IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
76 - 100 of 1193 Matches Previous Page  |  Next Page
Get Secure Access Across Hybrid Environments
sponsored by Cyxtera
CASE STUDY: In this blog post, learn why Verdant Services selected Cyxtera AppGate SDP as a VPN replacement for securing access across their hybrid environments and implementing a Zero-Trust model.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Cyxtera

Business Case for Web Isolation
sponsored by Menlo Security
WHITE PAPER: As cyberattacks increase in frequency and sophistication, customers feel forced to deploy an array of solutions in the hope that a best-of-breed mindset will protect their network. In this white paper, learn how Menlo Security's Isolation Platform can help companies reduce the financial risk of cyberattacks.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Menlo Security

Prepare for Battle: Building an Incident Response Plan
sponsored by Rapid7
EBOOK: Laying a foundation for threat response allows IT organizations and their partners to respond to incidents as effectively and efficiently as possible. Creating and testing an incident response (IR) plan gives you that foundation. In this e-book, explore 4 steps to building and testing a successful IR plan.
Posted: 04 Apr 2019 | Published: 04 Apr 2019

Rapid7

10 Must Knows For Architecting Your Multi-Cloud Security Strategy
sponsored by Trend Micro, Inc.
WHITE PAPER: Security should be an integral part of your cloud strategy. Designing and implementing security controls for your public cloud environment, requires a thorough understanding of the division of responsibilities between the cloud service provider and you as a customer. In this white paper, explore 10 things you should know about multi-cloud security.
Posted: 03 Apr 2019 | Published: 03 Apr 2019

Trend Micro, Inc.

Evaluating Vulnerability Assessment Solutions
sponsored by Rapid7
WHITE PAPER: Exploiting weaknesses to infect systems is a common first step for security attacks and breaches. Finding and fixing these vulnerabilities is a proactive defensive measure essential to any security program. In this white paper, explore 4 essential steps to execute an effective proof of concept for a vulnerability assessment tool.
Posted: 03 Apr 2019 | Published: 03 Apr 2019

Rapid7

The SD-WAN Security Guide
sponsored by Sprint
WHITE PAPER: In this helpful guide, get the facts about SD-WAN and how it can actually play a vital role in protecting your network. Plus, discover 3 ways that managed SD-WAN services can help improve overall network security.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

Sprint

Rethinking Data Security With a Risk-Adaptive Approach
sponsored by Forcepoint
WHITE PAPER: In this white paper, learn how by using dynamic data protection, organizations can solve the fundamental challenges of traditional data loss prevention deployments and more effectively protect sensitive information, including regulated data sources and PII.
Posted: 29 Mar 2019 | Published: 26 Apr 2018

Forcepoint

Thailand's Government Savings Bank
sponsored by comForte AG
CASE STUDY: Thailand's Government Savings Bank (GSB) needed an easy-to-implement solution that would map out sensitive data across a large and highly complex network and render that data unreadable, all without affecting service levels. In this case study, learn how GSB was able to achieve next level security after deploying comforte's Data Protection Suite.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

comForte AG

Detect and Prevent Fraud Before Claims are Paid
sponsored by SAS
WHITE PAPER: Fraud losses represent an increasingly complex and systemic risk that's affecting the profitability of every insurance company. In this white paper, learn how SAS takes an enterprise approach to fraud detection and prevention by delivering software either on-site or via the cloud.
Posted: 27 Mar 2019 | Published: 30 Sep 2018

SAS

MFP Security Guide
sponsored by Kyocera Document Solutions UK
WHITE PAPER: Multi-function printers (MFPs) have become a cybersecurity blind spot within many organizations. This white paper offers practical guidance for IT professionals to harness the built-in security features of leading MFPs and adopt further, enhanced data protection capabilities. Read on to learn more.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Kyocera Document Solutions UK

Automating Malware Investigation at One of the World's Leading Investment Firms
sponsored by Splunk Services UK Ltd
CASE STUDY: Blackstone's Incident Response team used to investigate each malware alert as if a compromise has already occurred. Considering the volume of alerts and the potential for inconsistency in any manual process, Blackstone knew there had to be a better way. In this case study, learn about the benefits that Blackstone saw since deploying Splunk Phantom.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk Services UK Ltd

Drive Security Intelligence With Splunk
sponsored by Splunk Services UK Ltd
CASE STUDY: In this case study, find out why missile systems manufacturer, MBDA Germany chose to deploy Splunk Enterprise and Splunk Enterprise Security when they were in need of a tool that would give them the visibility to identify and investigate threats targeting the organization more effectively.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Splunk Services UK Ltd

The Benefits of Network Visibility for Industrial Automation
sponsored by Forescout
WHITE PAPER: Industrial assets owners have little to no visibility into existing industrial threats and flaws, and therefore no way to anticipate, analyze and respond to incidents. This whitepaper shows how the use of network monitoring technology in manufacturing networks brings tremendous value to both information technology and operational technology teams.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Forescout

Modern Defense in Depth: An Integrated Approach to Better Web Application Security
sponsored by Oracle Dyn
WHITE PAPER: Cyberattacks are still successful. Breaches continue to occur. And each time we ask the same questions: why and how did this happen? Many businesses know the steps they're taking to protect ourselves are clearly inadequate. In this book, learn how an integrated, platform-based approach can help you achieve better web application security.
Posted: 22 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

How Passive Monitoring Can Streamline NERC CIP Compliance
sponsored by Forescout
EBOOK: The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standards are a set of requirements designed to secure the assets required for operating North America's bulk electric system. In this e-book, learn how SilentDefense can help North-American utilities by saving considerable effort and money.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Forescout

A Guide to Simplifying Compliance with NIST SP 800-53 and 800-82
sponsored by Forescout
RESOURCE: NIST Special Publication (SP) 800-53r4 provides a catalog of security controls for federal information systems and organizations and a process for selecting controls to protect operations and organizations. In this resource, explore the provided table which presents NIST SP's security controls applicable to ICS networks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Forescout

Securing the Critical Industrial Infrastructure
sponsored by Splunk Services UK Ltd
WHITE PAPER: Awareness of the impact of a breach in the ICS (Industrial Control Systems) and OT (operational technology) environment has risen considerably. Threats to ICS could have severe impacts on the business and reputation of an organization. In this white paper, learn how cyberattacks are affecting both IT and OT networks, including the risks involved.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Splunk Services UK Ltd

Making the Move to a Cloud Native WAF
sponsored by Oracle Dyn
WHITE PAPER: While many companies rely on appliance-based WAF solutions, the market requirements for web application security are shifting toward an edge security platform approach that combines a variety of protections suited to distributed cloud environments. Read this e-book and discover 5 reasons to consider a cloud-native web application firewall (WAF).
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

Log Management Essentials
sponsored by One Identity
WHITE PAPER: In IT environments, a wide variety of sources generate log messages in many different formats. Whether you are trying to enhance security, improve operations or meet compliance objectives, log data contains valuable information and harnessing that data is critical. In this white paper, learn how to properly implement log management.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

One Identity

How to Forward Log Messages to Splunk From syslog-ng
sponsored by One Identity
WHITE PAPER: Splunk is a popular search and analysis platform. Many users of Splunk have also deployed syslog-ng in their environments to help with tasks like collecting and centralizing log messages from network devices. In this white paper, learn about 5 use cases for syslog-ng and how to get them started.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

One Identity

Building a Cloud Migration Launchpad: 3 Steps for Network and Security Readiness
sponsored by MASERGY
WHITE PAPER: Establishing an IT launchpad for cloud migration can help you significantly accelerate the process. In this white paper, learn 3 crucial steps you can take to help prepare your network for cloud migration.
Posted: 15 Mar 2019 | Published: 15 Mar 2019

MASERGY

Avast Business Secure Web Gateway
sponsored by Avast Business
WEBCAST: It's no secret that users pose one of the biggest threats to business security today – whether it's clicking on suspicious email links or visiting unsafe websites. In this webcast, learn how the new Avast Business Secure Web Gateway protects SMBs from sophisticated web threats while being easily manageable and fully scalable.
Posted: 15 Mar 2019 | Premiered: Mar 4, 2019

Avast Business

Security Analytics Platforms, Q3 2018
sponsored by LogRhythm, Inc.
RESEARCH CONTENT: In Forrester's 30-criteria evaluation of security analytics platform providers, they identified the 13 most significant ones. This report shows how each provider measures up and helps S&R professionals make the right choice.
Posted: 15 Mar 2019 | Published: 21 Sep 2018

LogRhythm, Inc.

Optimizing SIEM
sponsored by One Identity
WHITE PAPER: SIEM solutions form the core of many enterprises' IT Security strategy but they can be expensive to deploy and maintain. Optimizing your SIEM solution can reduce costs and improve performance. In this white paper, learn about the challenges, solutions and benefits of optimizing your SIEM solution.
Posted: 15 Mar 2019 | Published: 15 Mar 2019

One Identity

2018-2019 Global Application & Network Security Report
sponsored by Radware
RESEARCH CONTENT: This 2018-2019 global application & network security report highlights the major themes shaping cybersecurity of late. Explore the report to help your organization keep its finger on the pulse of the rapidly evolving and increasingly dangerous cybersecurity landscape.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

Radware
76 - 100 of 1193 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement