IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
76 - 100 of 1494 Matches Previous Page  |  Next Page
Best Practices for Effective Remote Working
sponsored by Orange Business Services
EBOOK: Gartner reports that 41% of employees are likely to work remotely at least some of the time post-coronavirus. This means that organizations are going to have to make their remote strategies work for the long-term as well as the short. Browse this e-book for tips on collaboration and ways to effectively deploy remote access technology.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Orange Business Services

Simple, Secure Networking with SD-WAN
sponsored by Verizon
WEBCAST: Digital transformation has changed from a ‘down-the-road’ initiative to an action item. With the changing application landscape and increase in cloud connectivity, organizations need to become more adaptable – and fast. View this webcast on how SD-WAN can galvanize transformation by amplifying network performance and security.
Posted: 23 Jul 2020 | Premiered: Jul 23, 2020

Verizon

Protecting the Enterprise Edge - Cloud
sponsored by Forcepoint
PRODUCT OVERVIEW: Traditional, on-premise gateways are no longer viable for organizations undergoing digital transformations. Today’s cloud-embracing organizations requires security that can address the emerging risk areas and ensure the protection of users, regardless of physical location. Read this solution brief so learn about how Forcepoint may be able to help.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Forcepoint

The Road to Digital Transformation: Enabling OT-IT Convergence
sponsored by Orange Business Services
WHITE PAPER: This IDC InfoBrief, The Road to Digital Transformation: Enabling OT-IT Convergence, provides an in-depth look at the obstacles and opportunities as they relate to embracing digital transformation through operational technology (OT) and information technology (IT) convergence. Read on to leverage IDC’s expert guidance.
Posted: 22 Jul 2020 | Published: 31 May 2020

Orange Business Services

The Definitive Guide to Data Protection
sponsored by Forcepoint
RESOURCE: It’s estimated that 90% of the world’s data was created in only two years. To compound this, the proliferation of mobile devices and remote employees means that data is stored and accessed in more places, by more people—at any time.To sum up, today’s data is equally as vulnerable as it is accessible. To learn how to protect it, read this guide.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Forcepoint

Be Resilient at All Times: 5 Strategies Forward
sponsored by Orange Business Services
EBOOK: At this point, hearing that organizations need to ‘adapt to the new normal’ is akin to listening to the same song on repeat for a couple of hours, but while many changes have been made in recent months, there doesn’t appear to be an end in sight. Businesses must remain resilient to survive, so read these 5 strategies for pushing forward.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Orange Business Services

Reaching Beyond The Perimeter: A Deep Dive into Mimecast’s Email Security 3.0 Strategy
sponsored by Mimecast
WHITE PAPER: Cybercriminals are at the peak of their powers. They’ve developed specialized tools to dig right into the hearts of businesses and leave without a trace. Email is at the center of this, with 60% of all email sent to organizations being spam or malicious. How does your organization plan to defend? Read this white paper for ideas on strategy.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Mimecast

Securing Assets Using Micro-Segmentation: A SANS Review of Guardicore Centra™
sponsored by Guardicore
ANALYST REPORT: With the increasing complexity and interconnectivity of organizational environments, IT professionals are left to wonder how to prevent the threat of network attacks. Enter microsegmentation: a network security architecture that laterally moves unapproved connections. Fewer permissions, less vulnerability. Dive into this SANS report to learn more.
Posted: 22 Jul 2020 | Published: 30 Jun 2020

Guardicore

Endpoint Security: A White Paper
sponsored by Orange Business Services
WHITE PAPER: With endpoints under constant threat from phishing, malware, spyware and viruses, IT departments must consider how they are protecting their employees’ devices. Browse this white paper for a look at how to effectively monitor endpoints as well as the challenges involved in choosing, deploying and managing an endpoint monitoring capability.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Orange Business Services

Unpacking Research on Employee Security Awareness
sponsored by Mimecast
WEBCAST: The numbers are in: Information alone does not change people’s minds. Organizations will attempt to mold their employees into security encyclopedias, but without proper behavioral analysis, no amount of training will do what is desired.Immerse yourself in this webcast, which unpacks Forrester research and gets to the bottom of security awareness.
Posted: 21 Jul 2020 | Premiered: Jul 21, 2020

Mimecast

Web Security Technical Deep Dive
sponsored by Mimecast
WHITE PAPER: In this time of uncertainty, cloud and internet-based technologies are under greater threat than ever before. An influx of malware and phishing attacks means that businesses, if not properly protected, are in jeopardy. Read this technical deep dive to learn what you can do to ramp up web security.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Mimecast

Lessons in Threat Detection
sponsored by Orange Business Services
WHITE PAPER: The UK’s 2018 Cyber Security Breaches Survey found that 43% of businesses had experienced a cybersecurity breach in the last 12 months.With threats on the horizon, some businesses have decided that the best way to learn about their security is to hack… themselves?Jump into this white paper to see what one organization learned from doing so.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Orange Business Services

Why Your Hybrid Cloud Needs High Performance Application Delivery
sponsored by Citrix
RESOURCE: Digital workspaces have expanded beyond the traditional corporate network creating complexity for IT. Basic load balancing alone no longer ensures applications will work without disruption. In this infographic, learn how you can take application performance and delivery to the next level with the help of Citrix ADC in AWS Marketplace.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Citrix

Achieve Application Experience and Operational Consistency
sponsored by Citrix
WHITE PAPER: Today, users expect the applications they rely on every day to function without error, and deliver the information they need on demand, around the clock wherever they are. In this white paper, learn how Citrix ADC on AWS can help deliver optimal application experience, performance, and availability.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Citrix

The Business Case for Cysiv SOC-as-a-Service
sponsored by Cysiv
WHITE PAPER: Like most modern technology purchases, organizations interested in investing in a security operations center (SOC) can decide between an on-premise SOC or SOC-as-a-Service, depending on their organization’s specific needs. Download this white paper to discover the benefits of the SOC-as-a-Service model by looking at Cysiv’s SOC-aaS offering.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Cysiv

Cyber Resilience for Email
sponsored by Mimecast
WHITE PAPER: Did you know that 91% of all cyberattacks start with an email?In the world today, businesses are struggling to keep up with hackers. They need an approach that provides holistic protection, is adaptable and durable, and allows them to recover their data in the event of an attack.Read this white paper for a close look at one such approach.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Mimecast

Modern Networking for the Borderless Enterprise
sponsored by Infoblox
WHITE PAPER: In this white paper, learn how moving the management plane for DDI from the appliance to the cloud can help you centrally manage your borderless enterprise with far greater elasticity, reliability, security and automation.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Infoblox

Faster Threat Detection and Response with Data Science and Next-gen SIEM
sponsored by Cysiv
WHITE PAPER: Download this white paper for a closer look at Cysiv’s data science-driven approach to more quickly, effectively and efficiently investigate cyber threats within their next-gen security information and event management (SIEM) platform.
Posted: 17 Jul 2020 | Published: 22 Apr 2020

Cysiv

5 steps to secure the enterprise and be fit for a flexible future
sponsored by Avanade
WHITE PAPER: From drastic shifts in remote capabilities to exacerbated security risks, COVID-19 has completely changed the cybersecurity landscape. The most effective way to approach securing your enterprise in the ‘new normal’ is to rethink cybersecurity strategies and challenges. Download this Avanade strategy guide to help guide your restructuring.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

Avanade

Why Does Cybersecurity Training Fail?
sponsored by Mimecast
WHITE PAPER: The Verizon 2018 Data Breach Investigations Report found that email attacks were the cause of 96% of data breach incidents. Despite this, 34% of employees don’t see the importance of security measures.The verdict is in: Cybersecurity training fails. Why? What can you do to fix it?Dive into this white paper to learn how to solve this major problem.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

Mimecast

Does Your MSP Provide Zero Trust Security?
sponsored by ThreatLocker
RESOURCE: Zero trust security has been discussed greatly in the current ecosystem of evolving threat patterns and the resulting heightened fear of security breaches. Movement away from a traditional ‘wall’ of security towards a multi-layered/faceted approach is the basis of what zero trust provides.Read this blog post on zero trust security to learn more.
Posted: 17 Jul 2020 | Published: 03 Jul 2020

ThreatLocker

The New & Next Normal
sponsored by Poly
WEBCAST: 53.9% of organizations in EMEA report that remote management is the toughest challenge of employees working remote, with security close behind at 52.9%. How have organizations embraced the new normal, and what’s in store for the future? Watch this webcast for an in-depth look at remote work trends and what companies can do to further transform.
Posted: 17 Jul 2020 | Premiered: Jul 17, 2020

Poly

The CISO Speaks: Insights From the Frontlines, Part 2
sponsored by RSA Conference
WEBCAST: Not only is Kuwait’s oil and gas industry critical to its economy—it’s also heavily targeted by global threat actors. In this RSAC Unplugged 2019 Sydney presentation, see how upstream, midstream and downstream companies reached a consensus around common security objectives and a unified governance framework to protect this vital sector.
Posted: 17 Jul 2020 | Premiered: Oct 17, 2019

RSA Conference

Stop Ransomware like REvil with Managed Detection and Response
sponsored by CI Security
WHITE PAPER: Ransomware is the number one cause of loss of business. If you haven’t dealt with it, you are one of the lucky ones. One in five SMBs report they’ve fallen victim to a ransomware attack in the last two years. In this white paper, uncover several best practices to help you manage ransomware risks.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

CI Security

12 Things You Should Do to Stop Ransomware
sponsored by ThreatLocker
WHITE PAPER: To help organizations address some of the commonly overlooked practices (or lack thereof) that can better detect and mitigate ransomware attacks, ThreatLocker compiled a list of practices that highlights 12 things your organization should be doing to stop ransomware attacks. Download now to unlock these 12 necessary practices.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

ThreatLocker
76 - 100 of 1494 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info