IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
51 - 75 of 1179 Matches Previous Page  |  Next Page
How to Reduce Security Risks through Better DNS Visibility & Analysis
sponsored by CoreLight
WEBCAST: In this webcast, find out how you can drive visibility into DNS traffic so that you can create a strong security analytics strategy that enables you to reduce risks for your network.
Posted: 04 Feb 2019 | Premiered: Jan 9, 2019

TOPICS: 
CoreLight

Missing Critical Patches: A Cybersecurity Epidemic
sponsored by Tanium
WHITE PAPER: IT security leaders agree that following best practices is instrumental in reducing cyber incidents. However, most organizations need to improve their best practices to stay secure. In this white paper, review key findings from a Frost & Sullivan survey. Also discover 5 recommended action items to help address common endpoint security issues.
Posted: 04 Feb 2019 | Published: 31 Dec 2017

TOPICS: 
Tanium

Threat Intelligence Executive Report
sponsored by Dell SecureWorks
RESEARCH CONTENT: In the last year, the number of sophisticated attacks has increased and threat actors have demonstrated greater adaptability. However, implementing security best practices could limit the impact of many intrusions. In this research report, learn about key developments in the cybercrime threat landscape.
Posted: 04 Feb 2019 | Published: 31 Dec 2018

TOPICS: 
Dell SecureWorks

Jump-Start Your Understanding of SD-WAN
sponsored by Telstra
RESOURCE: When it comes to assessing your SD-WAN and business requirements, you'll need to consider security. Learn about a provider that embeds security directly into network architecture in this interactive infographic.
Posted: 01 Feb 2019 | Published: 01 Feb 2019

TOPICS: 
Telstra

Why Telstra for SD-WAN
sponsored by Telstra
RESOURCE: The network underlay plays a critical role in the SD-WAN overlay—and since the underlay network's capacity caps performance for the SD-WAN overlay, it is crucial that you have the best base to build your network on. Learn how you can build your SD-WAN overlay with Telstra in this interactive infographic.
Posted: 01 Feb 2019 | Published: 01 Feb 2019

TOPICS: 
Telstra

Network Visibility and Using "Bro" with Vincent Stoffer
sponsored by CoreLight
WEBCAST: Watch this video to hear Director of Customer Solutions at Corelight, Vincent Stoffer, discuss network visibility and threat hunting as well as pairing the company's hardware appliance with the open-source software, Bro, now known as Zeek—enabling security teams to use Bro at an enterprise scale for accurate network traffic analysis.
Posted: 01 Feb 2019 | Premiered: Feb 1, 2019

TOPICS: 
CoreLight

The IT Security Confidant Vanishing Perimeter Pickup Sub
sponsored by Symantec
WEBCAST: See the benefits of Symantec Web Security Services today.
Posted: 01 Feb 2019 | Premiered: Feb 1, 2019

TOPICS: 
Symantec

The IT Security Confidant Vanishing Perimeter Pickup
sponsored by Symantec
VIDEO: See the benefits of Symantec Web Security Services today.
Posted: 31 Jan 2019 | Premiered: 31 Jan 2019

TOPICS: 
Symantec

The IT Security Confidant Vanishing Perimeter Sub
sponsored by Symantec
WEBCAST: The world of IT security has seen a vanishing perimeter in recent years. This has resulted from the increased usage of cloud which has made it for difficult for companies to secure mobile devices. In this webcast, learn about a simple, complete and cost-effective cloud security solution from Symantec.
Posted: 31 Jan 2019 | Premiered: Jan 31, 2019

TOPICS: 
Symantec

5 Reasons Corelight Gives You Better Data for Incident Response and Threat Hunting
sponsored by CoreLight
PRODUCT OVERVIEW: Download this white paper to learn about a product that can give you a holistic view of your network and turn network traffic into high-fidelity data for analysis.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

TOPICS: 
CoreLight

Symantec Secures Rockwell Automation Industrial Control and Business Intelligence Solutions
sponsored by Symantec
CASE STUDY: Industrial control systems have become a major focus for attacks and are now among the top targeted sectors. To help address the risk to computer-based endpoints in automation systems, Rockwell Automation partnered with Symantec Corporation to provide endpoint level security. Download this case study to learn more about the partnership.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

TOPICS: 
Symantec

The IT Security Confidant Vanishing Perimeter
sponsored by Symantec
WEBCAST: Click here, to learn about the benefits of Symantec's Web Security Services and learn how their advanced cloud delivered network security services are helping the cloud generation.
Posted: 31 Jan 2019 | Premiered: Jan 31, 2019

TOPICS: 
Symantec

How 1 Hospital Transformed Network Security
sponsored by Micro Focus
CASE STUDY: When network performance fell at a major North American hospital, it was a sign that years of IT security neglect had led to serious problems. The hospital had developed a reputation as a soft target and experienced daily network attacks. Read this case study to learn how this hospital began addressing threats before they become a problem.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

