IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
51 - 75 of 1327 Matches Previous Page  |  Next Page
The Evolution of SD-WAN as a Platform
sponsored by VMware Velocloud
WHITE PAPER: Transformation is already happening in the data centers and now organizations must redefine and transform the WAN. SD-WAN is a new way of building the WAN. In this white paper learn everything you need to know about SD-WAN.
Posted: 04 Nov 2019 | Published: 31 May 2019

VMware Velocloud

Get Cloud Ready with SD-WAN
sponsored by VMware Velocloud
WHITE PAPER: As more applications move to the cloud, business users increasingly rely on them to do their jobs. But for IT organizations that are managing remote and branch offices, it can be a challenge to accommodate these needs. In this white paper, learn how SD-WAN can help address the challenges of today’s hybrid cloud environment.
Posted: 04 Nov 2019 | Published: 31 May 2019

VMware Velocloud

Five Steps To A Zero Trust Security Strategy Q&A
sponsored by Ionic Security
WHITE PAPER: Following a recent webcast on the zero-trust approach, Stephanie Balaouras, Vice President, Research Director for Security & Risk at Forrester Research participated in a Q&A with audience members. Review some of Balaouras’ insights on data-centric security strategy approaches.
Posted: 01 Nov 2019 | Published: 01 Nov 2019

Ionic Security

How to Enable Remote Access for Complex Networks
sponsored by LogMeIn RescueAssist
EGUIDE: The need to securely enable remote access to corporate networks in better, more agile ways is crucial to keep pace with increasingly complex networks. In this e-guide, learn how remote access services and products enable essential business capabilities, including file sharing, remote support and maintenance, and face-to-face communications.
Posted: 01 Nov 2019 | Published: 30 Oct 2019

LogMeIn RescueAssist

The 5 Business Advantages of SD-WAN
sponsored by Fortinet, Inc.
WHITE PAPER: Traditional network architectures aren’t built to handle the workloads and complexities of most digital transformation initiatives. Therefore, many network operations teams are turning to SD-WAN. In this white paper, discover 5 ways SD-WAN technology can boost your bottom line – without IT headaches.
Posted: 01 Nov 2019 | Published: 16 Aug 2019

Fortinet, Inc.

Elevating Enterprise Security with Fidelis Cybersecurity: Network and Deception
sponsored by Fidelis
WHITE PAPER: As organizations adopt cloud technologies and regulatory requirements, networks grow increasingly complex. Security teams are finding it difficult to defend their networks without holistic insight into the environment. Does your security team have the visibility and investigative ability to defend your network? Read on to find out.
Posted: 01 Nov 2019 | Published: 30 Sep 2019

Fidelis

The Essential Checklist for Enterprise SD-WAN
sponsored by Riverbed
RESOURCE: You know SD-WAN has the potential to be a game-changer. But in order to reap the full benefits, you need the ability to overcome multiple roadblocks that commonly arise. Download this checklist to help you choose the best SD-WAN for your organization.
Posted: 01 Nov 2019 | Published: 01 Nov 2019

Riverbed

DevSecOps and the Problem of Machine-Scale Data
sponsored by Ionic Security
RESOURCE: The amount of data being created daily is growing exponentially, and manual processes can’t scale. With data growth comes increasing complexity and higher importance for security to be integrated into the SDLC. Discover the opportunities and threats of machine-scale data, how to maintain agility, and the implications this has for DevSecOps.
Posted: 01 Nov 2019 | Published: 08 Oct 2019

Ionic Security

ML-Driven Security Analytics and Automated Threat Response for IoT Part 1
sponsored by Extreme Networks
WEBCAST: Adopting specific machine learning capabilities can help you identify & respond to threats inside your network before it’s too late. That’s where machine learning & AI can assist you with automated anomaly & threat detection analytics. Learn how this industry-unique approach can help protect your network today.
Posted: 31 Oct 2019 | Premiered: Feb 19, 2019

Extreme Networks

Buyer’s Guide for Certificate Lifecycle Automation
sponsored by AppViewX
WHITE PAPER: The number of certificates in your infrastructure is growing with no signs of slowing down. An expiry or certificate-related issue will not only cause an application outage but could also cripple your trust-based systems. In this white paper, uncover a checklist to help you re-evaluate your current certificate management methods.
Posted: 31 Oct 2019 | Published: 31 Oct 2019

AppViewX

How Secure SD-WAN Will Empower Local Branches
sponsored by Fortinet, Inc.
WHITE PAPER: The increase of cloud-based applications is driving an increase in data that must travel over the WAN. As a result, many organizations are turning to SD-WANs to provide much-needed bandwidth. However, SD-WANs create an expanded attack surface that could expose an organization to risk. In this white paper, uncover 4 steps to secure your SD-WAN.
Posted: 31 Oct 2019 | Published: 08 Jul 2019

Fortinet, Inc.

Next Generation Networking
sponsored by Riverbed
PRODUCT OVERVIEW: An insatiable demand for WAN capacity and adoption of cloud-based applications has led to new WAN architectures at remote locations. The result is a hybrid and more complex network, which is untenable to manage with conventional means. In this brief, learn how Riverbed can help you manage hybrid WANs and SD-LANs.
Posted: 31 Oct 2019 | Published: 31 Oct 2019

Riverbed

Advanced Data Protection for Midsize Enterprises
sponsored by InteliSecure
WHITE PAPER: Advanced data protection is no longer a choice for midsize organizations. Large enterprises have the resources to detect a breach & recover from an occurrence, while midsize enterprises typically can't afford a similar incident. But there is a silver lining: security systems are more capable and affordable than ever before.
Posted: 30 Oct 2019 | Published: 30 Oct 2019

InteliSecure

Choosing an SD-WAN for Secure WAN Edge Transformation: 7 Requisite Capabilities
sponsored by Fortinet, Inc.
RESOURCE: Many vendors offer some form of SD-WAN, with many claiming their technology include security. But in many cases, comprehensive full-stack security is not integrated into the technology. In this resource, find a checklist of 7 questions to help network engineering and operations leaders determine the best SD-WAN for their organization.
Posted: 30 Oct 2019 | Published: 30 Oct 2019

Fortinet, Inc.

Transitioning to LTE-M: Improving IoT Business Models
sponsored by Aeris
WHITE PAPER: In this white paper, look at 3 hurdles that can be overcome by implementing or transitioning to an LTE-M IoT solution including technology sunsets, module (radio) costs, and the extension of battery life.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

Aeris

Enhancing IoT Visibility and Security
sponsored by Extreme Networks
WEBCAST: Many IoT devices were designed without imbedded security features, which is posing a security risk to many organizations. In this webcast, learn about the risks and attacks associated with IoT, how to approach IoT security, and how Extreme solutions can help.
Posted: 29 Oct 2019 | Premiered: Aug 13, 2019

Extreme Networks

Building a Strong and Effective Incident Response Plan
sponsored by ServiceNow
EGUIDE: Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.
Posted: 28 Oct 2019 | Published: 23 Oct 2019

ServiceNow

A Framework for Cybersecurity and Compliance
sponsored by OneNeck IT
WHITE PAPER: In this white paper, discover an outline of how you can methodically assess and structure enterprise security to protect your data and address compliance mandates such as HIPPA, PCI DSS, SOX, as well as NIST SP-800-171 if appropriate, by applying a NIST-based approach to your IT environment.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

OneNeck IT

Securing Your SWIFT Environment Using Micro-Segmentation
sponsored by Illumio
WHITE PAPER: All SWIFT customers must self-attest to their compliance with the SWIFT Customer Security Program (CSP). The program is designed to respond to the wave of cybercrime targeting SWIFT installations. In this white paper, explore 3 challenges that prove especially difficult for SWIFT customers looking to achieve compliance.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

Illumio

Application Dependency Mapping
sponsored by Illumio
WHITE PAPER: To understand and eliminate the security blind spots in your application environment, the first step is to visualize all your application components and how they are interconnected. In this white paper, learn everything you need to know about application dependency mapping.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

Illumio

Forrester Report: Use advanced encryption for data security
sponsored by IBM
ANALYST REPORT: More than ever, the security of your firm's bottom line depends on the technologies that secure your data. Today, that means strategically deploying data-encrypting solutions. This report details which encryption solutions are available to secure data in its various states and looks at the viability of emerging encryption technologies.
Posted: 24 Oct 2019 | Published: 12 Sep 2019

IBM

Forrester Report: Use advanced encryption for data security
sponsored by IBM
ANALYST REPORT: More than ever, the security of your firm's bottom line depends on the technologies that secure your data. Today, that means strategically deploying data-encrypting solutions. This report details which encryption solutions are available to secure data in its various states and looks at the viability of emerging encryption technologies.
Posted: 24 Oct 2019 | Published: 12 Sep 2019

IBM

Efficient Threat Remediation with Check Point and ServiceNow
sponsored by ServiceNow
RESOURCE: Discover how security administrators can create, orchestrate, and efficiently process block list requests for malicious sites using ServiceNow Security Operations and Check Point Next Generation Threat Prevention Gateways.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

ServiceNow

Evaluating Vulnerability Risk Management Providers
sponsored by Rapid7
ANALYST REPORT: As vulnerability risk management evolves to address customers’ needs, this Forrester Wave seeks to highlight solutions that help customers prioritize remediation efforts. In the report, explore an evaluation of 13 vulnerability risk management providers.
Posted: 22 Oct 2019 | Published: 17 Oct 2019

Rapid7

Network Security for a New Era
sponsored by TechData - HPE
WHITE PAPER: Mobile devices and smart objects are connecting to the same school networks, but they have very different security needs. Read this report for how K-12 leaders can manage the new security challenges of mobile devices and smart objects.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

TechData - HPE
51 - 75 of 1327 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement