IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
51 - 75 of 1291 Matches Previous Page  |  Next Page
Global Software Firm Embarks on Digital Journey with Enterprise SD-WAN
sponsored by Riverbed
CASE STUDY: A global software solutions company with 50 offices in over 30 countries is migrating all of its workloads to the cloud. The resulting poor performance drove the firm to seek better control of its overlay network. In this case study, learn why the company decided to implement Riverbed’s SD-WAN to help accelerate their cloud migration.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

Riverbed

DoorDash: Remote Vendor Access Security Goes Out the Window
sponsored by Cyber-Ark Software
CASE STUDY: In the wake of a massive data breach that affected nearly 5 million stakeholders, DoorDash, a food delivery service, needed a remediation plan. Read this case study to discover what led to the breach, and the 4 actionable steps DoorDash implemented for reducing the risk of remote vendor access.
Posted: 25 Feb 2020 | Published: 01 Oct 2019

Cyber-Ark Software

Insider Threat and Supply Chain Risk Reduction – in Real-Time
sponsored by Ionic Security
RESOURCE: Today’s organizations face a vast array of security threats, the 2 most prevalent being insider breaches and third-party attacks. In this blog post, the VP of Risk & Corporate Security at Ionic shares his guidance on how to best identify and mitigate these threats.
Posted: 25 Feb 2020 | Published: 03 Jan 2020

Ionic Security

Why Behavior-Based Network Traffic Analysis (NTA) Matters
sponsored by IronNet
WHITE PAPER: Today’s security executives are looking to shore up their defenses with a more proactive approach — one that can signal unknown threats steps ahead of the impact. Behavioral analytics adds that level of sophistication to network traffic analysis (NTA). Learn how NTA can elevate your threat detection strategy overall.
Posted: 25 Feb 2020 | Published: 25 Feb 2020

IronNet

Crossing the Chasm: What Makes SD-WAN Enterprise Grade
sponsored by Riverbed
ANALYST REPORT: The rise of SD-WANs has been arguably the most significant advancement in the networking industry in recent years. In this IDC report, learn what enterprises are demanding from their SD-WANs as they scale from pilots to full-scale rollouts.
Posted: 25 Feb 2020 | Published: 31 Dec 2019

Riverbed

The Top Automated Bot Threats to Applications and How to Stop Them
sponsored by Radware
WHITE PAPER: Today, malicious bots compromise of 26% of total internet traffic. Bots scour the internet, and bypass traditional security methods in order to attack online businesses. So, how can your organization be better equipped to handle this threat? Download this white paper to uncover the top threat tactics & how to mitigate them.
Posted: 25 Feb 2020 | Published: 25 Feb 2020

Radware

Ready, Set, SD-WAN
sponsored by Riverbed
WHITE PAPER: Like many enterprises, you may be looking to SD-WAN to meet your insatiable need for bandwidth and to lower your network costs. However, before rolling out SD-WAN, there a few things you need to consider. In this white paper, explore 4 tips to help your enterprise get the most value from your investment in SD-WAN.
Posted: 25 Feb 2020 | Published: 25 Feb 2020

Riverbed

Identifying Network Security Vulnerabilities
sponsored by Crosskey Cyber Security
EGUIDE: IT staff needs to regularly review network security vulnerabilities and security gaps to battle rising cybersecurity breaches and keep costs under control through risk assessments. View this guide to learn about tools that can help you identify network security vulnerabilities today.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

Crosskey Cyber Security

Emergency Communications of Southern Oregon
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Emergency Communications of Southern Oregon (ECSO), an emergency dispatch facility, was able to save lives through their partnership with Absolute by ensuring endpoint visibility and security to increase efficiency and meet CJIS compliance.
Posted: 21 Feb 2020 | Published: 26 Apr 2019

Absolute Software Corporation

Securing the Human Perimeter with Natural Language Understanding
sponsored by Armorblox
WHITE PAPER: The traditional notion of what constitutes a perimeter is disappearing, user behavior is evolving, and organizations are incorporating mobile workforces and remote devices. Applying adequate security today requires a change in mindset to focus on the human perimeter. Download this white paper to learn more.
Posted: 21 Feb 2020 | Published: 31 May 2019

Armorblox

NIST Cybersecurity Framework Evaluation Guide
sponsored by Absolute Software Corporation
WHITE PAPER: The NIST Cybersecurity Framework (CSF) outlines specific actions and guidelines for organizations to undertake in order to improve security hygiene and meet regulatory requirements. In this evaluation guide, take a closer look at the 5 pillars of the NIST CST and learn how the Absolute platform aligns with the action items.
Posted: 20 Feb 2020 | Published: 02 Oct 2018

Absolute Software Corporation

Creative Lodging Solutions
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Creative Lodging Solutions (CLS), a travel management company, partnered with Absolute to establish control and visibility of their endpoints to eliminate blind sports and protect intellectual property.
Posted: 20 Feb 2020 | Published: 15 May 2019

Absolute Software Corporation

7 Insights into Today’s Network Monitoring and Management Approaches
sponsored by Gigamon
RESOURCE: Managing today’s complex networks isn’t an easy task to navigate. In this infographic, explore 7 monitoring and management trends and challenges network operations executives are experiencing today.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

Gigamon

Data Security for the Way People Work
sponsored by Dell and Intel
WHITE PAPER: Faced with a growing array of threats and the challenge of enabling the mobile workforce, IT leaders should tailor their security strategy to focus on the way end users work. Download this report to uncover the common threats and key tactics to consider when implementing a security plan.
Posted: 19 Feb 2020 | Published: 19 Feb 2020

Dell and Intel

Federal Agency Turns to SAIC for Cybersecurity Resiliency
sponsored by Gigamon
CASE STUDY: A large U.S. federal agency brought in SAIC (Science Applications International Corporation) to assess and revamp their aged network security infrastructure. Learn how the SAIC team brought new security tools into the agency’s infrastructure and helped improve their security posture and network operations.
Posted: 19 Feb 2020 | Published: 19 Feb 2020

Gigamon

How to Provide a Safe Learning Environment
sponsored by Absolute Software Corporation
WHITE PAPER: Technology has become a fundamental part of the education system, and it’s likely to continue as a classroom trend. However, these devices also present risks to students and schools. Download this white paper to uncover 3 approaches your organization should adopt in order to ensure a safer learning environment.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Absolute Software Corporation

Security at the Speed of Your Network
sponsored by Gigamon
WHITE PAPER: Read “Security at the Speed of Your Network” to learn how to use an architectural approach that improves security posture and reduces costs without painful compromises on performance.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Gigamon

Why SD-WAN Requires a New Approach to Security
sponsored by Zscaler
ANALYST REPORT: SD-WAN improves user experience by providing direct access to the Internet for cloud-based apps. However, local Internet connections must be secure to protect organizations from bad actors. In this report, learn how organizations can secure direct-to-cloud connections.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Zscaler

KCOM
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how KCOM, a UK-based systems integrator, partnered with Absolute to address the increasing demands of their increasingly dispersed workforce without sacrificing compliance or operational efficiency.
Posted: 17 Feb 2020 | Published: 13 May 2019

Absolute Software Corporation

The Root Of (Almost) All Security Issues
sponsored by Tala Security
WHITE PAPER: In order to establish adequate data protection, security teams need to ensure they address both technical (code and data) & non-technical (user behavior) risks. In this white paper, Sanjay Sawhney, VP of Engineering at Tala, highlights how these issues lead to significant disruptions and offers best practices for addressing them.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Tala Security

SLED - 3 Easy Ways to Secure Your K-12 School District
sponsored by Cisco Umbrella
RESOURCE: Deployed in 3 simple steps, Cisco Umbrella secures your entire school district in minutes. Easily protect students and staff against phishing attacks, filter content, and gain visibility into all activity, on or off-campus. Download this infographic to learn more.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Cisco Umbrella

What secure email gateways can do for your enterprise
sponsored by SearchSecurity.com
EBOOK: It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

SearchSecurity.com

The GoAnywhere Book of Secure File Transfer Project Examples
sponsored by Help/Systems
WHITE PAPER: Managed file transfer (MFT) software is primarily used to automate and encrypt the data exchanged between an organization and its trading partners, users, and employees. A robust MFT solution can also solve problems that fall outside your basic file transfer needs. In this white paper, learn how your peers use managed file transfer.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Help/Systems

Apcela Arcus Platform: Enterprise Multi-Cloud WAN
sponsored by Apcela
DATA SHEET: Apcela Arcus Platform allows enterprises to easily plug their existing network into a SD-WAN that was built for today’s multi-cloud environment. In this brief, learn more about the Apcela Arcus Platform.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Apcela

IDT: ShieldX Customer Testimonial
sponsored by ShieldX
VIDEO: View this customer testimonial video to see how IDT Telecom saw security success with ShieldX.
Posted: 13 Feb 2020 | Premiered: 13 Feb 2020

ShieldX
51 - 75 of 1291 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info