TOPICS: 
Micro Focus

The Perimeter is Dead. Long Live the Perimeter.
sponsored by Symantec
RESOURCE: The traditional network perimeter is vanishing and so is the security built into that perimeter. In order to stay secure in today's cloud generation workforce, organizations need a better way to extend their security controls while still supporting anytime and anywhere access. In this infographic, learn 5 tips for securing your network.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

TOPICS: 
Symantec

Corelight Sensor: A Typical Use Case
sponsored by CoreLight
BROCHURE: Faced with constant alerts from various security devices (IDS, anti-malware, anti-spam, etc.) today's companies still suffer from theft, false positives, and a general lack of visibility into network traffic. Download this white paper to learn about a network monitoring product that can help you quickly get to the bottom of threats.
Posted: 30 Jan 2019 | Published: 30 Jan 2019

TOPICS: 
CoreLight

Security with Dropbox Business
sponsored by Dropbox
WHITE PAPER: User-friendly tools provide IT with a unique opportunity to centralize data onto a sanctioned platform. Dropbox has approached this by becoming a popular tool for productivity. In this white paper, learn how they pair the benefits of widespread adoption with the controls and certifications IT needs to protect employees and their data.
Posted: 30 Jan 2019 | Published: 30 Jan 2019

TOPICS: 
Dropbox

AutoNation Speedily Addresses Hygiene and Improves Endpoint Security
sponsored by Tanium
CASE STUDY: In an effort for AutoNation to improve visibility and patch management, they deployed Tanium's endpoint security platform. As a result, AutoNation accomplished a comprehensive security hygiene assessment that validated the suspected patching deficiencies of the existing software deployment process. Learn more in this case study.
Posted: 30 Jan 2019 | Published: 30 Jan 2019

TOPICS: 
Tanium

Endpoint Security Buyer's Guide: Protect, Detect, Respond
sponsored by Tanium
WHITE PAPER: Today, virtually every organization connected to the Internet is attacked at its endpoints, and the most significant cybersecurity attacks involve at least one compromised endpoint. In this white paper, learn about the 4 main areas of endpoint security, why they are important and the essential capabilities of each.
Posted: 30 Jan 2019 | Published: 30 Jan 2019

TOPICS: 
Tanium

Managed Detection and Response (MDR): An overview of 24/7 alert monitoring and threat hunting services
sponsored by Trend Micro, Inc.
WHITE PAPER: Organisations are facing stealthy threat actors who are employing techniques designed to bypass existing security measures. Enterprises have to be aware of the ways in which their organisation might be targeted. In this white paper, learn about how a Managed Detection and Response service can help your organisation.
Posted: 30 Jan 2019 | Published: 30 Nov 2018

TOPICS: 
Trend Micro, Inc.

Networking and Security Trends Report
sponsored by Tech Data - Vmware
WHITE PAPER: Now more than ever, businesses must innovate. However, companies can't do that without strategic guidance and a future-ready infrastructure provided by IT. Read this white paper to learn the 5 key trends that will impact your IT team's decisions when it comes to the future of the network.
Posted: 29 Jan 2019 | Published: 29 Jan 2019

TOPICS: 
Tech Data - Vmware

5 Ways to Secure Applications Wherever They Live
sponsored by Tech Data - Vmware
RESOURCE: Download this white paper to learn 5 innovative ways you can secure applications—wherever they live.
Posted: 29 Jan 2019 | Published: 29 Jan 2019

TOPICS: 
Tech Data - Vmware

Power Your Data Center for the Digital Economy
sponsored by VMware and Arrow
WHITE PAPER: The digital economy is all about speed and innovation. To deliver both with limited resources, you need a modern data center. Read this white paper to learn how you can start your data center modernization journey, and discover benefits of doing so.
Posted: 29 Jan 2019 | Published: 29 Jan 2019

TOPICS: 

Network Virtualization's Hidden Gem: Application Security
sponsored by VMware and Arrow
WHITE PAPER: Who should be looking at network virtualization as a source of application infrastructure security? Surprisingly—almost every enterprise. Find out more about how network virtualization can provide a holistic view of what's happening to your data, and potential threats in this white paper.
Posted: 29 Jan 2019 | Published: 29 Jan 2019

TOPICS: 

Network Traffic Analysis
sponsored by CoreLight
PRODUCT OVERVIEW: A network IDS typically looks for potential attacks based on monitoring traffic for known behavior or discrete characteristics. But, they often lack the power to identify sophisticated attacks. Read on to discover how your security team could benefit from a networking monitoring framework with sophisticated network traffic analysis.
Posted: 29 Jan 2019 | Published: 29 Jan 2019

TOPICS: 
CoreLight

Simplify Bro Deployments with a Corelight Sensor
sponsored by CoreLight
PRODUCT OVERVIEW: Bro, now known as Zeek, is a framework for transforming network traffic into actionable data for analysis and more. Although it's relatively easy to get started with Bro, it's much more challenging to run the software efficiently and at scale. Read this white paper to learn about the Corelight Sensor, which is designed to simplify Bro deployments.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

TOPICS: 
CoreLight
51 - 75 of 1179 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement