IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
76 - 100 of 1627 Matches Previous Page  |  Next Page
Optimizing Endpoint Security for the Enterprise
sponsored by ConvergeOne
EGUIDE: Given the diversity of devices, combined with the wide assortment of users that now connect to an enterprise network, securing endpoints is extremely challenging. Explore this expert e-guide to gain insight into optimizing endpoint security strategies to protect networks and data from attacks.
Posted: 14 Mar 2018 | Published: 12 Mar 2018

ConvergeOne

10 Capabilities to Look For in an MDR Solution
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: Multiple point products and defense-in-depth strategies are no longer sufficient to protect companies that operate in today's cyberspace. Learn 10 capabilities to look for in a managed detection and response (MDR) service to help you stay protected in today's evolving threat landscape.
Posted: 14 Mar 2018 | Published: 14 Mar 2018

Arctic Wolf Networks, Inc.

Enterprise Organizations Need a Closed-loop Security Architecture
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Find out how a "closed-loop" network security strategy can help increase real-time network visibility, tighten access controls and enhance advanced attack detection so your enterprise can move forward with your digital transformation initiatives.
Posted: 13 Mar 2018 | Published: 31 Jan 2018

Hewlett Packard Enterprise

Equifax Exposed Two Massive Systemic Risks
sponsored by Flexera Software
RESEARCH CONTENT: In today's digital economy, companies use individuals' data without always properly protecting this sensitive information. Explore this report to gain insight into 2 issues that lead to the Equifax breach and uncover how to protect sensitive data.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

Flexera Software

3 Methods for Multi-Fiber Testing
sponsored by Leviton
WHITE PAPER: Multi-fiber installation and testing best practices will be critical to maintaining a competitive edge as network migration strategies evolve. In this white paper, learn 3 types of multi-fiber testing to prepare your network for facilitating 40/100G migrations.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

Leviton

Magnify Traffic Visibility for Security in VMware Networks
sponsored by APCON, Inc.
RESOURCE: Learn how to coordinate and architect network traffic monitoring in a VMware environment to improve security.
Posted: 12 Mar 2018 | Published: 29 Dec 2017

APCON, Inc.

Magic Quadrant for Intrusion Detection and Prevention Systems
sponsored by Alert Logic
RESEARCH CONTENT: Did you know by 2020, 70% of new stand-alone intrusion detection and prevention systems (IDPS) placements will be cloud-based? Inside this Gartner Magic Quadrant Report, uncover the pros and cons of IDPS providers like Hillstone Networks, Alert Logic, Cisco and more to help you choose the right network security solution to meet your business need.
Posted: 12 Mar 2018 | Published: 10 Jan 2018

Alert Logic

Enhance Security with Virtual Traffic Monitoring
sponsored by APCON, Inc.
RESOURCE: In this resource, learn from Jeremy Castile, Product Marketing Manager at APCON about how to meet network traffic monitoring and security needs in a cloud-based architecture.
Posted: 12 Mar 2018 | Published: 27 Nov 2017

APCON, Inc.

Mitigating the SSL/TLS Cybersecurity Threat
sponsored by Radware
WHITE PAPER: 75% of web traffic will be encrypted by 2019, according to NSS Labs. Utilize this e-book to learn how to combat the growing number of complex encrypted web attacks as well as mitigate SSL/TLS cybersecurity threats.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

Radware

IntellaTap-VM Use Cases: How to Maintain Security and Visibility
sponsored by APCON, Inc.
RESOURCE: In this resource, learn about IntellaTap-VM to help you close network visibility gaps and optimize your existing virtual network security infrastructure.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

APCON, Inc.

How to Successfully Monitor and Manage Network Traffic in VMware Environments
sponsored by APCON, Inc.
WHITE PAPER: Today, virtualization has created a challenge for maintaining network monitoring capabilities. This white paper introduces how packet brokers can help analyze traffic from multiple network links and then deliver relevant data to your already existing network security platforms.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

APCON, Inc.

The Honeypot Project
sponsored by Armor
WHITE PAPER: As the cloud gains momentum, protecting sensitive data no longer means simply safeguarding on-premises infrastructure. Take a look at this resource to uncover the results from a real-world demonstration that shows the types of attacks targeting public cloud environments for small and midsized businesses.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

Armor

DreamWorks Animation Case Study: Securing the Print Environment and the Internal Network
sponsored by HP
CASE STUDY: An attacker needs just one misconfigured or unpatched printer to attempt to pivot into the rest of a network environment. Explore this case study to gain insight into how DreamWorks was able to enable printing options without creating security vulnerabilities.
Posted: 08 Mar 2018 | Published: 08 Mar 2018

HP

Empowering Security & Overcoming Virtual Network Blind Spots
sponsored by APCON, Inc.
RESOURCE: According to an Accenture survey, 95% of respondents believe all network services will be virtualized in the very near future. As more networks become virtualized, a visibility gap occurs. Explore this resource to learn how to bridge the visibility gap between physical and virtual data centers.
Posted: 08 Mar 2018 | Published: 08 Mar 2018

APCON, Inc.

Do You Know Where Your VMware Traffic Is?
sponsored by APCON, Inc.
RESOURCE: Access this resource to learn about IntellaTap-VM, a virtual network monitoring solution that's designed to magnify visibility of VMware network traffic and forward any suspicious activity to your existing security tools.
Posted: 08 Mar 2018 | Published: 08 Mar 2018

APCON, Inc.

Magic Quadrant for SIEM
sponsored by IBM
RESEARCH CONTENT: Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's security information and event management (SIEM) products as well as a market overview.
Posted: 08 Mar 2018 | Published: 08 Mar 2018

IBM

Vendor Assessment: Print and Document Security
sponsored by HP
RESEARCH CONTENT: This IDC market report assesses HP as a print and document security services provider and their ability to prevent data and device-level security breaches.
Posted: 07 Mar 2018 | Published: 31 Oct 2017

HP

The Future of Cyber Security
sponsored by Oracle
WHITE PAPER: Inside this 11-page white paper, discover how to protect against increasingly sophisticated attacks with artificial intelligence (AI) and machine learning (ML). Learn how these algorithms can help monitor who has access to what resources and encrypt sensitive data.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

Oracle

Safeguarding your Network from Insider Threats
sponsored by APCON, Inc.
WHITE PAPER: Inside, discover how network monitoring is the key player in today's network security strategy for protection against 2 types of insider threats – the bad actor and the negligent employee.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

APCON, Inc.

Top 9 DDoS Threats Your Organization Must be Prepared For
sponsored by Radware
WHITE PAPER: Use this resource to gain a better understanding of the top 9 DDoS threats your organization should prepare for.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

Radware

How a Cloud Phone System Uniquely Supports your Mobile Workforce
sponsored by RingCentral
WHITE PAPER: Inside this white paper, gain valuable insights into how a cloud VoIP phone system provides the capabilities necessary to make the mobile worker an integral part of your business and overcome the challenges of BYOD.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

RingCentral

Orchestrating SDN Flows for Cybersecurity
sponsored by Radware
RESOURCE: Click inside to learn how the orchestration capabilities of SDN could be use to fight, and even prevent DDos attacks in the future.
Posted: 07 Mar 2018 | Published: 24 Jan 2018

Radware

Human to Machines: The Shift in Security Strategy with Machine Learning
sponsored by Oracle
WHITE PAPER: Today's IT security strategy must evolve to focus on internal threats and securing what matters like customer data, financial data and business-critical applications. In this white paper, gain valuable insights into how machine learning brings a new level of sophistication to cybersecurity threat prediction, prevention, detection and response.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

Oracle

The New Age of Microsegmentation
sponsored by Illumio
EGUIDE: Why has a microsegmentation security strategy become so popular? In this e-guide, experts Andrew Froehlich and Dave Shackleford discuss the benefits and drawbacks of microsegmentation and how to get the most of your security approach.
Posted: 06 Mar 2018 | Published: 01 Mar 2018

Illumio

Is Compliance Being Left to Chance?
sponsored by Oracle
WHITE PAPER: Tap into this resource to learn how cloud and AI technologies may hold the key to managing compliance and security in a clear, consistent, and efficient way.
Posted: 06 Mar 2018 | Published: 06 Mar 2018

Oracle
76 - 100 of 1627 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement