IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
76 - 100 of 1258 Matches Previous Page  |  Next Page
Digital Identity Security Assurance: How to Keep Your Customer Data Secure
sponsored by Akamai Technologies
WHITE PAPER: Customer identities are among the most critical and valuable assets of any organization. Failing to provide adequate security can result in financial, reputational, and even legal consequences. This paper highlights industry best practices for building customer trust through comprehensive security programs. Read on to learn more.
Posted: 23 Dec 2019 | Published: 30 Nov 2019

Akamai Technologies

Intelligent Security Starts at the Edge
sponsored by Akamai Technologies
DATA SHEET: In Gartner’s most recent Magic Quadrant installment for Web Application Firewalls (WAF), they named Akamai a Leader for the third year in a row. This white paper provides an overview of the benefits of WAF, and highlights Akamai’s approach to WAF. Read on to get started.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Akamai Technologies

The Network Firewall Market
sponsored by Checkpoint Software Technologies
ANALYST REPORT: With firewall providers embedding multiple security features in firewalls and enabling integration and automation capabilities with other security products, firewalls are evolving into network security platforms. In this Gartner Magic Quadrant, explore an evaluation of network firewall vendors.
Posted: 23 Dec 2019 | Published: 17 Sep 2019

Checkpoint Software Technologies

What is SD-WAN?
sponsored by Silver Peak
VIDEO: Traffic patterns have changed over the years with the increased movement of apps to the cloud. This has driven the need for a more intelligent software-driven or software-defined model for the WAN. In this video, Derek Granath, Vice President of Product Marketing for Silver Peak, defines what a SD-WAN is.
Posted: 23 Dec 2019 | Premiered: 17 Jun 2019

Silver Peak

The Future of Security Operations
sponsored by IBM
RESOURCE: As technology changes and attack surfaces grow, security teams are forced to think differently. Leverage this resource to learn about the future of security operations and how your team can more effectively operationalize world-class security practices.
Posted: 19 Dec 2019 | Published: 19 Dec 2019

IBM

Report: SD-WAN Vendor Market 2019
sponsored by VeloCloud, now part of VMware
ANALYST REPORT: The SD-WAN market is in the early growth stage of the product lifecycle. Key factors driving market adoption include: cost savings from efficient usage of private and public networks, ability to optimize hybrid cloud/multi-cloud connectivity, and application-aware routing. Read the Frost and Sullivan analyst report to get the full details.
Posted: 17 Dec 2019 | Published: 17 Dec 2019

VeloCloud, now part of VMware

The Evolution of SD-WAN as a Platform
sponsored by VeloCloud, now part of VMware
WEBCAST: SD-WAN has emerged as the enabler of WAN transformation. It has quickly evolved in a few short years from a connectivity infrastructure to a services platform. In this webcast, Steve Woo, senior director of product and co-founder of VeloCloud, shares his insights about the vision and evolution of SD-WAN as a platform.
Posted: 17 Dec 2019 | Premiered: Jun 5, 2019

VeloCloud, now part of VMware

A Computer Weekly buyer's guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

ComputerWeekly.com

Connected Car Security
sponsored by Intertrust
WHITE PAPER: As connected cars grow in popularity due to their convenience, it’s important to note that the increasing number of smart features built into cars opens the network to serious vulnerabilities and threats. This white paper highlights the threats facing connected cars by examining common cyberattack patterns and how to protect against them.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

Intertrust

What to Look for in a Zero Trust Solution in 2020
sponsored by PortSys
WHITE PAPER: The zero-trust approach to access control isn’t a new concept. In fact, it’s been around for nearly 10 years. Although the concept is simple, organizations struggle to understand the most effective ways to implement it. This white paper explores the concept behind zero-trust, why it’s effective, and the primary ways it can be implemented.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

PortSys

What Has 2019 Meant for Wi-Fi and Cellular Networks?
sponsored by 7SIGNAL
WHITE PAPER: Wi-Fi accessibility and services continue to boom as more people around the world are connected to the internet than ever before. Each year brings a new array of advances, issues and trends, and 2019 was no exception. In this white paper, look back at what happened in the world of cellular connectivity and Wi-Fi in 2019.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

7SIGNAL

2019 Mid-Year Global Overview of Live OTT Sports
sponsored by Intertrust
ANALYST REPORT: Until recently, live sports has been a major force in keeping many subscribers tethered to their pay-TV subscription. However, with recent improvements in live streaming technology, sports fans are moving from traditional to online viewing at a steady pace. In this report, learn how OTT sports are evolving around the world.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

Intertrust

Reverse Engineering Still a Serious Problem in 2019
sponsored by Intertrust
WEBCAST: While mobile applications and interconnected devices offer unmatched convenience, they also expose organizations and consumers to cybersecurity risks. This webinar breaks down common mobile application security threats and highlights real-life reverse engineering examples.
Posted: 12 Dec 2019 | Premiered: Nov 8, 2019

Intertrust

The Importance of Cybersecurity for Executives
sponsored by A-Lign
WHITE PAPER: As security threats become increasingly frequent, complex and disruptive, it’s critical for all leaders – not just the CIO, CTI and CISO – of an organization to play a role in ensuring security. In this white paper, explore the importance of cybersecurity for executives by looking at the common types of attacks and how to prevent them.
Posted: 12 Dec 2019 | Published: 12 Dec 2019

A-Lign

The Cybersecurity Guide: Defending from Threats and Preventing Hacks
sponsored by A-Lign
WHITE PAPER: Organizations in every industry and at every size are vulnerable to data breaches or breach incidents. This cybersecurity guide exposes the threats that your organization could be vulnerable to and outlines threat prevention tactics in order to fortify your organization.
Posted: 12 Dec 2019 | Published: 12 Dec 2019

A-Lign

Five Major Bot Threats to E-commerce and How to Stop Them
sponsored by PerimeterX
WHITE PAPER: It’s always important that online retail companies are prepared for any cybersecurity threats to keep both customer and company data secure. Luckily, this white paper highlights 5 major types of attacks companies need to be vigilant of, as well as defensive capabilities for addressing these threats. Read on to make sure your organization is ready.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

PerimeterX

Preparing for a Data Breach: Not If, But When
sponsored by A-Lign
WHITE PAPER: When it comes to preparing for data breaches, companies should think in terms of “when” instead of “if” to ensure cybersecurity preparedness. In this white paper, Petar Besalev, Senior VP of Cybersecurity and Privacy Services at A-Lign, provides an overview of strategies and best-practices to help you prepare for a data breach.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

A-Lign

Avenue Stores Blocks ATO and Scraping with PerimeterX Bot Defender
sponsored by PerimeterX
CASE STUDY: In this case study, discover how Avenue Stores, a leader in plus size fashion, collaborated with PerimeterX to address malicious bot activity they were experiencing including ATO, web scraping, and card fraud.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

PerimeterX

Decluttering Your Security Environment
sponsored by Mimecast
WHITE PAPER: While it’s natural to think that the solution to increased security risk is incorporating more technology, overcomplicating your environment with tools – and not the right personnel – can lead to increased risk. In this white paper, leverage expertise from a recent think tank for advice on how to address cybersecurity complexity.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

Mimecast

5G, AI, Deepfakes and Beyond: The Future of IT and Security
sponsored by Splunk
WHITE PAPER: The past few years has seen the emergence of several innovative technologies and increased sophistication of attacks – both of which shape the way business is done. In this report, explore the cybersecurity trends and threats to keep in mind for 2020 and beyond.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Splunk

Protecting from Bot Attacks with PerimeterX
sponsored by PerimeterX
VIDEO: In this customer success story, Build.com shares how PerimeterX Bot Defender protects their online storefront from advanced bot attacks in the wake of a series of cyberattacks. Watch the video to learn more.
Posted: 10 Dec 2019 | Premiered: 03 Jan 2020

PerimeterX

Modernize Your Network with Red Hat Ansible Automation Platform
sponsored by Red Hat
WHITE PAPER: Network automation is critical for supporting the increasing application and workload needs of modern, digital business. It allows NetOps teams to rapidly configure, scale, secure, and integrate network infrastructure and application services. In this white paper, learn more about automation.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Red Hat

Splunk IT Security Predictions 2020
sponsored by Splunk
WHITE PAPER: Technology continues to redesign every aspect of how we live and work. It also creates new security vulnerabilities that savvy attackers are exposing. Being aware of the potential threats allows individuals and organizations to protect their data. In this white paper, uncover some of the most pertinent security considerations for 2020.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Splunk

Automate Your Network with Red Hat
sponsored by Red Hat
WHITE PAPER: With network automation, network operations teams can quickly respond to dynamic, ever-changing workload requirements for flexible capacity, application security, load balancing, and multi-cloud integrations. In this white paper, learn how to get started with common network automation tasks using Red Hat.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Red Hat

WAN Edge Infrastructure
sponsored by Silver Peak
ANALYST REPORT: WAN Edge Infrastructure now incorporates a broader set of network functions, including traditional routing, security, SD-WAN, and WAN optimization. In this Gartner Magic Quadrant, explore an evaluation of platforms available for the WAN edge and key insights into the Leaders, Challengers, Visionaries and Niche players.
Posted: 09 Dec 2019 | Published: 26 Nov 2019

Silver Peak
76 - 100 of 1258 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info