IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
51 - 75 of 1440 Matches Previous Page  |  Next Page
The Definitive Guide to Secure Collaborative Tools
sponsored by Armorblox
WHITE PAPER: Secure collaboration has become necessary in a world in which both remote work and security threats are increasing. In 2019, the FBI reported that $26 billion had been lost to business email compromise in the last three years. Explore this white paper for valuable information to how keep your office environment protected.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Armorblox

Businesses at Work (from Home) 2020 Edition
sponsored by Okta
ANALYST REPORT: Organization around the world have reacted to the pandemic quickly, rolling out remote communication apps, extending VPNs, and adding MFA to ensure the productivity, connectivity, and security of their (now) remote workforces. In this report, 2020 Business at Work (from Home), take a closer look at the fastest growing apps and tools.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Okta

2020: The State of Endpoint Resilience Report
sponsored by Absolute Software Corporation
ANALYST REPORT: In this research report, 2020: The State of Endpoint Resilience Report, explore insights designed to help enterprises strengthen their security posture, and build the resilience needed to continue to face today’s cyber challenges head on.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Absolute Software Corporation

Identity as a Service for Dummies
sponsored by Okta
EGUIDE: According to the Okta 2020 “Businesses @ Work” report, the average number of apps per organization is currently 88, and the growth rate over the past 3 years has been 21 percent. Using this helpful guide, learn how companies are leveraging IDaaS to make IAM more scalable, more flexible and more cost effective.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Okta

The Cisco Umbrella Advantage
sponsored by Cisco Umbrella
EBOOK: Today, the network perimeter is expanding and blurring. Remote workers are bypassing the VPN and data is bypassing perimeter security. Traditional security just can’t keep up. In this e-book, learn how Cisco Umbrella DNS-layer security can help you see and block threats before they ever reach your network or endpoints.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Cisco Umbrella

Osterman Research: Focusing on the Endpoint as a Key Element of Your Security Infrastructure
sponsored by Trend Micro
WHITE PAPER: In the past, endpoints sat behind a network perimeter, but the growth of remote access to corporate resources makes the endpoint the new perimeter. Phishing, ransomware, malware, and web downloads are all potential threats. Delve into this Osterman Research report to get an in-depth look at these threats and how you can protect against them.
Posted: 26 Jun 2020 | Published: 30 Apr 2020

Trend Micro

Forrester Report: A Practical Guide to a Zero-Trust Implementation
sponsored by Okta
ANALYST REPORT: Zero Trust is becoming the security model of choice for enterprises and governments alike. However, security leaders often don’t know how to implement it, or they feel daunted by the shifts in strategy and architecture that Zero Trust demands. Read this Forrester report to learn the building blocks of a successful Zero-Trust implementation roadmap.
Posted: 26 Jun 2020 | Published: 15 Jan 2020

Okta

Insider Threat Management - Securing the Remote Worker and Enabling Business Continuity
sponsored by Proofpoint
DATA SHEET: In this brief, learn how a people-centric Insider Threat Management solution can help provide the necessary context around user and data activity to protect against costly data loss, system misuse and/or brand damage that can be caused by remote insiders.
Posted: 26 Jun 2020 | Published: 26 Jun 2020

Proofpoint

Protecting Your Business from Cyberthreats in 2020
sponsored by Barracuda
EBOOK: Modern hackers have taken traditional methods of cyberattack and altered them to become more precise, more aggressive, and more dangerous. The FBI reported that business email compromise attacks cost organizations $26 billion in the past three years, and this number may be due to increase. Learn more about evolving threats in this e-book.
Posted: 26 Jun 2020 | Published: 26 Jun 2020

Barracuda

2020 Trustwave Global Security Report
sponsored by SingTel
WHITE PAPER: This annual Trustwave Global Security Report provides a comprehensive look at the methods and techniques used by cybercriminals in order to provide valuable insight into ever-changing threat landscape. Download this report for an in-depth analysis of data compromise, email threats, malware, network security and more.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

SingTel

Building a Digitally Agile Future Enterprise with Managed SD-WAN
sponsored by SingTel
ANALYST REPORT: In this IDC brief, explore valuable insights on how to transform your business into a digital-first operating model through connectivity and see how SD-WAN can enable continued secured access to data, information, applications, and services that are vital to thrive in the digital economy.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

SingTel

ITProTV | Microsoft AZ 500: Create, Configure, Network, App Security Groups
sponsored by Cornerstone OnDemand
WEBCAST: In this video, learn what Network Security Groups and Application Security Groups are, and explore the 7 steps required to filter network traffic with a network security group using the Azure Portal.
Posted: 25 Jun 2020 | Premiered: Jun 25, 2020

Cornerstone OnDemand

Remote Work-From-Home Cybersecurity Report
sponsored by Pulse Secure
RESEARCH CONTENT: This is a survey that was conducted by Cybersecurity Insiders of 400 IT security decision-makers from companies of varying sizes across multiple industries. It offers insight into the minds of professionals who have had to both rebound from the sudden shift to WFH and prepare potential long-term secure access strategies.
Posted: 25 Jun 2020 | Published: 31 May 2020

Pulse Secure

Managed Network Service for Cisco SD-WAN
sponsored by Dimension Data
DATA SHEET: NTT Ltd.’s Managed Network Service for Cisco SD-WAN delivers a dynamic application aware infrastructure designed to maximize the potential of multi or hybrid cloud environments. Download this data sheet to learn more about the partnership.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

Dimension Data

Remote Work in the Age of COVID-19
sponsored by AppNeta
WHITE PAPER: The average 100,000 person organization has between 1,500 and 3,000 applications that run the business. In examining the applications in your organization, do they provide ample threat protection while still being able to run smoothly? Learn recommended steps to evolve your network strategy to support long-term remote work.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

AppNeta

WFH: How to Ensure End Users Stay Connected
sponsored by AppNeta
RESOURCE: In this resource, explore the different stages of network transformation that enterprises across the Globe suddenly had to reckon with as COVID-19 forced businesses to adopt “work from home” across their workforce.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

AppNeta

10 Ways to Secure and Accelerate a Modern Workforce
sponsored by Cloudflare & Safenames
ANALYST REPORT: Modern remote teams are made up of many kinds of users, including employees, contractors, and partners, collaborating in the same tools. As your team becomes more distributed, how will you protect your company’s data without slowing users down? This E-Book shares 10 ways organizations can protect their workforce without sacrificing productivity.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

Cloudflare & Safenames

Securing a Remote Workforce
sponsored by ProAct
WEBCAST: As people connect to their work VPNs via their home networks, there are more holes in security and greater vulnerability to attack. According to Barracuda Networks, email phishing went up 600% in the month of March. Watch this webinar for an in-depth look at cyberthreats – and what you can do to fight back.
Posted: 25 Jun 2020 | Premiered: Apr 8, 2020

ProAct

How Retailers Use LTE as Wireless WAN to Improve Service & Operations
sponsored by CradlePoint
WHITE PAPER: Innovation is changing retail from the storefront to the back office and beyond. Because of this, IT teams and the enterprise networks they manage have never been more important. In this white paper, uncover emerging trends in retail IT, challenges posed by those trends, and considerations for choosing futureproof edge network solutions for retail.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

CradlePoint

Innovation Insight for Extended Detection and Response
sponsored by Trend Micro
WHITE PAPER: Access this white paper for an overview of XDR and weigh its pros and cons to decide whether it could be an effective solution for your organization.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

Trend Micro

2020 User Risk Report
sponsored by Proofpoint
WHITE PAPER: Access this white paper to discover user cybersecurity awareness and knowledge gaps while discovering specific actions you can take to empower your people and build up your cyber resilience.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

Proofpoint

Capsule8 Enterprise Linux Protection
sponsored by Capsule8
PRODUCT OVERVIEW: To keep up as enterprises modernize around them, security teams need to adapt their approach to focus on achieving protection across their entire enterprise infrastructure across all environments. Download this product brief to discover the key features of Capsule8 Protect, designed to uphold security on any system and at scale.
Posted: 25 Jun 2020 | Published: 25 Jun 2020


MITRE ATT&CK Framework Q&A with Forrester Research
sponsored by Capsule8
WHITE PAPER: In response to the growing popularity and adoption of the MITRE ATT&CK framework, John Zelonis, principal analyst at Forrester Research, provides answers to commonly asked questions and offers further insight into the MITRE ATT&CK framework, including: Who should use the framwork, where priorities should begin & how it falls short.
Posted: 25 Jun 2020 | Published: 24 Jun 2020


The State of Cyber Security in the Legal Sector
sponsored by BlueVoyant
WHITE PAPER: Law firms are a critical industry that possess high-value information, making them a lucrative target for cybercriminals. The following report provides a comprehensive analysis of the state of cybersecurity and cyberthreats in the legal sector. Read on to unlock the results.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

BlueVoyant

Secure SD-WAN: The Launch Pad into Cloud
sponsored by Barracuda
ANALYST REPORT: Most organizations intend to leverage the many benefits of SD-WAN, including stronger security, better performance, improved user experience and cost optimization. However, like many emerging technologies, SD-WAN does not come without its challenges. In this research report, explore adoption trends of SD-WAN across the globe.
Posted: 23 Jun 2020 | Published: 30 Jun 2020

Barracuda
51 - 75 of 1440 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info