5,085 Results for:Network Security
- Sort by:
managed network security services
Managed network security services are third-party service providers, solution providers or value-added resellers that can be hired to outsource tasks or processes related to network security. Read Full Definition
Associated Glossaries
ENISA (European Network and Information Security Agency)
The European Network and Information Security Agency (ENISA) is a European Union (EU) agency dedicated to preventing and addressing network security and information security problems. Read Full Definition
Associated Glossaries
network encryption (network layer or network level encryption)
Network encryption (sometimes called network layer, or network level encryption) is a network security process that applies crypto services at the network transfer layer - above the data link level, but below the ... Read Full Definition
Associated Glossaries
network analytics
Network analytics is the application of big data principles and tools to the management and security of data networks. Read Full Definition
Associated Glossaries
SSL VPN (Secure Sockets Layer virtual private network)
An SSL VPN is a type of virtual private network that uses the Secure Sockets Layer protocol -- or, more often, its successor, the Transport Layer Security (TLS) protocol -- in standard web browsers to provide ... Read Full Definition
Associated Glossaries
network forensics
Network forensics is the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents. Read Full Definition
Associated Glossaries
network access control (NAC)
Network access control (NAC), also called network admission control, is a method of bolstering the security of a proprietary network by restricting the availability of network resources to endpoint devices that ... Read Full Definition
Associated Glossaries
context-aware network access control
Context-aware network access control (CANAC) is an approach to managing the security of a proprietary network by granting access to network resources according to contextual-based security policies. Read Full Definition
Associated Glossaries
endpoint security (endpoint security management)
Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted. Read Full Definition
Associated Glossaries
Secure Shell (SSH)
SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network. Read Full Definition
Associated Glossaries