IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
51 - 75 of 1530 Matches Previous Page  |  Next Page
Secure Access for the Small Business Owner
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains how Fortinet gives IT organizations a choice of WLAN offerings that provide seamless mobility within a single facility or between multiple sites to ensure business-critical apps maintain performance and reliability without impacting security.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Fortinet, Inc.

Secure SD-WAN: Integrated NGFW Security with WAN Transformation
sponsored by Fortinet, Inc.
WHITE PAPER: Access this white paper to unlock how to secure your SD-WAN network infrastructure with NGFW security.
Posted: 05 Feb 2018 | Published: 05 Feb 2018

Fortinet, Inc.

Secure Access: Balancing Flexible Network Access with Enterprise-Class Security
sponsored by Fortinet, Inc.
WHITE PAPER: Read this white paper to find 3 products specifically designed to solve the problem of network access security in the mobile age, and decide for yourself which is the right choice for your business.
Posted: 05 Feb 2018 | Published: 05 Feb 2018

Fortinet, Inc.

Tomorrow's Security is Here
sponsored by Skybox Security
RESOURCE: Oftentimes, security leaders struggle to gain visibility over attack surfaces and manage its complexity. This resource offers insight into improving the efficiency and performance of security operations.
Posted: 05 Feb 2018 | Published: 05 Feb 2018

Skybox Security

Secure, Cost-effective, unified Access for the Distributed Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: Access this white paper to gain valuable insights into combining centralized configuration with reporting, event logging and analysis to create a comprehensive, real-time network monitoring and control center.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Fortinet, Inc.

The Urgent Concerns Facing Customers with SSL Certificates
sponsored by Entrust, Inc.
WHITE PAPER: How much security is your SSL providing? This Frost & Sullivan paper offers strategies for dealing with disruptions of SSL certificates. In addition, uncover questions to consider during your risk management planning.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Entrust, Inc.

How to Use Micro-Segmentation to Secure Your Organization
sponsored by Illumio
WHITE PAPER: Protecting the network perimeter is not enough. Organizations looking to secure the interior of their environments often need to be more dynamic and granular than network segmentation will allow. This resource reveals how micro-segmentation can secure environments by reducing attack surfaces, hardening data centers, and enabling cloud security.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Illumio

Identify and Respond to Security Threats Faster
sponsored by ServiceNow
WHITE PAPER: The key to reducing incident detection and response times lies in automating basic tasks, such as intelligence gathering. This resource offers strategies for improving incident detection and response through a streamlined process of workflows, routing, and communication tools.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

ServiceNow

The Definitive Guide to Micro-Segmentation
sponsored by Illumio
EBOOK: The more an organization is connected to the internet, the more vulnerable it becomes. This 80-page e-book will guide you in understanding and implementing micro-segmentation. In addition, learn about how it can make your organization more secure and agile.
Posted: 31 Jan 2018 | Published: 31 Jan 2018

Illumio

Sharing Threat Intelligence to Curb Targeted Attacks
sponsored by ServiceNow
RESOURCE: In this resource, learn how a Trusted Security Circle allows security teams to anonymously share observable data with industry peers, members of their supply chain or a global circle.
Posted: 30 Jan 2018 | Published: 30 Jan 2018

ServiceNow

Endpoint Protection & Device Management
sponsored by Seqrite
EGUIDE: The endpoint security market is expected to surge to a $27 billion valuation by 2024, according to Grand View Research Inc. Inside, experts David Geer and Jack Gold dive into endpoint security head-first and reveal the latest protection strategies against exploits on devices.
Posted: 30 Jan 2018 | Published: 24 Jan 2018

Seqrite

Ransomware Protection: Five Best Practices
sponsored by Absolute
ANALYST REPORT: Security and risk professionals need to develop and implement the proper controls to slow and prevent the ransomware spread. In this Forrester Research Report, reveal the 5 best practices for ransomware protection.
Posted: 30 Jan 2018 | Published: 27 Jul 2017

Absolute

4 Essential Strategies for Endpoint Security and Protection
sponsored by Absolute
WHITE PAPER: Endpoint devices are the single largest group of devices inside your network today. Disruption of endpoints can have a serious impact on your day to day business operations. This resource offers 4 essential strategies to improve your endpoint security and protection.
Posted: 30 Jan 2018 | Published: 30 Jan 2018

