IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
51 - 75 of 1193 Matches Previous Page  |  Next Page
Do You See What DDI Sees?
sponsored by Infoblox
RESOURCE: How well you defend yourself can depend on how well your security teams can see events as they occur across your network. Unfortunately, some products lack visibility into some areas of your network. In this report, learn about DDI and how it can provide the essential data security teams need to remediate attacks faster and more efficiently.
Posted: 01 May 2019 | Published: 01 May 2019

Infoblox

More Is Not More: Busting the Myth That More Threat Intel Feeds Lead to Better Security
sponsored by ThreatConnect
WHITE PAPER: It's a common misconception that a large quantity of threat intelligence feeds leads to more effective security. However, instead of adding more threat intel feeds, you should incorporate the feeds that provide the most value to your security. This white paper will help you decide which threat intel feeds are relevant to your organization.
Posted: 01 May 2019 | Published: 01 May 2019

ThreatConnect

2018 Threat Report
sponsored by CenturyLink
WHITE PAPER: As cyberthreats proliferate, organizations often seek to find the silver bullet for cybersecurity issues. With so many differing viewpoints of the threat landscape, identifying actionable intelligence is difficult. In this threat report, explore key insights on what the CenturyLink Threat Research Labs sees across the CenturyLink global backbone.
Posted: 01 May 2019 | Published: 01 May 2019

CenturyLink

How 1 Company Unified Security Management for Wired and Wireless Networks
sponsored by Aruba Networks
CASE STUDY: Daman is a leading specialist health insurer in Abu Dhabi, and was looking for a Network Access Control (NAC) solution to help them comply with a new electronic governmental standard for information security. Learn why Daman chose Aruba and the benefits they've experienced in this case study.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Aruba Networks

Security at the Speed of DevOps
sponsored by Cyxtera
WEBCAST: What if there was a way to connect DevOps workloads without the need for manual intervention—ultimately simplifying security infrastructure? Find out how you can do that with Cyxtera's software-defined perimeter (SDP) in this webinar.
Posted: 30 Apr 2019 | Premiered: Apr 30, 2019

Cyxtera

Case Study: New York Cruise Lines & Armor Cloud Security
sponsored by Armor
CASE STUDY: The New York Cruise Lines wanted to ensure they provided guests with online resources. However, with every new web-facing resource, there's an increased risk of a data breach. In this case study, learn how the New York Cruise Lines were able to secure their hybrid cloud infrastructure by implementing Armor's managed security provider.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Armor

How to Remove Complexity as a Threat to Security
sponsored by Cyxtera
WEBCAST: Watch this webinar to learn about reducing complexity when securing hybrid workloads.
Posted: 30 Apr 2019 | Premiered: Apr 30, 2019

Cyxtera

Aruba Delivers LAN & Wi-Fi Performance, Security, and Reliability at CASDEN Banque Populaire's New HQ
sponsored by Aruba Networks
CASE STUDY: In this case study, find out how the CASDEN Banque Populaire met the networking demands of a new, highly virtualized working environment as they transitioned to a new headquarters, designed with high-performing connectivity, mobility, and security in mind.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Aruba Networks

Keeping Your Network Safe with a Software-Defined Perimeter
sponsored by Cyxtera
WHITE PAPER: Download this white paper to learn about software-defined perimeters and the vital capabilities they should have. Also, explore Cyxtera's SDP and how it can help keep your organization safe 24/7.
Posted: 26 Apr 2019 | Published: 26 Apr 2019

Cyxtera

ADNEC Delivers UAE's Fastest Wi-Fi at Abu Dhabi National Exhibition Centre with Aruba
sponsored by Aruba Networks
CASE STUDY: In this case study, find out how the Abu Dhabi Nation Exhibition Company (ADNEC) modernized their legacy Wi-Fi infrastructure with 802.11ac indoor and outdoor access point technology, featuring strong network visibility, management, and security.
Posted: 26 Apr 2019 | Published: 26 Apr 2019

Aruba Networks

Infographic: 2019 Europe IT Priorities - Security
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we take a look at which elements of IT security are being improved by enterprises across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.
Posted: 23 Apr 2019 | Published: 23 Apr 2019

ComputerWeekly.com

Why IT Leaders Should Consider the Software Defined Perimeter
sponsored by Zscaler
WHITE PAPER: See why enterprises are moving away from the traditional DMZ network security method and are using services born in the cloud, to secure the cloud. Propelling their careers, and their organization forward in the process.
Posted: 23 Apr 2019 | Published: 23 Apr 2019

Zscaler

Juniper Connected Security: Dynamic, Adaptive Multi-cloud Security
sponsored by Juniper Networks
WHITE PAPER: Download this white paper to learn about Juniper Networks' Connected Security framework—which uses dynamic access groups and a unified and intuitive metadata-based policy model that can be ported across clouds—to give security admins complete command and control over their multi-cloud deployments.
Posted: 19 Apr 2019 | Published: 19 Apr 2019

Juniper Networks

Advanced Threat Prevention Appliance
sponsored by Juniper Networks
WHITE PAPER: Organizations worldwide face security and productivity challenges every day. Additionally, security teams often fail to recognize and act on critical incidents. In this white paper, learn how the Juniper Networks Advanced Threat Prevention Appliance can protect organizations from cyberattacks.
Posted: 17 Apr 2019 | Published: 31 Oct 2018

Juniper Networks

Worldwide DDoS Prevention Solutions 2019 Vendor Assessment
sponsored by Neustar
RESEARCH CONTENT: Distributed denial-of-service (DDoS) attacks are increasingly complex, and they frequently employ multiple attack types and strategies. In this IDC MarketScape report, IDC compared 10 organizations that offer DDoS protection products and services. Read on to see which one is right for your organization today.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Neustar

Simplify And Automate Data Protection For VMware
sponsored by Dell EMC
WHITE PAPER: The increasing reliance on virtual machines is bringing challenges for data protection, as businesses find themselves utilizing public and private clouds while at the same time moving toward their own software-defined data centers. This white paper outlines a strategy for applying automation and orchestration to automatically protect workloads.
Posted: 11 Apr 2019 | Published: 11 Apr 2019

Dell EMC

The Convergence Of Physical And Logical Access: What It Really Means For An Organization's Security
sponsored by HID Global
WHITE PAPER: For many security professionals, recent high-profile data breaches have shifted attention to external cyberthreats. In this white paper, learn how by addressing both physical and logical access in a more unified approach, organizations can reduce their risk for a costly breach while also improving user experience and operational efficiency.
Posted: 10 Apr 2019 | Published: 10 Apr 2019

HID Global

Case Study: Columbia County Sheriff
sponsored by HID Global
CASE STUDY: The Columbia County Sheriff's Office has evolved its approach to protecting information by verifying the identities of everyone who accesses the network or the agency's computers. In this case study, learn how they turned to HID Global to help them comply with the FBI's security policy, increase overall security and improve user experience.
Posted: 10 Apr 2019 | Published: 19 Jan 2018

HID Global

Cloud-Managed Network Access Control (NAC) for Dummies
sponsored by Aerohive Networks
WHITE PAPER: Read Cloud-Managed Network Access Control (NAC) for Dummies to learn about the key aspects of NAC within enterprise IT networks, and how they can help you secures all devices on the network — wireless and wired — including corporate, BYOD, guest, and IoT devices.
Posted: 10 Apr 2019 | Published: 10 Apr 2019

Aerohive Networks

The Vulnerable Network: How Enhanced Network Access Control Can Help
sponsored by Aerohive Networks
WEBCAST: In this webinar, learn about Secure Access Management (SAM) and how it can help IT organizations address the core issues of device visibility, control and security that are the root cause of most risks and vulnerabilities on the network.
Posted: 10 Apr 2019 | Premiered: Apr 10, 2019

Aerohive Networks

Enhanced Network Access Control: The Holistic Approach to Network Security
sponsored by Aerohive Networks
WHITE PAPER: Although traditional security systems can protect the network perimeter, they often struggle to properly secure devices and vulnerabilities on the network. That's where Enhanced Network Access Control (ENAC) can help. Learn about ENAC and how using it can help strengthen your network security strategy.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Aerohive Networks

Security Information and Event Management (SIEM) Solutions
sponsored by Rapid7
WHITE PAPER: As the security landscape has evolved, SIEMs have evolved as well. However, many organizations struggle to deploy a new SIEM, achieve rapid success, and deliver a return on investment. In this white paper, learn how to evaluate SIEM platforms. Also, discover the top 3 capabilities every SIEM should provide.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Rapid7

The Truths and Lies of IoT Security: Monitoring Connected Devices
sponsored by MASERGY
WHITE PAPER: As the Internet of Things (IoT) accelerates the pace of the enterprise with data-driven decision making, CEOs, CIOs, and CISOs are making the dash for the IoT playing field. But how do they get in the game while not jeopardizing security? In this white paper, learn about key security considerations for IoT.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

MASERGY

IoT Readiness: 5 Network and Security Necessities
sponsored by MASERGY
WHITE PAPER: In this white paper, learn about the 5 networking and security features that can help ensure your infrastructure is ready for IoT.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

MASERGY

Quarterly Threat Report Q4
sponsored by Rapid7
RESEARCH CONTENT: This issue of the Rapid7 Quarterly Threat Report takes a deep dive into the threat landscape for 2018 Q4 and looks more broadly at 2018 as a whole. The report provides an assessment of threat events by organization size and industry, and examines threat incident patterns. Download the report to explore highlights from the 2018 Q4 report.
Posted: 08 Apr 2019 | Published: 26 Feb 2019

Rapid7
51 - 75 of 1193 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement