IT Management  >   Systems Operations  >   Security  >  

Network Security

RSS Feed   
ALSO CALLED: Network Perimeter Security, Computer Network Security, Security Network, Perimeter Security
DEFINITION: Network behavior analysis (NBA) is a way to enhance the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation. Conventional intrusion prevention system solutions defend a network's perimeter by using packet inspection, signature detection and real-time blocking. NBA solutions watch what's happening inside the network, aggregating data  … 

Network Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Security Reports
76 - 100 of 1300 Matches Previous Page  |  Next Page
How to Provide a Safe Learning Environment
sponsored by Absolute Software Corporation
WHITE PAPER: Technology has become a fundamental part of the education system, and it’s likely to continue as a classroom trend. However, these devices also present risks to students and schools. Download this white paper to uncover 3 approaches your organization should adopt in order to ensure a safer learning environment.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Absolute Software Corporation

Security at the Speed of Your Network
sponsored by Gigamon
WHITE PAPER: Read “Security at the Speed of Your Network” to learn how to use an architectural approach that improves security posture and reduces costs without painful compromises on performance.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Gigamon

Why SD-WAN Requires a New Approach to Security
sponsored by Zscaler
ANALYST REPORT: SD-WAN improves user experience by providing direct access to the Internet for cloud-based apps. However, local Internet connections must be secure to protect organizations from bad actors. In this report, learn how organizations can secure direct-to-cloud connections.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Zscaler

KCOM
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how KCOM, a UK-based systems integrator, partnered with Absolute to address the increasing demands of their increasingly dispersed workforce without sacrificing compliance or operational efficiency.
Posted: 17 Feb 2020 | Published: 13 May 2019

Absolute Software Corporation

The Root Of (Almost) All Security Issues
sponsored by Tala Security
WHITE PAPER: In order to establish adequate data protection, security teams need to ensure they address both technical (code and data) & non-technical (user behavior) risks. In this white paper, Sanjay Sawhney, VP of Engineering at Tala, highlights how these issues lead to significant disruptions and offers best practices for addressing them.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Tala Security

SLED - 3 Easy Ways to Secure Your K-12 School District
sponsored by Cisco Umbrella
RESOURCE: Deployed in 3 simple steps, Cisco Umbrella secures your entire school district in minutes. Easily protect students and staff against phishing attacks, filter content, and gain visibility into all activity, on or off-campus. Download this infographic to learn more.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Cisco Umbrella

What secure email gateways can do for your enterprise
sponsored by SearchSecurity.com
EBOOK: It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

SearchSecurity.com

The GoAnywhere Book of Secure File Transfer Project Examples
sponsored by Help/Systems
WHITE PAPER: Managed file transfer (MFT) software is primarily used to automate and encrypt the data exchanged between an organization and its trading partners, users, and employees. A robust MFT solution can also solve problems that fall outside your basic file transfer needs. In this white paper, learn how your peers use managed file transfer.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Help/Systems

Apcela Arcus Platform: Enterprise Multi-Cloud WAN
sponsored by Apcela
DATA SHEET: Apcela Arcus Platform allows enterprises to easily plug their existing network into a SD-WAN that was built for today’s multi-cloud environment. In this brief, learn more about the Apcela Arcus Platform.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Apcela

IDT: ShieldX Customer Testimonial
sponsored by ShieldX
VIDEO: View this customer testimonial video to see how IDT Telecom saw security success with ShieldX.
Posted: 13 Feb 2020 | Premiered: 13 Feb 2020

ShieldX

Cryptomining - How Cryptocurrency is Changing Cyber Security
sponsored by Cisco Umbrella
WEBCAST: The introduction of cryptocurrencies has changed the cyber threat landscape. New varieties of ransomware in the form of cryptojacking, mining, and exchange phishing are plaguing today’s businesses. In this episode of ‘A Cybersecurity Technical Mini Series’, learn how you can stay protected.
Posted: 13 Feb 2020 | Premiered: Dec 16, 2019

Cisco Umbrella

APEIRO Micro-Segmention - ACLs and Least Privilege to L7
sponsored by ShieldX
VIDEO: Micro-segmentation must adhere to the “organizing principle” of least privilege.What does that mean exactly? View this video to find out.
Posted: 13 Feb 2020 | Premiered: 13 Feb 2020

ShieldX

Third Party Privileged Access to Critical Systems
sponsored by Cyber-Ark Software
EBOOK: Third-party vendors play a pivotal role in the way business is conducted today. Yet, organizations tend to use antiquated methods, like VPNs, to allow access. In this e-book, explore the results of a recent CyberArk study into third-party privileged access and learn the steps your organization can take to ensure secure vendor access.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cyber-Ark Software