Absolute

The Cost of Insecure Endpoints
sponsored by Absolute
ANALYST REPORT: According to the Ponemon Institute, just one failed endpoint can cost an organization an average of $612. Explore this Ponemon Institute report to gain insight into insecure endpoints and the excessive costs companies are spending after their endpoints are compromised.
Posted: 29 Jan 2018 | Published: 29 Jan 2018

Absolute

Ransomware 101: 3 Keys Ways to Get Started Combating Ransomware
sponsored by Splunk
WHITE PAPER: Ransomware was recently declared the number 2 most dangerous online threat to consumers and organizations, according to Europol. This white paper offers insight into complex, growing ransomware attacks and reveals 3 tangible steps to combatting ransomware within your organization.
Posted: 29 Jan 2018 | Published: 29 Jan 2018

Splunk

Maintaining Business Continuity & Security for Your Organization
sponsored by Citrix
WHITE PAPER: Whether planned or unplanned, business disruptions that aren't managed effectively come at a high cost. This white paper offers strategies for keeping your company productive during unplanned security incidents.
Posted: 29 Jan 2018 | Published: 29 Jan 2018

Citrix

Ransomware Defense for Dummies
sponsored by Cisco Umbrella
EBOOK: Based on statistics from Cisco's Talos threat intelligence group, on average, 2.9% of compromised victims in a ransomware attack will pay the ransom. Inside this for Dummies e-book, learn everything you need to know about ransomware attacks as well as best practices to reduce ransomware risks.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Cisco Umbrella

4 Easy Ways Central Logging Improves Security Posture
sponsored by Splunk
WHITE PAPER: Reliable central logging or log management is the first critical step toward gaining visibility across a multi-layered security environment. This resource reveals how to gain immediate visibility into critical security incidents with 4 basic sources that security teams can leverage along with central logging.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Splunk

Automating GDPR Compliance for Network Monitoring and Security Infrastructure
sponsored by Big Switch Networks
WHITE PAPER: Is your network ready for May 25, 2018? Access this white paper to gain valuable insights into how to leverage Big Monitoring Fabric to reveal the benefits of network visibility for all monitoring and security tools, while simplifying and automating regulatory GDPR compliance.
Posted: 25 Jan 2018 | Published: 25 Jan 2018

Big Switch Networks

The Cybersecurity Blueprint
sponsored by Solarwinds MSP
WHITE PAPER: As cybersecurity attacks grow in variety, taking a broad layer approach with clients is crucial. Explore this resource to uncover the 4 pillars of a comprehensive, layered security approach and learn how to provide strong layered security.
Posted: 25 Jan 2018 | Published: 31 Dec 2017

Solarwinds MSP

Cybersecurity in Business Operations
sponsored by Virginia Tech Online
WHITE PAPER: Recent security breaches have made clear the fact that guarding the infrastructure is not only the responsibility of the IT desk. All users, from entry-level personnel to the C-suite, must help protect the integrity of their data assets.
Posted: 24 Jan 2018 | Published: 24 Jan 2018

Virginia Tech Online

The 3 Keys to Effective Vendor Risk Management
sponsored by BitSight
WHITE PAPER: Lax cybersecurity practices on the part of one vendor could endanger all companies within an ecosystem. Access this resource to learn how you can stay ahead of cybersecurity threats posed by vendors.
Posted: 24 Jan 2018 | Published: 24 Jan 2018

BitSight

Assumption of Breach: A New Approach to Cyber Security
sponsored by Carousel Industries
WHITE PAPER: According to an RSA Survey, 75% of companies have significant cybersecurity risk exposure. This white paper reveals how a layered approach to cybersecurity can help with turning 3 key elements—people, processes and technology—from security vulnerabilities to strengths.
Posted: 24 Jan 2018 | Published: 24 Jan 2018

Carousel Industries

How to Protect your Next-gen Extranet with a Software-defined Security Fabric
sponsored by Big Switch Networks
CASE STUDY: Fortune 20 Energy and Petroleum Company wanted to update its current extranet to better integrate new cybersecurity technologies and provide more monitoring capabilities, with a flexible network design. This case study explores how they leveraged a next-generation software-defined security fabric to do so.
Posted: 24 Jan 2018 | Published: 24 Jan 2018

Big Switch Networks

How to Successfully Move your UCC Strategy to the Cloud
sponsored by Cisco
EGUIDE: This e-guide explores unified communication and collaboration (UCC) challenges IT networking pros need to overcome, as well as how to craft cloud UC strategies to aid in overcoming these challenges.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Cisco
51 - 75 of 1530 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement