5,085 Results for:Network Security

  • Sort by: 

managed network security services

Managed network security services are third-party service providers, solution providers or value-added resellers that can be hired to outsource tasks or processes related to network security. Read Full Definition

Associated Glossaries

ENISA (European Network and Information Security Agency)

The European Network and Information Security Agency (ENISA) is a European Union (EU) agency dedicated to preventing and addressing network security and information security problems. Read Full Definition

Associated Glossaries

network encryption (network layer or network level encryption)

Network encryption (sometimes called network layer, or network level encryption) is a network security process that applies crypto services at the network transfer layer - above the data link level, but below the ... Read Full Definition

network analytics

Network analytics is the application of big data principles and tools to the management and security of data networks. Read Full Definition

SSL VPN (Secure Sockets Layer virtual private network)

An SSL VPN is a type of virtual private network that uses the Secure Sockets Layer protocol -- or, more often, its successor, the Transport Layer Security (TLS) protocol -- in standard web browsers to provide ... Read Full Definition

Associated Glossaries

network forensics

Network forensics is the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents. Read Full Definition

network access control (NAC)

Network access control (NAC), also called network admission control, is a method of bolstering the security of a proprietary network by restricting the availability of network resources to endpoint devices that ... Read Full Definition

Associated Glossaries

context-aware network access control

Context-aware network access control (CANAC) is an approach to managing the security of a proprietary network by granting access to network resources according to contextual-based security policies. Read Full Definition

endpoint security (endpoint security management)

Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted. Read Full Definition

Secure Shell (SSH)

SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network. Read Full Definition