GoAnywhere MFT
sponsored by Help/Systems
DATA SHEET: GoAnywhere MFT is an enterprise-level solution which will secure, automate and manage all of your organization’s file transfer needs through a single interface. In this data sheet, learn how GoAnywhere MFT can help your organization comply with data privacy regulations.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Help/Systems

Protecting Your Organization with Strong Security Controls
sponsored by OneNeck IT
WHITE PAPER: The Center for Internet Security (CIS) developed a standardized approach and set of best practices for businesses to use to identify their specific security requirements and develop a security strategy. This approach is known as the CIS Controls approach. Download this white paper to unlock the industry expertise outlined in the CIS Controls.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

OneNeck IT

Replacing FTP Scripts with Managed File Transfer
sponsored by Help/Systems
WEBCAST: Many companies are still using custom scripts or manual processes to exchange information with customers, partners or other locations. And they do it despite the lack of security these methods provide. In this webcast, Stephen Mabbut of HelpSystems discusses why using FTP is a threat to your organization’s cybersecurity.
Posted: 12 Feb 2020 | Premiered: Feb 12, 2020

Help/Systems

Network Security Made Simple
sponsored by Cisco Umbrella
EBOOK: In this e-book, look at the challenges facing today’s security professionals and explore some simple actions you can take to reduce malware, simplify security and improve network performance.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Cisco Umbrella

Core - DNS - Threat Spotlight: Emotet
sponsored by Cisco Umbrella
WEBCAST: In this edition of ‘A Cybersecurity Technical Mini Series’, take a closer look at the history and evolution of Emotet malware. This webinar highlights Emotet’s infection chain and modules, how this malware can affect your organizations & best practices for avoiding an infection.
Posted: 11 Feb 2020 | Premiered: Oct 31, 2019

Cisco Umbrella

Industrial Giant Discovers 200,000 Network Endpoints in One Day
sponsored by Beta Systems
CASE STUDY: One of the world’s leading industrial companies planned to roll out IEEE 802.1X-based authentication. To pinpoint the scope and cost of this project, the industrial giant needed a precise categorization of all devices on its network. In this case study, learn why the company decided to use Auconet BICS to discover their network devices.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Beta Systems

Core - DNS - The fastest, easiest way to secure your network
sponsored by Cisco Umbrella
WHITE PAPER: IT leaders are under constant pressure to provide adequate security in an increasingly dangerous world. It can be difficult to sift through the countless security options to find a good fit for your strategy. In this white paper, take a closer look at Cisco Umbrella to determine if it would be a good fit for your team.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Cisco Umbrella

Cryptomining - Malicious Cryptominers are Eying Your Resources
sponsored by Cisco Umbrella
EBOOK: Cryptomining is a growing security threat, allowing cybercriminals profit at your organization’s expense. Organizations in the US are key targets, making up roughly 62% of global attacks. In this white paper, find out who they’re targeting and how to protect your network.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Cisco Umbrella

Bovis Homes
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, follow the journey of Bovis Homes, a residential development company in the UK, as they partner with Absolute Software to establish visibility and control over their disparate mobile endpoints to ensure security and meet GDPR compliance.
Posted: 10 Feb 2020 | Published: 25 Jun 2019

Absolute Software Corporation

Rethinking Networks for the Next Decade
sponsored by GTT Americas, LLC
ANALYST REPORT: Today, the rapid pace of change can make it difficult for enterprise IT organizations to know what resources the company will need in the future. In this Ovum report, learn how organizations can prepare for the unknown by implementing a flexible network that can quickly adapt to changing business needs.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

GTT Americas, LLC

Business Infrastructure Control System – BICS
sponsored by Beta Systems
DATA SHEET: Up to 20% of network devices are undetected and unmanaged. This is dangerous; you cannot protect what you don’t see. In this brief, learn how The Business Infrastructure Control System (BICS) can help your organization find and control all your switches, routers, and endpoints, including those which popular NAC tools miss.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Beta Systems

Network Security Management for IT and Industrial Networks
sponsored by Beta Systems
WHITE PAPER: Auconet Business Infrastructure Control Solution (BICS) for IT Security and its counterpart, BICS for Industrial Security, can help overcome key challenges of securing complex IT and industrial control networks. In this white paper, learn more about the security capabilities and features of Auconet BICS for IT and industrial control networks.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Beta Systems
76 - 100 of 1300 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info