IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
76 - 100 of 1528 Matches Previous Page  |  Next Page
Can a SASE Architecture Deliver Better Network Performance?
sponsored by SearchNetworking.com
EGUIDE: SASE is a cloud-based platform that provides networking capabilities and security functionality directly to endpoints that connect to the platform. In this guide, explore how the limitations of traditional networking led the industry to SASE, as well as how SASE architecture differs from traditional networking and security strategies.
Posted: 15 Dec 2020 | Published: 15 Dec 2020

SearchNetworking.com

Is the SD-WAN Home Office Here to Stay?
sponsored by SearchNetworking.com
EGUIDE: While VPN strategies are adequate in many cases, they can't provide the extra level of control, security and management that some companies require for networks that now include home offices. As a result, some organizations have deployed SD-WAN to business-critical home offices. In this e-guide, learn more about SD-WAN home offices.
Posted: 15 Dec 2020 | Published: 15 Dec 2020

SearchNetworking.com

Managed Connectivity for Remote Workers
sponsored by Capcon Networks
VIDEO: Managed connectivity can help organizations manage not only connectivity and telecom services, but it can also help them design a network that is going to deliver performance and bandwidth at a price point that is economically feasible. To learn more about managed connectivity from Capcon Networks, watch this short video.
Posted: 15 Dec 2020 | Premiered: 15 Dec 2020

Capcon Networks

Sophos Incident Response Guide
sponsored by Sophos
WHITE PAPER: Preparation is the best way to avoid letting a cyberattack turn into a full breach. After a breach, organizations often realize they could have avoided a lot of cost, pain and disruption if they’d had an effective incident response plan in place. Download this white paper to learn 10 steps for creating such a plan and keep attacks from evolving.
Posted: 14 Dec 2020 | Published: 09 Oct 2020

Sophos

Deliver Workspace Security & Zero Trust With Citrix + Google Cloud
sponsored by Citrix
PRODUCT OVERVIEW: 2020 was a prime example of the need for flexible, secure remote working capabilities. Citrix and Google have been innovating in this space for decades – read this solution brief to learn more about their workspace security and zero trust offering.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

Citrix

Agentless EDR For Unmanaged Devices
sponsored by Armis
PRODUCT OVERVIEW: As the number of organizations within an environment grows, security teams need a way to identify, manage and secure them. Read this solution brief for a closer look at Armis’ agentless endpoint detection and response (EDR) platform, which provides the visibility, compliance and security requirements needed to address this initiative.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

Armis

The Big Challenges of Networking for Remote Workforces
sponsored by Capcon Networks
VIDEO: Today, organizations are seeing a tremendous growth in the size and complexity of the network. This is primarily being driven by a few factors, which include the number of devices being used, cloud applications, remote workers, and more. Download this brief video to learn more about these challenges.
Posted: 14 Dec 2020 | Premiered: 14 Dec 2020

Capcon Networks

Computer Weekly – 15 December 2020: How security will be different after Covid-19
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
Posted: 14 Dec 2020 | Published: 15 Dec 2020

ComputerWeekly.com

Zero-Trust Security for Unmanaged Devices
sponsored by Armis
WHITE PAPER: The zero-trust security model has become a mainstay of security approaches. This white paper explores how to apply this security model to the exploding world of unmanaged devices. From webcams, printers, and building automation systems to industrial control systems and critical medical devices, learn about the evolving applications of zero trust.
Posted: 11 Dec 2020 | Published: 11 Dec 2020

Armis

Security: Creating Trust in a Zero-Trust World
sponsored by OpenText
WHITE PAPER: With more sophisticated hackers on the rise, new technologies and data formats, and a plethora of regulations, how will the enterprise manage all of its data, secure it and ensure that it’s compliant? Download this white paper to learn how a zero-trust security model could lay the foundation for the future of security.
Posted: 10 Dec 2020 | Published: 10 Dec 2020

OpenText

2021 IT Priorities: APAC report
sponsored by ComputerWeekly.com
EGUIDE: Inside this report, get the complete analysis of the 2021 IT Priorities survey results, as well as insights into enterprises in the region that are accelerating their digital investments to not only survive but thrive in a post-pandemic world.
Posted: 09 Dec 2020 | Published: 10 Dec 2020

ComputerWeekly.com

Steps to Shift to Proactive Cyber Security
sponsored by McAfee
VIDEO: In today’s risky environment, organizations need to know if they’re adequately protected from threats in real-time. Enter proactive endpoint security. Its advanced technology lets you know if you’re protected before threats arrive. Immerse yourself in this 15-minute video to see proactive endpoint security in action!
Posted: 09 Dec 2020 | Premiered: 19 Aug 2020

McAfee

Render Zero-Day Attacks Useless on Your Network
sponsored by Atakama
RESOURCE: Zero-day attacks are becoming more and more common, exploiting a vulnerability that is either unknown to or undisclosed by the target organization. Read this white paper to learn more about how zero-day attacks operate and how your organization can render them useless.
Posted: 09 Dec 2020 | Published: 30 Apr 2020

Atakama

ESG White Paper Reimagining Endpoint Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: New cyberthreats, cloud migrations, digital transformations, and the rise of the remote workforce has had a profound impact on the endpoint security landscape. The following ESG article from Cisco dives deeper into these changes and provides an overview of Cisco’s modern endpoint security platform – read on to get started.
Posted: 09 Dec 2020 | Published: 30 Jun 2020

Cisco Systems, Inc.

What to Include in an SD-WAN Security Checklist
sponsored by Silver Peak
EGUIDE: SD-WAN technology can improve WAN security in a variety of ways. Simply migrating to a viable SD-WAN offering brings some benefits. But SD-WAN tools also provide security features to protect the traffic they manage. In this e-guide, learn what you should include in your SD-WAN security checklist.
Posted: 09 Dec 2020 | Published: 07 Dec 2020

Silver Peak

Turkish Airlines Takes Security To New Heights With Cisco AMP & Umbrella
sponsored by Cisco Systems, Inc.
CASE STUDY: In this case study, follow Turkish Airlines as they partner with Cisco in order to establish effective threat hunting and incident response capabilities to better protect their data and customers against advanced malware threats, like ransomware.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Cisco Systems, Inc.

3 Ways To Align Your SecOps & Business Priorities With Cisco Endpoint Security
sponsored by Cisco Systems, Inc.
RESOURCE: Security operations leaders are constantly looking for ways to boost their security capabilities while also meeting business and operational objectives. This article highlights 3 ways organizations can meet both business and security goals with endpoint security from Cisco – read on to learn more.
Posted: 08 Dec 2020 | Published: 09 Nov 2020

Cisco Systems, Inc.

Securing the Enterprise with 360° Visibility: Don’t Leave a Gap in Defenses
sponsored by OpenText
WHITE PAPER: Organizations fight cyberthreats every day, and with more at stake than ever before, including customer data, intellectual property and company reputations, one successful attack can mean game over. This white paper demonstrates why organizations need total visibility and how endpoint detection & response (EDR) can help them achieve it.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

OpenText

Cloud Enablement
sponsored by Atakama
CASE STUDY: Organizations with initiatives for cloud migrations have had to take additional precautions in order to achieve their plans in the era of COVID-19. Read this case study to see how an organization partnered with Atakama to ensure security as they migrated towards the cloud.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Atakama

SecurDPS Discover and Classify
sponsored by Comforte AG
PRODUCT OVERVIEW: Data is becoming a highly valuable resource. As such, organizations are taking meticulous precautions in order to safeguard their data against attacks. This solution brief introduces SecurDPS Discover and Classify, designed to automate data discovery and classification to enhance network and data usage visibility – read on to learn more.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Comforte AG

Eliminate the Threat of Exfiltrative, Extortive Ransomware
sponsored by Atakama
RESOURCE: Maze ransomware involves developers and ‘affiliates’ leveraging ransomware-as-a-services technology to actually scale ransomware attacks. It first appeared in May 2019, and with ransomware damage costs projected to reach $20 billion by 2021, the time to invest in ransomware defense is now. Browse this article to see how Atakama can help.
Posted: 07 Dec 2020 | Published: 08 Jul 2020

Atakama

Have You Outgrown Your Traditional Secure Web Gateway?
sponsored by Cisco Umbrella
EBOOK: Secure web gateways (SWGs) are deployed at most organizations – however, a vast majority of users (>90%) are unsatisfied with their current SWG solution. This e-book provides a closer look at the shortcomings of traditional SWG tools and explores the features and capabilities of Cisco’s modern, cloud-based SWG – read on to learn more.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Cisco Umbrella

One of the U.K.’s Largest Public Healthcare Organizations Opts in for Cisco’s Integrated Security Approach
sponsored by Cisco Systems, Inc.
CASE STUDY: One of the largest public healthcare organizations in the UK had a few challenges to tangle with: Their traditional endpoint security was ineffective, they lacked the ability to proactively hunt for threats and they were concerned with patient data privacy. How did they overcome these challenges? This case study shows how Cisco was able to help.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Cisco Systems, Inc.

Data Security Predictions 2021
sponsored by Splunk
WHITE PAPER: The pandemic of 2020 created unprecedented challenges for IT security teams and initiatives. This 23-page report provides a closer look at how the Coronavirus has shaped cybersecurity and explores key data security predictions for 2021. Read on to get started.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Splunk

5 Tips for Transforming Your Endpoint Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Organizations that are digitally transforming and moving to the cloud are expanding their attack surface, and as a result, they need to ensure the effectiveness of their endpoint security. What steps can you take to keep your endpoints uncompromised? Browse this Cisco white paper to examine 5 tips for transforming endpoint security.
Posted: 07 Dec 2020 | Published: 30 Sep 2020

Cisco Systems, Inc.
76 - 100 of 1528 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info