IT Management  >   Systems Operations  >   Network Management  >   Network Performance  >  

Network Traffic Analysis

RSS Feed   
ALSO CALLED: Network Anomaly Detection, Network Behavior Analysis, Network Behavior Anomaly Detection, Network Traffic, NBAD
DEFINITION: The inference of information from observation of traffic flow; for example, analysis of the presence, absence, amount, direction, and frequency of traffic.
Network Traffic Analysis Reports
1 - 25 of 103 Matches Previous Page  |  Next Page
SIG - SASE in 15 minutes
sponsored by Cisco Umbrella
WEBCAST: Secure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.
Posted: 26 Feb 2021 | Premiered: Mar 25, 2020

Cisco Umbrella

Partnering To Deliver An Automated Secure Access Service Edge
sponsored by Aruba Networks
DATA SHEET: Cloud migration is changing traffic patterns and driving the need to transform WAN and security architectures. SASE is changing how companies build their networks, and when combined with SD-WAN, applications perform highly and threats are averted. Access this data sheet to learn about Silver Peak’s Unity EdgeConnect SD-WAN with automated SASE.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

Aruba Networks

Mastering Peak Traffic With Performance Testing
sponsored by Micro Focus
EBOOK: When peak traffic hits, applications both external and internal are affected, causing losses in revenue, brand reputation and employee productivity. To make sure you are ready for a peak season—whenever it hits—dive into these 8 best practices to implement an effective performance test for both consumer-facing and internal applications.
Posted: 01 Feb 2021 | Published: 01 Feb 2021

Micro Focus

Architecting a Secure Business-Driven SD-WAN
sponsored by Silver Peak
WHITE PAPER: SD-WAN delivers the ability to actively utilize low-cost broadband services. But because broadband services are ‘public’ instead of ‘private,’ advanced security capabilities are required to ensure the confidentiality and integrity of application traffic traversing such connections. Access this white paper to learn about Silver Peak’s secure SD-WAN.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Silver Peak

SD-WAN Single IP Failover for Maximum Network Uptime
sponsored by Capcon Networks
RESOURCE: In our ever-changing work environment, enterprise IT departments are challenged with achieving maximum uptime for critical applications outside of the traditional business perimeter. This kind of uptime can be achieved with SD-WAN using single or same IP failover. Browse this article from Capcon Networks to learn more.
Posted: 17 Dec 2020 | Published: 28 Apr 2020

Capcon Networks

Thermal Imaging Cameras, AI & LTE Enable Safer Screenings as Employees Return to Offices
sponsored by Cradlepoint
CASE STUDY: Organizations utilize IntelliSite’s robust imaging technology and AI-driven software platform to help identify people who may be experiencing COVID-19 symptoms. But managing connectivity and information security across thousands of disparate sites was a real challenge. Read this case study to learn how IntelliSite gained greater visibility.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

Cradlepoint

Around the World in 34 Phish: Covid-19 Phishing Examples
sponsored by Inky Technology
RESOURCE: The state of the world has left email servers more vulnerable to attack than ever. As phishing is the most used method of cyberattack in the world, there have been plenty of examples to identify and dissect to help people develop a more watchful eye. Browse this article to see 34 different examples of phishing scams across the globe.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

Inky Technology

Cybereason EDR
sponsored by Cybereason
DATA SHEET: Endpoint detection & response (EDR) allows organizations to monitor their environments with force, so they can know when a threat is present and respond in seconds, rather than days. Plus, it correlates an attack across all endpoints to give a single view of an attack in real time. View this data sheet to get a closer look at key capabilities.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Cybereason

A web of weak spots: Securing your supply chain with NDR and Collective Defense
sponsored by IronNet
WHITE PAPER: Today’s supply chain is an extended enterprise with many back doors. Indirect attacks against weak links in the supply chain now account for 40% of security breaches. How can you better protect your data? Dig into this white paper to learn the 5 most common attacks and how network detection & response can help prevent them.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

IronNet

XDR: Extended Detection and Response
sponsored by Palo Alto Networks
WHITE PAPER: Extended detection & response (XDR) has emerged in the wake of a need to detect, investigate and respond to threats across all threat vectors in a company’s infrastructure (network, endpoint and cloud) rather than just one. Dive into this white paper to learn about XDR and how it uses integration and orchestration as defense.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Palo Alto Networks

The Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation
sponsored by Palo Alto Networks
ANALYST REPORT: Endpoint detection and response (EDR) is quickly becoming a ubiquitous security technology in the age of remote work. As such, it is critical for security professionals to be aware of the vendors in the space. Tap into the Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation to help you pick the right tool for your organization.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

Security Orchestration For Dummies
sponsored by Palo Alto Networks
EBOOK: Security orchestration is a new term to the market, but it could simplify the lives of security professionals. It refers to the integration of security tools, unifying intelligence and automating tasks, resulting is a more effective security operations center that better detects and responds to threats. Dive into this e-book for a detailed guide.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

Next-Generation Firewall Buyer’s Guide
sponsored by Palo Alto Networks
RESOURCE: Cloud adoption, big data analytics, machine learning and automation are all accelerating the delivery of applications, which in and of themselves are becoming increasingly accessible. However, this also means that apps are more vulnerable than ever. Browse this guide to learn how Next-Gen Firewalls can minimize risk without slowing you down.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

Assessing the Economic Impact of Cybereason
sponsored by Cybereason
ANALYST REPORT: As the security threat landscape continues to grow in complexity, organizations are looking for the best solutions to protect their endpoints without overextending their already overworked security and IT teams. For help, read this Forrester report to get an in-depth look at key findings for the Cybereason Defense Platform.
Posted: 25 Aug 2020 | Published: 29 May 2020

Cybereason

Achieving Resilience in Your Distributed Workforce Environment During the COVID-19 Pandemic and Beyond
sponsored by Tanium
WHITE PAPER: To accommodate the transformation to remote work, organizations have upended their traditional IT infrastructure and adopted decentralized networks, cloud-based services, and widespread usage of employees’ personal devices. This has revealed critical gaps in visibility. Use this white paper to learn how to fill these gaps and remain resilient.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Tanium

Danger within: email and security awareness training strategies for effective account takeover protection
sponsored by Mimecast
WHITE PAPER: It’s a common misconception that email-borne attacks come only from outside the organisations. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Mimecast

Cybereason Mobile
sponsored by Cybereason
DATA SHEET: Mobile devices are now more popular for enterprise use and workplace productivity than desktops or laptops. With millions of malware threats for a growing variety of devices and OS’s alongside cloud and mobile-first apps, the risks are complex and expanding. Don’t get left behind, view this data sheet to learn how to keep mobile devices secure.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Cybereason

Seton Hall University Uncovers Ongoing Threats and Lowers Cost with Cybereason
sponsored by Cybereason
CASE STUDY: A prominent university on the east coast was not confident in its network’s visibility and protection. They searched for a powerful solution that could provide both the visibility they needed and strong detection through the use of a single agent. Read this case study to learn the details of Seton Hall’s choice of Cybereason for security.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Cybereason

Cybereason MDR Packages
sponsored by Cybereason
DATA SHEET: Detection and response are vital to any organization’s security. With managed detection and response (MDR), you can efficiently prevent data breaches, eliminate false positives, and because it’s managed, you can optimize security operations and reduce total cost of ownership. Dive into this data sheet to learn about MDR from Cybereason.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Cybereason

Why, and how, to merge your SD-WAN and security strategies
sponsored by SearchNetworking.com
EGUIDE: SD-WAN has been linked to security from its inception, but what if you could go one step further? What if there were ironclad ways to manage threats, trust, visibility and orchestration to give your organization an added layer of security through SD-WAN? In this handbook, read more about piecing together SD-WAN and security.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

SearchNetworking.com

SIG - Feature Brief: Secure Web Gateway
sponsored by Cisco Umbrella
ANALYST REPORT: Overview of the secure web gateway (full proxy) capabilities that are available in Umbrella. Includes content filtering, anti-virus scans, AMP malware detection, Threat Grid file sandboxing, SaaS app discovery and blocking, granular app controls, and detailed threat intelligence.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

Cisco Umbrella

Network Performance Issues are IT Pain Point Amid COVID-19
sponsored by NetAlly
EGUIDE: Reliable home network performance is a top issue IT teams have dealt with amid the COVID-19 pandemic. With almost entire workforces working from disparate locations, remote networks are nearly impossible to monitor and manage. In this e-guide, learn how home network performance issues can relate to other IT problems.
Posted: 23 Dec 2020 | Published: 18 Dec 2020

NetAlly

Why You Should Consider Endpoint Detection & Response
sponsored by Claranet
EGUIDE: Endpoint security has become an especially hot topic over the past few months. Organizations need to put clamps on hackers who attempt to breach their infrastructure. As such, traditional legacy endpoint security systems may not be able to stand up to modern threats. Read this expert guide to learn about endpoint detection & response.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Claranet

What to Include in an SD-WAN Security Checklist
sponsored by Citrix
EGUIDE: SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
Posted: 10 Aug 2020 | Published: 30 Apr 2020

Citrix

Choosing the Best SD-WAN Architecture for Your Network
sponsored by SingTel
EGUIDE: In this expert e-guide, industry experts explore what key considerations you should weigh when choosing an SD-WAN architecture that suits your organization's specific needs. Learn about building your optimal SD-WAN based off of traffic patterns, which vertical industries can benefit most from SD-WAN, and estimating SD-WAN's ROI.
Posted: 16 Jun 2017 | Published: 09 Jun 2017

SingTel
1 - 25 of 103 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences