peak’s Unity EdgeConnect SD-WAN with automated SASE.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

Aruba Networks

Unity Orchestrator Global Enterprise
sponsored by Aruba Networks
WHITE PAPER: If your organization has multiple large-scale SD-WAN deployments, it can be difficult to get visibility into them and, moreover, orchestrate them. Professionals with Silver Peak Unity EdgeConnet SD-WAN fabrics in their stack should read this white paper. It details how you can centrally manage and monitor these SD-WAN deployments.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

Aruba Networks

Secure Sd-Wan For The Cloud-First Enterprise Without Compromise
sponsored by Aruba Networks
WHITE PAPER: As enterprises move to the cloud, security challenges multiply. Examine this white paper to learn how Zscaler and Silver Peak are combining their respective Cloud Security and Unity EdgeConnect SD-WAN platforms to address these challenges. And, see how they’re collaborating to deliver security orchestration for consistent security policies.
Posted: 25 Feb 2021 | Published: 31 May 2019

Aruba Networks

Making It Safe for Federal Employees to Work Remotely
sponsored by Forcepoint
EBOOK: The Office of Management and Budget (OMB) released guidance recommending agencies implement ‘maximum’ telework flexibility where possible. While you may have some security in place to accommodate this sudden shift, it’s tough to be fully prepared. Study this e-book to learn tips for securing federal remote workers.
Posted: 22 Feb 2021 | Published: 14 May 2020

Forcepoint

SonicWall Secure SD-Branch
sponsored by SonicWall
DATA SHEET: Branch networks are quickly evolving. Secure SD-Branch can provide security, network segmentation and compliance for peace of mind on distributed networks. SonicWall Secure SD-Branch aims to simplify deployment, management and troubleshooting. Access this solution brief to explore potential benefits.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

SonicWall

SD-WAN: The Most Critical Design Considerations
sponsored by Business nbn
EGUIDE: Experts agree that SD-WAN is the most efficient way to direct network traffic throughout your WAN and lower costs, but you have to ensure you choose the option that meets your architecture, business and performance needs. Access this expert e-guide to delve into the most critical considerations for designing your SD-WAN architecture.
Posted: 18 Feb 2021 | Published: 10 Feb 2021

Business nbn

Are Your Branch Sites an Open Door to Cyberattacks?
sponsored by SonicWall
WHITE PAPER: Traditional methods of deploying and maintaining security at branch sites have become ineffective, expensive and unmanageable. But an SD-Branch solution can form a cornerstone for boundless security in distributed enterprise environments. Jump into this white paper to see why the time for SD-Branch is now.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

SonicWall

Vitens Moves To Cloud Security With Bloxone™ Threat Defense From Infoblox
sponsored by Infoblox
CASE STUDY: Vitens is the largest drinking water utility in The Netherlands, delivering water to 5.6 million people. In an effort to strengthen security, Vitens set out to improve visibility into their network infrastructure and endpoints. Download this case study to see how Infoblox’s BloxOne Threat Defense gave Vitens oversight they needed to succeed.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Infoblox

Securing Remote Workers In The Age Of Teleworking
sponsored by Infoblox
WHITE PAPER: Remote workers are seeking access to enterprise resources from a variety of endpoints, both work-provided and personal, as well as various mobile devices. But many of the cybersecurity procedures designed for enterprise facilities won’t work from remote locations. Explore this detailed guide to learn how to secure remote workers intelligently.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Infoblox

Infoblox Video 3
sponsored by Infoblox
WEBCAST: DDI is the shorthand of DNS, DHCP (Dynamic Host Configuration Protocol) and IPAM (IP Address Management). As enterprise networks expand at the edge and apps move to the cloud, it’s becoming clear that these 3 core network services should be cloud-managed as well. Engage this webcast to get a crash course on BloxOne DDI.
Posted: 16 Feb 2021 | Premiered: Feb 16, 2021

Infoblox

Can a zero-trust approach fill the security perimeter void?
sponsored by SearchSecurity.com
EBOOK: Zero-trust security means more than trusting nothing and no one. It's the best way devised yet to fill the void that the disappearance of the enterprise perimeter left. Learn what steps security pros need to take to implement an effective, zero-trust approach to IT security.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

SearchSecurity.com
51 - 75 of 1346 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences