IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
51 - 75 of 1171 Matches Previous Page  |  Next Page
Making Sense of Zero-Trust Security
sponsored by TechTarget
RESOURCE: As security professionals continue searching for methods of keeping out intruders, they make clear their thoughts about zero trust and how its philosophy can keep users safer. As it stands, 40% of professionals support zero trust for their organizations – do you? Take our survey to let us know, and receive a FREE zero-trust guide as a bonus.
Posted: 01 Mar 2021 | Published: 01 May 2021

TechTarget

CCNA 200-301 Official Cert: Practice Exam
sponsored by Techtarget
RESOURCE: Achieving your Cisco Certified Network Associate, or CCNA, certification is no small feat. Luckily, searchNetworking is here to help you prepare! We're giving you access to our all new CCNA Practice Exam. Inside, discover 12 questions (and answers) that provide a realistic example of what you can expect on the exam.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

Techtarget

SIG - SASE in 15 minutes
sponsored by Cisco Umbrella
WEBCAST: Secure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.
Posted: 26 Feb 2021 | Premiered: Mar 25, 2020

Cisco Umbrella

MANAGED XDR - MANAGED DETECTION AND RESPONSE SERVICE
sponsored by Trend Micro
DATA SHEET: Today’s attacks are dangerous – monetizing intellectual property, encrypting essential data for ransom or damaging the flow of information in the case of nation state attacks. Managed extended detection and response (XDR) can provide 24/7 protection from these attacks. View this Trend Micro data sheet to see the full security layer.
Posted: 26 Feb 2021 | Published: 26 Feb 2021

Trend Micro

Partnering To Deliver An Automated Secure Access Service Edge
sponsored by Aruba Networks
DATA SHEET: Cloud migration is changing traffic patterns and driving the need to transform WAN and security architectures. SASE is changing how companies build their networks, and when combined with SD-WAN, applications perform highly and threats are averted. Access this data sheet to learn about Silver Peak’s Unity EdgeConnect SD-WAN with automated SASE.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

Aruba Networks

Unity Orchestrator Global Enterprise
sponsored by Aruba Networks
WHITE PAPER: If your organization has multiple large-scale SD-WAN deployments, it can be difficult to get visibility into them and, moreover, orchestrate them. Professionals with Silver Peak Unity EdgeConnet SD-WAN fabrics in their stack should read this white paper. It details how you can centrally manage and monitor these SD-WAN deployments.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

Aruba Networks

Secure Sd-Wan For The Cloud-First Enterprise Without Compromise
sponsored by Aruba Networks
WHITE PAPER: As enterprises move to the cloud, security challenges multiply. Examine this white paper to learn how Zscaler and Silver Peak are combining their respective Cloud Security and Unity EdgeConnect SD-WAN platforms to address these challenges. And, see how they’re collaborating to deliver security orchestration for consistent security policies.
Posted: 25 Feb 2021 | Published: 31 May 2019

Aruba Networks

SonicWall Secure SD-Branch
sponsored by SonicWall
DATA SHEET: Branch networks are quickly evolving. Secure SD-Branch can provide security, network segmentation and compliance for peace of mind on distributed networks. SonicWall Secure SD-Branch aims to simplify deployment, management and troubleshooting. Access this solution brief to explore potential benefits.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

SonicWall

Managing Cybersecurity Risk in the Supply Chain
sponsored by HelpSystems
EGUIDE: Supply chains have become a prime target for cybercriminals – which is illustrated by the rise in third-party vulnerabilities and breaches across 2020. Read this e-guide to discover the emerging supply chain threats, their implications for each industry, and 5 ways organizations can better protect themselves.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

HelpSystems

Are Your Branch Sites an Open Door to Cyberattacks?
sponsored by SonicWall
WHITE PAPER: Traditional methods of deploying and maintaining security at branch sites have become ineffective, expensive and unmanageable. But an SD-Branch solution can form a cornerstone for boundless security in distributed enterprise environments. Jump into this white paper to see why the time for SD-Branch is now.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

SonicWall

Vitens Moves to Cloud Security with BloxOne™ ThreatDefense from Infoblox
sponsored by Infoblox
CASE STUDY: Vitens is the largest drinking water utility in The Netherlands, delivering water to 5.6 million people. In an effort to strengthen security, Vitens set out to improve visibility into their network infrastructure and endpoints. Download this case study to see how Infoblox’s BloxOne Threat Defense gave Vitens oversight they needed to succeed.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Infoblox

Securing Remote Workers In The Age Of Teleworking
sponsored by Infoblox
WHITE PAPER: Remote workers are seeking access to enterprise resources from a variety of endpoints, both work-provided and personal, as well as various mobile devices. But many of the cybersecurity procedures designed for enterprise facilities won’t work from remote locations. Explore this detailed guide to learn how to secure remote workers intelligently.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Infoblox

Infoblox Video 3
sponsored by Infoblox
WEBCAST: DDI is the shorthand of DNS, DHCP (Dynamic Host Configuration Protocol) and IPAM (IP Address Management). As enterprise networks expand at the edge and apps move to the cloud, it’s becoming clear that these 3 core network services should be cloud-managed as well. Engage this webcast to get a crash course on BloxOne DDI.
Posted: 16 Feb 2021 | Premiered: Feb 16, 2021

Infoblox

Advanced Technology Solutions from NWN
sponsored by NWN Corporation
WHITE PAPER: Your business’s end users need to stay connected, especially in today’s ‘work-from-anywhere’ ecosystem. But too many IT departments face poor connectivity and limited visibility – and both lead to increased costs. Leverage this white paper to learn about an experience management platform that strives to alleviate these issues.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

NWN Corporation

Enable & Secure Your Remote Workforce
sponsored by BeyondTrust Corporation
EGUIDE: IT departments have faced incredible challenges this year trying to maintain productivity for an expanded remote workforce. However, these challenges didn’t disappear with the start of 2021, your remote workers need to be able to operate efficiently and securely. Read this e-guide for a comprehensive overview of the pillars of remote work.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

BeyondTrust Corporation

Learning a New Approach to Teaching in the Education Sector
sponsored by Shure Inc
RESOURCE: Educators and students have been significantly impacted by the spread of COVID-19. While most classes are remote, hybrid learning models are also an option – either way the focus remains on providing students and teachers with a safe, socially-distant but effective curriculum. Read this article to learn more about these changes.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Shure Inc

2021 Top Sd-Wan Edge Trends
sponsored by Silver Peak
EBOOK: SASE, IoT, 5G, AI – these are all important terms to know as they evolve in conjunction with network architecture. The real question is: How will SD-WAN and the edge play their role in enterprise embarkment on these new technologies? What will drive adoption, and why? Immerse yourself in this e-book to learn 8 SD-WAN edge trends.
Posted: 01 Feb 2021 | Published: 01 Feb 2021

Silver Peak

Making Sense of Zero-Trust Security
sponsored by TechTarget
RESOURCE: As security professionals continue searching for methods of keeping out intruders, they make clear their thoughts about zero trust and how its philosophy can keep users safer. As it stands, 40% of professionals support zero trust for their organizations – do you? Take our survey to let us know, and receive a FREE zero-trust guide as a bonus.
Posted: 01 Feb 2021 | Published: 01 May 2021

TechTarget

Top Security Concerns for New Technology Deployments
sponsored by Thales
VIDEO: Thales releases an annual Data Threat Report, which compiles their research into the evolving landscape of cyberthreats, data security, and more. Watch this video for a 45-minute walkthrough of this year’s results, which include everything from zero trust, to mutlicloud environments, to quantum computing and everything in between.
Posted: 29 Jan 2021 | Premiered: 29 Jan 2021

Thales

SURFnet Selects Thales Luna HSMs to Secure DNSSEC Material
sponsored by Thales
CASE STUDY: As part of an organization-wide initiative to ensure DNS security and compliance, SURFnet partnered with Thales to address several challenges they were facing related to DNS. Read this case study to see why they chose Thales as their DNS security and compliance partner and learn more about the outcomes of this initiative.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Thales

Architecting a Secure Business-Driven SD-WAN
sponsored by Silver Peak
WHITE PAPER: SD-WAN delivers the ability to actively utilize low-cost broadband services. But because broadband services are ‘public’ instead of ‘private,’ advanced security capabilities are required to ensure the confidentiality and integrity of application traffic traversing such connections. Access this white paper to learn about Silver Peak’s secure SD-WAN.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Silver Peak

Making the Shift to a Business-First Networking Model
sponsored by Silver Peak
WHITE PAPER: While the majority of enterprises have moved applications and IT infrastructure to the cloud, many have yet to realize the full promise of the cloud. This is down to your network. The onus is now on network professionals to give their employees the best possible experience. Read this white paper the role of business-driven SD-WAN.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Silver Peak

Rockefeller Group Turns to CPP Associates and HPE To Enable a Fully Mobile Office with Next Generation Infrastructure
sponsored by CPP Associates
CASE STUDY: One of the largest real estate groups in the world set out to rebuild and modernize their network infrastructure to achieve simplified management. They also wanted to develop next generation wireless-capable endpoints to promote flexibility and mobility. Dive into this case study to see how they accomplished these goals and improved collaboration.
Posted: 28 Jan 2021 | Published: 28 Jan 2021

CPP Associates

SD-WAN: The Most Critical Design Considerations
sponsored by Business nbn
EGUIDE: Experts agree that SD-WAN is the most efficient way to direct network traffic throughout your WAN and lower costs, but you have to ensure you choose the option that meets your architecture, business and performance needs. Access this expert e-guide to delve into the most critical considerations for designing your SD-WAN architecture.
Posted: 18 Feb 2021 | Published: 10 Feb 2021

Business nbn

How to get actionable threat intelligence from tech tools
sponsored by SearchSecurity.com
EBOOK: Automated threat intel products and services can't produce actionable threat intelligence without essential ingredients, like threat hunters, analysts and administrators. This guide teaches cybersecurity pros how to how to pluck usable threat intelligence from a sea of data.
Posted: 08 Feb 2021 | Published: 08 Feb 2021

SearchSecurity.com
51 - 75 of 1171 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences