IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
51 - 75 of 1265 Matches Previous Page  |  Next Page
Beginners Guide to Open Source Intrusion Detection Tools
sponsored by AT&T Cybersecurity
RESOURCE: Intrusion detection systems (IDS) are a set of technologies that enable IT teams network visibility in order to identify and prevent suspicious activity from becoming a breach. Read this beginner’s guide to explore various IDS detection techniques to help you get started with network visibility and security.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

AT&T Cybersecurity

Westcon-Comstor Boosts Application Performance with Unity EdgeConnect
sponsored by Silver Peak
CASE STUDY: Westcon-Comstor needed to build greater assurance of WAN availability and improve performance for critical applications like SAP ERP, VoIP, and Office 365 while reducing dependence on costly MPLS. In this case study, learn how Westcon-Comstor was able to accomplish this by deploying the Silver Peak EdgeConnect SD-WAN edge platform.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

Silver Peak

ZS Solves Office 365 Security Issue with PortSys TAC
sponsored by PortSys
CASE STUDY: The threat of a data breach can damage an organization’s reputation with both customers and vendors. When ZS made the decision to implement Office 365, they needed enhanced security to cover data encryption and endpoint management. Read this case study to follow ZS’s journey towards a holistic data loss prevention strategy.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

PortSys

SIEM Tools, Future Tech and How to Prepare for What's Ahead
sponsored by SearchSecurity.com
EBOOK: While security tech is evolving, so are the threats. Current IT staffs are feeling overwhelmed and some experts believe AI is the answer. Gartner, however, claims that AI will never be perfect, and SIEM will always need a human touch. In this e-book, look at current SIEM tools, future tech and how to prepare for what’s ahead.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

SearchSecurity.com

What to Look for in a Zero Trust Solution in 2020
sponsored by PortSys
RESOURCE: With massive breaches regularly making headlines, it’s clear that traditional security is ineffective at mitigating today’s evolving attacks. The zero-trust approach to access control enables organizations to mitigate risk in the cloud era, taking belief out of the equation and substituting it with assurance. Read on to learn more.
Posted: 03 Jan 2020 | Published: 03 Jan 2020

PortSys

Zero Trust Access
sponsored by PortSys
WEBCAST: Cyberattacks are becoming increasingly damaging, and the strategies in place are ineffective at mitigating these breaches. Join the CEO of PortSys in this webinar as he discusses why today’s security tactics fall short and how the zero-trust approach can help to better defend data.
Posted: 03 Jan 2020 | Premiered: Jan 3, 2020

PortSys

How to Build a Security Operations Center
sponsored by AT&T Cybersecurity
RESOURCE: Regardless of the size or industry of an organization, network monitoring and threat detection are key strategies for maintaining security. SOC teams are critical for meeting this goal, as they aggregate the resources needed for ensuring protection. Read on to uncover the key roles and responsibilities you need to support a SOC.
Posted: 02 Jan 2020 | Published: 02 Jan 2020

AT&T Cybersecurity

SIEM for Beginners
sponsored by AT&T Cybersecurity
RESOURCE: Security information and event management (SIEM) is all about observing your network through a wide lens and acting accordingly to mitigate risks and protect your organization. Read this beginner’s guide to help you understand the basics of SIEM and why it’s a critical step towards protecting your business.
Posted: 02 Jan 2020 | Published: 02 Jan 2020

AT&T Cybersecurity

SD-WAN and Office 365: What You Need to Know
sponsored by Apcela
WEBCAST: Regardless of what phase of Office 365 adoption you are in, the O365 Network Connectivity Principles always seems to rear its head when performance is not quite what you were expecting. In this webinar, take a look at some of those principles and how technologies like SD-WAN can help (or in some cases hurt) your performance objectives.
Posted: 27 Dec 2019 | Premiered: Dec 27, 2019

Apcela

Beyond SD-WAN: Zero Trust Security and the Internet as Corporate WAN
sponsored by Akamai Technologies
WHITE PAPER: Read this white paper to learn why Internet is the corporate WAN of the near future, and how enabling safe traffic to go straight to the Internet, blocking bad traffic, and only proxying risky traffic, delivers simplified security, lower latency and better performance, fewer broken web pages and applications.
Posted: 27 Dec 2019 | Published: 30 Jun 2019

Akamai Technologies

Digital Identity Security Assurance: How to Keep Your Customer Data Secure
sponsored by Akamai Technologies
WHITE PAPER: Customer identities are among the most critical and valuable assets of any organization. Failing to provide adequate security can result in financial, reputational, and even legal consequences. This paper highlights industry best practices for building customer trust through comprehensive security programs. Read on to learn more.
Posted: 23 Dec 2019 | Published: 30 Nov 2019

Akamai Technologies

Intelligent Security Starts at the Edge
sponsored by Akamai Technologies
DATA SHEET: In Gartner’s most recent Magic Quadrant installment for Web Application Firewalls (WAF), they named Akamai a Leader for the third year in a row. This white paper provides an overview of the benefits of WAF, and highlights Akamai’s approach to WAF. Read on to get started.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Akamai Technologies

The Network Firewall Market
sponsored by Checkpoint Software Technologies
ANALYST REPORT: With firewall providers embedding multiple security features in firewalls and enabling integration and automation capabilities with other security products, firewalls are evolving into network security platforms. In this Gartner Magic Quadrant, explore an evaluation of network firewall vendors.
Posted: 23 Dec 2019 | Published: 17 Sep 2019

Checkpoint Software Technologies

What is SD-WAN?
sponsored by Silver Peak
VIDEO: Traffic patterns have changed over the years with the increased movement of apps to the cloud. This has driven the need for a more intelligent software-driven or software-defined model for the WAN. In this video, Derek Granath, Vice President of Product Marketing for Silver Peak, defines what a SD-WAN is.
Posted: 23 Dec 2019 | Premiered: 17 Jun 2019

Silver Peak

The Future of Security Operations
sponsored by IBM
RESOURCE: As technology changes and attack surfaces grow, security teams are forced to think differently. Leverage this resource to learn about the future of security operations and how your team can more effectively operationalize world-class security practices.
Posted: 19 Dec 2019 | Published: 19 Dec 2019

IBM

The Fastest, Easiest Way to Secure Your Network
sponsored by Cisco Umbrella
WHITE PAPER: A DNS-layer solution can quickly identify malicious domains even before those domains and IPs are used to launch any type of attack. Read on to learn about Cisco Umbrella today.
Posted: 17 Dec 2019 | Published: 17 Dec 2019

Cisco Umbrella

Report: SD-WAN Vendor Market 2019
sponsored by VeloCloud, now part of VMware
ANALYST REPORT: The SD-WAN market is in the early growth stage of the product lifecycle. Key factors driving market adoption include: cost savings from efficient usage of private and public networks, ability to optimize hybrid cloud/multi-cloud connectivity, and application-aware routing. Read the Frost and Sullivan analyst report to get the full details.
Posted: 17 Dec 2019 | Published: 17 Dec 2019

VeloCloud, now part of VMware

The Future of Network Security is in the Cloud
sponsored by Cisco Umbrella
ANALYST REPORT: Find out how Gartner defines the Secure Access Service Edge (SASE), and what steps they recommend for security and risk management leaders to manage change in their organizations. In this new report, you'll receive recommendations on how to adopt integrated cloud-delivered security services that are simple, scalable, and flexible.
Posted: 17 Dec 2019 | Published: 30 Aug 2019

Cisco Umbrella

The Evolution of SD-WAN as a Platform
sponsored by VeloCloud, now part of VMware
WEBCAST: SD-WAN has emerged as the enabler of WAN transformation. It has quickly evolved in a few short years from a connectivity infrastructure to a services platform. In this webcast, Steve Woo, senior director of product and co-founder of VeloCloud, shares his insights about the vision and evolution of SD-WAN as a platform.
Posted: 17 Dec 2019 | Premiered: Jun 5, 2019

VeloCloud, now part of VMware

A Computer Weekly buyer's guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

ComputerWeekly.com

Connected Car Security
sponsored by Intertrust
WHITE PAPER: As connected cars grow in popularity due to their convenience, it’s important to note that the increasing number of smart features built into cars opens the network to serious vulnerabilities and threats. This white paper highlights the threats facing connected cars by examining common cyberattack patterns and how to protect against them.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

Intertrust

What to Look for in a Zero Trust Solution in 2020
sponsored by PortSys
WHITE PAPER: The zero-trust approach to access control isn’t a new concept. In fact, it’s been around for nearly 10 years. Although the concept is simple, organizations struggle to understand the most effective ways to implement it. This white paper explores the concept behind zero-trust, why it’s effective, and the primary ways it can be implemented.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

PortSys

What Has 2019 Meant for Wi-Fi and Cellular Networks?
sponsored by 7SIGNAL
WHITE PAPER: Wi-Fi accessibility and services continue to boom as more people around the world are connected to the internet than ever before. Each year brings a new array of advances, issues and trends, and 2019 was no exception. In this white paper, look back at what happened in the world of cellular connectivity and Wi-Fi in 2019.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

7SIGNAL

2019 Mid-Year Global Overview of Live OTT Sports
sponsored by Intertrust
ANALYST REPORT: Until recently, live sports has been a major force in keeping many subscribers tethered to their pay-TV subscription. However, with recent improvements in live streaming technology, sports fans are moving from traditional to online viewing at a steady pace. In this report, learn how OTT sports are evolving around the world.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

Intertrust

Reverse Engineering Still a Serious Problem in 2019
sponsored by Intertrust
WEBCAST: While mobile applications and interconnected devices offer unmatched convenience, they also expose organizations and consumers to cybersecurity risks. This webinar breaks down common mobile application security threats and highlights real-life reverse engineering examples.
Posted: 12 Dec 2019 | Premiered: Nov 8, 2019

Intertrust
51 - 75 of 1265 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info