IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
51 - 75 of 1073 Matches Previous Page  |  Next Page
SonicWall Secure SD-Branch
sponsored by SonicWall
DATA SHEET: Branch networks are quickly evolving. Secure SD-Branch can provide security, network segmentation and compliance for peace of mind on distributed networks. SonicWall Secure SD-Branch aims to simplify deployment, management and troubleshooting. Access this solution brief to explore potential benefits.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

SonicWall

Are Your Branch Sites an Open Door to Cyberattacks?
sponsored by SonicWall
WHITE PAPER: Traditional methods of deploying and maintaining security at branch sites have become ineffective, expensive and unmanageable. But an SD-Branch solution can form a cornerstone for boundless security in distributed enterprise environments. Jump into this white paper to see why the time for SD-Branch is now.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

SonicWall

Learning a New Approach to Teaching in the Education Sector
sponsored by Shure Inc
RESOURCE: Educators and students have been significantly impacted by the spread of COVID-19. While most classes are remote, hybrid learning models are also an option – either way the focus remains on providing students and teachers with a safe, socially-distant but effective curriculum. Read this article to learn more about these changes.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Shure Inc

2021 Top Sd-Wan Edge Trends
sponsored by Aruba Networks
EBOOK: SASE, IoT, 5G, AI – these are all important terms to know as they evolve in conjunction with network architecture. The real question is: How will SD-WAN and the edge play their role in enterprise embarkment on these new technologies? What will drive adoption, and why? Immerse yourself in this e-book to learn 8 SD-WAN edge trends.
Posted: 01 Feb 2021 | Published: 01 Feb 2021

Aruba Networks

Making Sense of Zero-Trust Security
sponsored by TechTarget
RESOURCE: As security professionals continue searching for methods of keeping out intruders, they make clear their thoughts about zero trust and how its philosophy can keep users safer. As it stands, 40% of professionals support zero trust for their organizations – do you? Take our survey to let us know, and receive a FREE zero-trust guide as a bonus.
Posted: 01 Feb 2021 | Published: 01 May 2021

TechTarget

Top Security Concerns for New Technology Deployments
sponsored by Thales
VIDEO: Thales releases an annual Data Threat Report, which compiles their research into the evolving landscape of cyberthreats, data security, and more. Watch this video for a 45-minute walkthrough of this year’s results, which include everything from zero trust, to mutlicloud environments, to quantum computing and everything in between.
Posted: 29 Jan 2021 | Premiered: 29 Jan 2021

Thales

SURFnet Selects Thales Luna HSMs to Secure DNSSEC Material
sponsored by Thales
CASE STUDY: As part of an organization-wide initiative to ensure DNS security and compliance, SURFnet partnered with Thales to address several challenges they were facing related to DNS. Read this case study to see why they chose Thales as their DNS security and compliance partner and learn more about the outcomes of this initiative.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Thales

The Forrester Wave: Security Analytics Platforms, Q4 2020
sponsored by Splunk
ANALYST REPORT: Security analytics are both emerging and evolving. Providers that offer customizability, map to the MITRE ATT&CK framework and have a vision for extended detection and response (XDR) give themselves an advantage. To learn more about security analytics providers and how they stack up, access The Forrester Wave: Security Analytics Platforms, Q4 2020.
Posted: 19 Jan 2021 | Published: 01 Dec 2020

Splunk

Top IT predictions in APAC: 2021
sponsored by ComputerWeekly.com
EGUIDE: Going by the predictions fleshed out by technology suppliers and analysts, the Asia-Pacific region will continue to be a cradle for technology innovation, whether it is 5G services, artificial intelligence (AI), cloud computing or cyber security. In this infographic, we review some of the key IT trends that are likely to shape the industry in 2021.
Posted: 14 Jan 2021 | Published: 15 Jan 2021

ComputerWeekly.com

A Computer Weekly Buyers Guide to 5G
sponsored by ComputerWeekly.com
EDITORIAL RESOURCE GUIDE: Despite the fears of many that rollouts of the next generation infrastructure would be delayed or just not be possible due mainly to the adverse economic conditions caused by Covid-19, the prospects are actually quite bright for the 5G industry in 2021.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

ComputerWeekly.com

MicroScope – January 2021: Looking forward to the future
sponsored by MicroScope
EZINE: In this issue of MicroScope, take a look at what the year ahead holds for the channel after a largely positive 2020. Also discover why IAM technology is so important for post-pandemic cloud computing, and what approaches are fundamental to finding business success
Posted: 05 Jan 2021 | Published: 08 Jan 2021

MicroScope

Blackberry Cyber Suite
sponsored by BlackBerry
PRODUCT OVERVIEW: In the era of remote work, balancing productivity while adhering to Zero Trust best practices has become difficult. What organizations need is a set of security controls that offer Zero Trust while maintaining a minimally invasive user experience. Read on to learn how BlackBerry is addressing these issues.
Posted: 29 Dec 2020 | Published: 29 Dec 2020

BlackBerry

Barracuda CloudGen Access
sponsored by Barracuda
DATA SHEET: Remote work is here to stay, and cloud migrations are accelerating. This level of risk means organizations must leverage secure access, verifying that only the right people with the right devices and the right permissions have access to company data, apps & infrastructure. In this data sheet, examine Barracuda’s CloudGen Access, a zero-trust tool.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

Barracuda

Barracuda CloudGen WAN for Azure
sponsored by Barracuda
DATA SHEET: Today’s organizations need fast, reliable network performance to provide an office-like user experience to their distributed workforces. Now, these organizations have the power to leverage secure, cloud-scalable SD-WAN deployed directly from Microsoft’s Azure Marketplace. Download this data sheet to learn about CloudGen WAN for Azure.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

Barracuda

5 steps to secure home devices & improve productivity for remote work
sponsored by Barracuda
WHITE PAPER: Due to the pandemic, remote work became an essential part of a modern enterprise. But for remote work and employees to thrive, they need fast and secure access to data. Read on to discover 5 steps organizations can take to further secure their remote workers, without sacrificing productivity.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

Is the SD-WAN home office here to stay?
sponsored by SearchNetworking.com
EGUIDE: While VPN strategies are adequate in many cases, they can't provide the extra level of control, security and management that some companies require for networks that now include home offices. As a result, some organizations have deployed SD-WAN to business-critical home offices. In this e-guide, learn more about SD-WAN home offices.
Posted: 15 Dec 2020 | Published: 15 Dec 2020

SearchNetworking.com

Computer Weekly – 15 December 2020: How security will be different after Covid-19
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
Posted: 14 Dec 2020 | Published: 15 Dec 2020

ComputerWeekly.com

2021 IT Priorities: APAC report
sponsored by ComputerWeekly.com
EGUIDE: Inside this report, get the complete analysis of the 2021 IT Priorities survey results, as well as insights into enterprises in the region that are accelerating their digital investments to not only survive but thrive in a post-pandemic world.
Posted: 09 Dec 2020 | Published: 10 Dec 2020

ComputerWeekly.com

8 Top Cybersecurity Challenges
sponsored by IronNet
EBOOK: Working with leading companies across various sectors, IronNet has identified the shared security pain points of organizations. By studying this e-book, you can learn 8 of the top cybersecurity challenges faced today, and, you can understand how network detection and response (NDR) can help to mitigate some of these challenges.
Posted: 09 Dec 2020 | Published: 09 Dec 2020

IronNet

What to include in an SD-WAN security checklist
sponsored by Silver Peak
EGUIDE: SD-WAN technology can improve WAN security in a variety of ways. Simply migrating to a viable SD-WAN offering brings some benefits. But SD-WAN tools also provide security features to protect the traffic they manage. In this e-guide, learn what you should include in your SD-WAN security checklist.
Posted: 09 Dec 2020 | Published: 07 Dec 2020

Silver Peak

3 Ways to Align Your SecOps & Business Priorities with Cisco Endpoint Security
sponsored by Cisco Secure
RESOURCE: Security operations leaders are constantly looking for ways to boost their security capabilities while also meeting business and operational objectives. This article highlights 3 ways organizations can meet both business and security goals with endpoint security from Cisco – read on to learn more.
Posted: 08 Dec 2020 | Published: 09 Nov 2020

Cisco Secure

SD-WAN: The Most Critical Design Considerations
sponsored by NBN
EGUIDE: Experts agree that SD-WAN is the most efficient way to direct network traffic throughout your WAN and lower costs, but you have to ensure you choose the option that meets your architecture, business and performance needs. Access this expert e-guide to delve into the most critical considerations for designing your SD-WAN architecture.
Posted: 18 Feb 2021 | Published: 10 Feb 2021

NBN

How to get actionable threat intelligence from tech tools
sponsored by SearchSecurity.com
EBOOK: Automated threat intel products and services can't produce actionable threat intelligence without essential ingredients, like threat hunters, analysts and administrators. This guide teaches cybersecurity pros how to how to pluck usable threat intelligence from a sea of data.
Posted: 08 Feb 2021 | Published: 08 Feb 2021

SearchSecurity.com

Network Performance Issues are IT Pain Point Amid COVID-19
sponsored by NetAlly
EGUIDE: Reliable home network performance is a top issue IT teams have dealt with amid the COVID-19 pandemic. With almost entire workforces working from disparate locations, remote networks are nearly impossible to monitor and manage. In this e-guide, learn how home network performance issues can relate to other IT problems.
Posted: 23 Dec 2020 | Published: 18 Dec 2020

NetAlly

Can a SASE architecture deliver better network performance?
sponsored by SearchNetworking.com
EGUIDE: Secure Access Service Edge (SASE) is a cloud-based platform that provides networking capabilities and security functionality directly to endpoints that connect to the platform. In this guide, explore how the limitations of traditional networking led the industry to SASE.
Posted: 15 Dec 2020 | Published: 15 Dec 2020

SearchNetworking.com
51 - 75 of 1073 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences