IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
76 - 100 of 1176 Matches Previous Page  |  Next Page
Top IT predictions in APAC: 2021
sponsored by ComputerWeekly.com
EGUIDE: Going by the predictions fleshed out by technology suppliers and analysts, the Asia-Pacific region will continue to be a cradle for technology innovation, whether it is 5G services, artificial intelligence (AI), cloud computing or cyber security. In this infographic, we review some of the key IT trends that are likely to shape the industry in 2021.
Posted: 14 Jan 2021 | Published: 15 Jan 2021

ComputerWeekly.com

A Computer Weekly Buyers Guide to 5G
sponsored by ComputerWeekly.com
EDITORIAL RESOURCE GUIDE: Despite the fears of many that rollouts of the next generation infrastructure would be delayed or just not be possible due mainly to the adverse economic conditions caused by Covid-19, the prospects are actually quite bright for the 5G industry in 2021.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

ComputerWeekly.com

Iot Platform Leader Armis Eliminates Dependency On Vpn Technology, Adopts Axis Zero Trust Solution
sponsored by Axis Security
CASE STUDY: Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Axis Security

Axis Security Video
sponsored by Axis Security
VIDEO: VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.
Posted: 11 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

The 10 Tenets Of An Effective Sase Solution
sponsored by Palo Alto Networks
WHITE PAPER: This e-book guides you through the top 10 requirements to keep in mind as you look for an effective SASE offering. Download it now to learn about Zero Trust network access, quality of service (QoS), DNS security, and threat prevention.
Posted: 07 Jan 2021 | Published: 07 Jan 2021

Palo Alto Networks

MicroScope – January 2021: Looking forward to the future
sponsored by MicroScope
EZINE: In this issue of MicroScope, take a look at what the year ahead holds for the channel after a largely positive 2020. Also discover why IAM technology is so important for post-pandemic cloud computing, and what approaches are fundamental to finding business success
Posted: 05 Jan 2021 | Published: 08 Jan 2021

MicroScope

Blackberry Cyber Suite
sponsored by BlackBerry
PRODUCT OVERVIEW: In the era of remote work, balancing productivity while adhering to Zero Trust best practices has become difficult. What organizations need is a set of security controls that offer Zero Trust while maintaining a minimally invasive user experience. Read on to learn how BlackBerry is addressing these issues.
Posted: 29 Dec 2020 | Published: 29 Dec 2020

BlackBerry

Barracuda CloudGen Access
sponsored by Barracuda
DATA SHEET: Remote work is here to stay, and cloud migrations are accelerating. This level of risk means organizations must leverage secure access, verifying that only the right people with the right devices and the right permissions have access to company data, apps & infrastructure. In this data sheet, examine Barracuda’s CloudGen Access, a zero-trust tool.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

Barracuda

Barracuda CloudGen WAN for Azure
sponsored by Barracuda
DATA SHEET: Today’s organizations need fast, reliable network performance to provide an office-like user experience to their distributed workforces. Now, these organizations have the power to leverage secure, cloud-scalable SD-WAN deployed directly from Microsoft’s Azure Marketplace. Download this data sheet to learn about CloudGen WAN for Azure.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

Barracuda

5 steps to secure home devices & improve productivity for remote work
sponsored by Barracuda
WHITE PAPER: Due to the pandemic, remote work became an essential part of a modern enterprise. But for remote work and employees to thrive, they need fast and secure access to data. Read on to discover 5 steps organizations can take to further secure their remote workers, without sacrificing productivity.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

CYBERSECURITY REPORT CARD 2020 Organizations Rate Their Security Posture and Put Assumptions to the Test
sponsored by DomainTools
RESEARCH CONTENT: The past year has been extremely stressful for cybersecurity professionals – having to shift and enable a massive population of remote workers while dealing with the growing volume and severity of emerging cyberthreats. Read on to discover the results of the Cybersecurity Report Card Survey, where organizations rate how they handled 2020.
Posted: 18 Dec 2020 | Published: 18 Dec 2020

DomainTools

What is a Secure Remote Worker?
sponsored by Capcon Networks
VIDEO: Many are now working from home, but that doesn’t necessarily make them ‘remote’. To call an employee ‘remote’ would require them to have all the tools they need – namely, access to all their apps, in both private and public clouds, on any device, without sacrifice of performance or security. Watch this 2-minute video for more details.
Posted: 15 Dec 2020 | Premiered: 27 Nov 2020

Capcon Networks

Can a SASE architecture deliver better network performance?
sponsored by SearchNetworking.com
EGUIDE: Secure Access Service Edge (SASE) is a cloud-based platform that provides networking capabilities and security functionality directly to endpoints that connect to the platform. In this guide, explore how the limitations of traditional networking led the industry to SASE.
Posted: 15 Dec 2020 | Published: 15 Dec 2020

SearchNetworking.com

Is the SD-WAN home office here to stay?
sponsored by SearchNetworking.com
EGUIDE: While VPN strategies are adequate in many cases, they can't provide the extra level of control, security and management that some companies require for networks that now include home offices. As a result, some organizations have deployed SD-WAN to business-critical home offices. In this e-guide, learn more about SD-WAN home offices.
Posted: 15 Dec 2020 | Published: 15 Dec 2020

SearchNetworking.com

Agentless EDR For Unmanaged Devices
sponsored by Armis
PRODUCT OVERVIEW: As the number of organizations within an environment grows, security teams need a way to identify, manage and secure them. Read this solution brief for a closer look at Armis’ agentless endpoint detection and response (EDR) platform, which provides the visibility, compliance and security requirements needed to address this initiative.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

Armis

Computer Weekly – 15 December 2020: How security will be different after Covid-19
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
Posted: 14 Dec 2020 | Published: 15 Dec 2020

ComputerWeekly.com

Zero Trust Security for Unmanaged Devices
sponsored by Armis
WHITE PAPER: The zero-trust security model has become a mainstay of security approaches. This white paper explores how to apply this security model to the exploding world of unmanaged devices. From webcams, printers, and building automation systems to industrial control systems and critical medical devices, learn about the evolving applications of zero trust.
Posted: 11 Dec 2020 | Published: 11 Dec 2020

Armis

2021 IT Priorities: APAC report
sponsored by ComputerWeekly.com
EGUIDE: Inside this report, get the complete analysis of the 2021 IT Priorities survey results, as well as insights into enterprises in the region that are accelerating their digital investments to not only survive but thrive in a post-pandemic world.
Posted: 09 Dec 2020 | Published: 10 Dec 2020

ComputerWeekly.com

Render Zero-Day Attacks Useless on Your Network
sponsored by Atakama
RESOURCE: Zero-day attacks are becoming more and more common, exploiting a vulnerability that is either unknown to or undisclosed by the target organization. Read this white paper to learn more about how zero-day attacks operate and how your organization can render them useless.
Posted: 09 Dec 2020 | Published: 30 Apr 2020

Atakama

8 Top Cybersecurity Challenges
sponsored by IronNet
EBOOK: Working with leading companies across various sectors, IronNet has identified the shared security pain points of organizations. By studying this e-book, you can learn 8 of the top cybersecurity challenges faced today, and, you can understand how network detection and response (NDR) can help to mitigate some of these challenges.
Posted: 09 Dec 2020 | Published: 09 Dec 2020

IronNet

What to include in an SD-WAN security checklist
sponsored by Silver Peak
EGUIDE: SD-WAN technology can improve WAN security in a variety of ways. Simply migrating to a viable SD-WAN offering brings some benefits. But SD-WAN tools also provide security features to protect the traffic they manage. In this e-guide, learn what you should include in your SD-WAN security checklist.
Posted: 09 Dec 2020 | Published: 07 Dec 2020

Silver Peak

Cloud Enablement
sponsored by Atakama
CASE STUDY: Organizations with initiatives for cloud migrations have had to take additional precautions in order to achieve their plans in the era of COVID-19. Read this case study to see how an organization partnered with Atakama to ensure security as they migrated towards the cloud.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Atakama

SecurDPS Discover and Classify
sponsored by Comforte AG
PRODUCT OVERVIEW: Data is becoming a highly valuable resource. As such, organizations are taking meticulous precautions in order to safeguard their data against attacks. This solution brief introduces SecurDPS Discover and Classify, designed to automate data discovery and classification to enhance network and data usage visibility – read on to learn more.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Comforte AG

Eliminate the Threat of Exfiltrative, Extortive Ransomware
sponsored by Atakama
RESOURCE: Maze ransomware involves developers and ‘affiliates’ leveraging ransomware-as-a-services technology to actually scale ransomware attacks. It first appeared in May 2019, and with ransomware damage costs projected to reach $20 billion by 2021, the time to invest in ransomware defense is now. Browse this article to see how Atakama can help.
Posted: 07 Dec 2020 | Published: 08 Jul 2020

Atakama

Network Performance Issues are IT Pain Point Amid COVID-19
sponsored by NetAlly
EGUIDE: Reliable home network performance is a top issue IT teams have dealt with amid the COVID-19 pandemic. With almost entire workforces working from disparate locations, remote networks are nearly impossible to monitor and manage. In this e-guide, learn how home network performance issues can relate to other IT problems.
Posted: 23 Dec 2020 | Published: 18 Dec 2020

NetAlly
76 - 100 of 1176 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences