IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
76 - 100 of 1179 Matches Previous Page  |  Next Page
Case Study: Top University Builds Custom Detection Scripts
sponsored by CoreLight
CASE STUDY: Learn how this top research university was able to meet all of their network traffic analysis requirements with fast network log searches, expanded custom detection scripting capabilities, and more.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

TOPICS: 
CoreLight

Case Study: Security Team Sees 95% Reduction in Incident Response Time
sponsored by CoreLight
CASE STUDY: In this case study, find out how Corelight provided Education First with real-time, detailed insight into network traffic spanning multiple business sites, as well as a reduced average incident response time from around 3 hours to less than 10 minutes (95% reduction.)
Posted: 28 Jan 2019 | Published: 28 Jan 2019

TOPICS: 
CoreLight

4 Steps to Transforming Network Security
sponsored by Tech Data - Vmware
WHITE PAPER: Download this white paper to explore 4 steps you can take to revamp your network security, and learn about a technology that promises to transform networking and security with a software platform that can exist across data centers, clouds, and more, helping you maximize visibility.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

TOPICS: 
Tech Data - Vmware

Corelight Webcast: New SIEM on the Block -- Meet Humio
sponsored by CoreLight
WEBCAST: Bro network security monitoring is an open source tool. It turns raw network traffic into comprehensive network logs organized by protocol, with key fields extracted specifically for security use cases. In this webcast, watch a demo to see how Corelight's technical integration with Humio allows you to economically monitor all your network traffic.
Posted: 28 Jan 2019 | Premiered: Aug 21, 2018

TOPICS: 
CoreLight

Employee Habits that Can Put Your Company at Risk
sponsored by Panda Security
WHITE PAPER: While maintaining secure devices and networks is critical to an organization's cybersecurity, it's not the only thing companies should focus on. When it comes to keeping an organization secure, employees are often the weakest link. Download this white paper to learn how employees are threatening your company and ways to prevent it.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

TOPICS: 
Panda Security

Cryptojacking: A Hidden Cost
sponsored by Panda Security
WHITE PAPER: Cryptojacking is one of the newest threats to cybersecurity in the last two years. Easy to carry out and difficult to detect, these attacks involve cybercriminals taking control of a third-party device's CPU to mine valuable cryptocurrencies. Download this white paper to learn more about the threat and how to protect your devices.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

TOPICS: 
Panda Security

Resolving the Agile vs. Secure Application Networking Tradeoff
sponsored by NetFoundry
WHITE PAPER: Read this white paper to learn about a new networking platform designed to enable secure and reliable connect applications without the constraints of VPNs, custom hardware and private circuits.
Posted: 25 Jan 2019 | Published: 25 Jan 2019

TOPICS: 
NetFoundry

Asset Management for Cybersecurity: 10 Essential Questions to Answer
sponsored by Axonius
WHITE PAPER: When Axonius built their cybersecurity asset management platform, they had conversations with hundreds of security professionals about the challenges they face around seeing and securing all assets. In this post, they cover the 10 most common questions they heard, why they are difficult to answer, and how to overcome the obstacles.
Posted: 23 Jan 2019 | Published: 23 Jan 2019

TOPICS: 
Axonius

Building a Business Case for Cybersecurity Asset Management
sponsored by Axonius
WHITE PAPER: With many competing priorities facing information security teams, any new project must be prioritized against risk, net new capabilities, and ROI. Another challenge is the increasing number and types of devices on corporate networks. In this white paper, learn how to manage these challenges by using a cybersecurity asset management tool.
Posted: 23 Jan 2019 | Published: 31 Aug 2018

TOPICS: 
Axonius

2019 Network Security Predictions: Top Trends & Challenges
sponsored by TBNG Consulting
EGUIDE: Read this expert guide to review predicted networking trends for 2019. Also, learn why network security remains a top challenge and how you can properly manage it.
Posted: 23 Jan 2019 | Published: 18 Jan 2019

TOPICS: 
TBNG Consulting

Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
RESEARCH CONTENT: Security and risk management leaders increasingly seek SIEM solutions with capabilities that support early targeted attack detection and response. Users must balance advanced SIEM capabilities with the resources needed to run and tune the solution. This Gartner research report provides information about SIEM solutions and an analysis of vendors.
Posted: 23 Jan 2019 | Published: 03 Dec 2018

TOPICS: 
LogRhythm, Inc.

5 Things You Can Do by Adding a Layer of Cloud-Delivered Protection
sponsored by Cisco Meraki
RESOURCE: In this white paper, find out how you can deliver a 100% cloud-delivered secure internet gateway that provides a line of defense against threats on the Internet, and explore 5 things you can do by adding a layer of cloud-delivered protection.
Posted: 22 Jan 2019 | Published: 22 Jan 2019

TOPICS: 
Cisco Meraki

8 Reasons Why SIEM Users Are Making the Switch to LogRhythm
sponsored by LogRhythm, Inc.
PRODUCT REVIEW: In this resource, discover 8 reasons why LogRhythm customers made the switch from SIEMs. The top reasons include stopping the bad guys, saving time and resource drain, having a better user interface and more.
Posted: 22 Jan 2019 | Published: 22 Jan 2019

TOPICS: 
LogRhythm, Inc.

The 2019 Security Strategy
sponsored by Cloudflare
VIDEO: How are you planning to secure your employees, your company, and your customers in 2019? Watch this webinar to hear from Cloudfare CSO Joe Sullivan on the core strategies he uses to help protect Cloudfare, and—as a result—its 12M domains that rely on it for security and performance.
Posted: 22 Jan 2019 | Premiered: 17 Jan 2019

TOPICS: 
Cloudflare

Threat Intelligence Report
sponsored by DomainTools
RESEARCH CONTENT: Threat intelligence has become a significant weapon in the fight against cybersecurity threats, and a large majority of organizations have made it a key part of their security programs. Organizations are leveraging threat intelligence data for a number of use cases. In this white paper, learn more about benefits of threat intelligence platforms.
Posted: 22 Jan 2019 | Published: 22 Jan 2019

TOPICS: 
DomainTools

Key Questions to Ask when Evaluating UCaaS Providers
sponsored by Mitel Networks Limited
WHITE PAPER: In this guide, discover 12 categories – each with a set of targeted questions – that are designed to help you evaluate UCaaS providers and ensure you make an informed decision that will benefit your communications.
Posted: 21 Jan 2019 | Published: 31 Dec 2018

TOPICS: 
Mitel Networks Limited

Device Discovery for Vulnerability Assessment: Automating the Handoff
sponsored by Axonius
WHITE PAPER: While vulnerability assessment tools are widely believed to be very mature and approaching commodity status, they are only able to scan and analyze those assets they know about. In this white paper, we'll highlight how automating both device discovery and making VA tools aware of new devices that should be scanned can help your security efforts.
Posted: 21 Jan 2019 | Published: 21 Jan 2019

TOPICS: 
Axonius

The 1st Step to Zero Trust: Asset Management for Cybersecurity
sponsored by Axonius
WHITE PAPER: 8 years after the Zero Trust model was introduced, the concept has hit the mainstream. A Forrester analyst says 85% of his calls involve zero trust. With the amount of interest in the concept, many organizations are rushing to understand how to implement it. In this white paper, learn the first step to implementing zero trust: asset management.
Posted: 21 Jan 2019 | Published: 21 Jan 2019

TOPICS: 
Axonius

5 Questions to Ask in Global Network Services RFPs
sponsored by MASERGY
RESOURCE: Download this resource for tips on creating RFPs for global network services, and find out 5 must-have questions to include in your RFP.
Posted: 18 Jan 2019 | Published: 18 Jan 2019

TOPICS: 
MASERGY

Spotlight On The Total Economic Impact Of A Virtual Cloud Network
sponsored by VMware Velocloud
RESEARCH CONTENT: To understand the benefits, costs, and risks associated with investing in a Virtual Cloud Network, delivered on NSX technology, as a way to bridge your network to the cloud, Forrester Research interviewed 5 VMware NSX customers. Explore Forrester's findings to learn about real life customers' experiences as they modernized their WAN for the cloud.
Posted: 18 Jan 2019 | Published: 31 May 2018

TOPICS: 
VMware Velocloud

Computer Weekly – 22 January 2019: Moving beyond network boundaries
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.
Posted: 18 Jan 2019 | Published: 18 Jan 2019

TOPICS: 
ComputerWeekly.com

How Neustar SiteProtect NG Safeguards its Customers
sponsored by Neustar
VIDEO: In this video, hear from 6 Security and Network professionals on how their leading businesses were able to mitigate DDoS attacks using Neustar SiteProtect NG.
Posted: 18 Jan 2019 | Premiered: 16 Jan 2019

TOPICS: 
Neustar

Securing Applications in the Cloud
sponsored by Cloudflare
WHITE PAPER: In this white paper, explore a network security tool designed to help you remain secure and 'always-on' by providing intelligent security at scale, and layered defenses to protect against DDoS, data theft and malicious bots.
Posted: 18 Jan 2019 | Published: 18 Jan 2019

TOPICS: 
Cloudflare

How Permanent TSB Protects its Online Banking System from DDoS Attacks
sponsored by Neustar
VIDEO: Permanent TSB, the third largest Irish provider of personal retail banking services in Ireland, needed to protect their online banking services from harmful DDoS attacks. Read one to find out they accomplished DDoS security.
Posted: 18 Jan 2019 | Premiered: 18 Jan 2019

TOPICS: 
Neustar

Assessing the Cyberthreat Landscape: Today's Reality, Tomorrow's Risks
sponsored by Neustar
RESEARCH CONTENT: The ever-changing cyberthreat landscape requires constant assessment. IT leaders must not only prioritize the many cyberthreats they face, but also use those insights to formulate and implement an appropriate mitigation strategy. Download this report sponsored by IDG to learn more about the cyberthreat landscape.
Posted: 17 Jan 2019 | Published: 17 Jan 2019

TOPICS: 
Neustar
76 - 100 of 1179 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement