IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
51 - 75 of 1278 Matches Previous Page  |  Next Page
Symantec Web Security Service: Advanced Cloud-Delivered Network Security for the Cloud Generation
sponsored by Symantec
PRODUCT OVERVIEW: Today's enterprise-security reality: Devices, data, and applications are outside of your physical control—and all of it must be managed and secured. In this guide, learn about advanced security tools that can help you overcome the security challenges of the cloud generation.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Symantec

Are Your Communications At Risk?
sponsored by Verizon
WHITE PAPER: Unsecured mobile devices and apps that connect to your network can leave communications, passwords and other sensitive data open to theft. Find out how companies are fighting back by adopting cloud-based communications platforms with built-in end-to-end security.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Verizon

Versa FlexVNF: Software-Defined Wide Area Network Test Report
sponsored by Versa Networks
ANALYST REPORT: According to NSS Labs, 3 of the most common reasons why enterprises deploy SD-WAN are to implement technologies that promise to improve manageability, cost, performance and security. In this report, find out how Versa Networks FlexVNF performed when tested by NSS on specific use cases.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Versa Networks

6 Trends to Know for Better Business Communications
sponsored by Verizon
EBOOK: Communication is the backbone of every business. When you effectively communicate with customers and employees, everything else falls into place. In this ebook, discover the 6 trends you should know for better business communications.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Verizon

The Perimeter is Dead. Long Live the Perimeter
sponsored by Symantec
RESOURCE: The traditional network perimeter is vanishing and so is the security built into that perimeter. In order to stay secure in today's cloud generation workforce, organizations need a better way to extend their security controls while still supporting anytime and anywhere access. In this infographic, learn 5 tips for securing your network.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Symantec

Securing Cloud Transformation with a Zero Trust Approach
sponsored by Zscaler
WHITE PAPER: Cybersecurity wasn't designed for the cloud, and even though traditional network security solutions are being retrofitted for "cloud" usage, security is getting in the way of the adoption of zero trust strategies. In this white paper, learn why transforming to the cloud calls for zero trust network access (ZTNA) services.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Zscaler

The SIEM Buyer's Guide for 2020
sponsored by Splunk
WHITE PAPER: The importance of a SIEM solution in today's enterprise is magnified by the growing sophistication of attacks and the use of cloud services which only increases the attack surface. In this buyer's guide, learn everything you need to know about a SIEM including what it is, its evolution and how to determine if it is right for your organization.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

Splunk

Q2, 2019 Cyberthreats & Trends Report
sponsored by Neustar
ANALYST REPORT: While DDoS attacks have long been considered unsophisticated threats that are designed to block network pipes to the targets, these incursions have become much more strategic. In this report, learn how to defend against and prepare for these kinds of small sophisticated threats.
Posted: 19 Aug 2019 | Published: 12 Aug 2019

Neustar

How to Keep up with the Shifting Landscape of Password Attacks
sponsored by Zoho
WHITE PAPER: Hackers are evolving, and apart from implementing technology to help avoid cyberthreats, personal awareness plays a big role in defending against the mechanisms cybercriminals use to steal credentials. In this white paper, explore password theft methods used by hackers, and learn how simple tweaks can reduce the risk of a password compromise.
Posted: 15 Aug 2019 | Published: 15 Aug 2019

Zoho

Shortcomings of Traditional Security and Digital OT
sponsored by Fortinet, Inc.
WHITE PAPER: The rapid adoption of digital tools and services has caused internet-connected information technology (IT) networks to increasingly intersect with previously isolated operations technology (OT) networks. Find out what this means for your security posture in this white paper.
Posted: 15 Aug 2019 | Published: 15 Aug 2019

Fortinet, Inc.

Discover How to Overcome Network Complexity and Enable Digital Transformation
sponsored by Verizon
ANALYST REPORT: In this IDG QuickPulse white paper, discover how to overcome network complexity and enable digital transformation.
Posted: 15 Aug 2019 | Published: 15 Aug 2019

Verizon

Networks in Transition: How Leaders are Addressing Multifaceted Challenges
sponsored by Verizon
WHITE PAPER: Digital transformation efforts are skyrocketing – and these projects rely on a variety of resources across your IT networks. What's your network's threshold for handling these workloads? Take this whitepaper to figure out the top network deliverables you should prioritize when supporting digital transformation projects in 2019.
Posted: 15 Aug 2019 | Published: 15 Aug 2019

Verizon

Fortinet 2019 Operational Technology Security Trends Report
sponsored by Fortinet, Inc.
ANALYST REPORT: Fortinet's 2019 OT Security Trends Report analyzes data from FortiGuard Labs to glean insights about the state of security for supervisory control and data acquisition (SCADA) and other industrial control systems (ICS). Download the report to discover key findings.
Posted: 14 Aug 2019 | Published: 08 May 2019

Fortinet, Inc.

Penn State Smart Buildings 2.0
sponsored by Tempered Networks
RESOURCE: In this Penn State case study, find out how System Design Specialist Tom Walker and his team securely connected and isolated their building controls across 640 buildings in record time.
Posted: 14 Aug 2019 | Published: 17 Jul 2019

Tempered Networks

Fortinet SD-Branch Secures the Network Edge at the Branch
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, discover how Fortinet SD-Branch consolidates the network access layer within a secure platform that provides visibility and security to a network and all devices connected.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Fortinet, Inc.

Securing Industrial Control Systems With Fortinet
sponsored by Fortinet, Inc.
WHITE PAPER: In recent years, the industrial control systems (ICS) upon which much of our critical infrastructure and manufacturing industry depends, have come under increasingly frequent and sophisticated cyberattacks. In this white paper, learn how, in spite of these challenges, Fortinet's solutions can help to ensure the safety and reliability of ICS.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Fortinet, Inc.

Consolidating Networking and Security Functions Can Reduce Branch Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how a platform that consolidates networking and security capabilities can help network engineering and operations leaders simplify infrastructure while providing better security and productivity.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Fortinet, Inc.

State of Operational Technology and Cybersecurity Report
sponsored by Fortinet, Inc.
ANALYST REPORT: Recently, IT-based technologies have been integrated with operational technology networks to create new efficiencies and competitive advantages. However, this increases the digital attack surface and the risk of intrusion. In this research report, explore key findings from a survey of plant operations and manufacturing leaders.
Posted: 14 Aug 2019 | Published: 15 Mar 2019

Fortinet, Inc.

Smart Buildings 2.0 Cruise
sponsored by Tempered Networks
CASE STUDY: In this case study, discover how one of the world's largest cruise lines connected and secured its entire fleet's maritime systems quickly and easily without dry dock downtime and loss of revenue.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Tempered Networks

OT Network Security Starts with Visibility
sponsored by Fortinet, Inc.
WHITE PAPER: Operational technology (OT) and information technology (IT) have traditionally been kept separate in most cases, but now they are being integrated—which is causing a lot of problems for security. In this white paper, find out how you can protect your IT-OT environment while getting the visibility, control, and situational awareness you need.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Fortinet, Inc.

A Buying Guide for Next-Gen Remote Access
sponsored by Citrix
WHITE PAPER: In this e-book, discover Citrix Gateway, a next-generation SSL VPN, and the ways it helps enterprise IT better address remote access challenges.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Citrix

Zero Trust Access Video
sponsored by PortSys
VIDEO: Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.
Posted: 13 Aug 2019 | Premiered: 13 Aug 2019

PortSys

ZS Solves Office 365 Security Issue with PortSys TAC
sponsored by PortSys
CASE STUDY: ZS, a consulting and professional services firm, faced a challenge when making the transition to Microsoft Office 365. In order to solve their problem, ZS decided to implement PortSys' Zero Trust Access Management product, Total Access Control (TAC). In this case study, explore the benefits that ZS saw after implementing TAC.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

PortSys

How to Simplify Network Operations Complexity
sponsored by Fortinet, Inc.
WHITE PAPER: By rapidly adopting new digital technologies, network infrastructures have become increasingly complex and fragmented. To help mitigate this perfect storm of operational complexity, enterprises should embrace the greater simplicity of an integrated architecture. Find out how you can get started with that in this white paper.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Fortinet, Inc.

5 Steps to SDN Success with Vodafone Ready Network
sponsored by Vodafone
RESOURCE: In this infographic, discover the 5 steps on how to be successful with SDN and Vodafone Ready Network.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Vodafone
51 - 75 of 1278 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement