article thumbnail

34 Most Common Types of Network Security Protections

eSecurity Planet

Penetration Testing Product Guides 9 Best Penetration Testing Tools 10 Top Open Source Penetration Testing Tools Next-Generation Firewall (NGFW) Next-generation firewalls (NGFWs) move beyond the traditional perimeter of a network to provide protections at the application layer of the TCP/IP stack.

article thumbnail

What Is Hybrid Cloud Security? How it Works & Best Practices

eSecurity Planet

Encryption protects data both in transit and at rest. Continuous security monitoring identifies and responds to threats in real time. Data loss prevention ( DLP ) prevents unwanted data transfers. Firewalls and web application firewalls ( WAFs ) filter network traffic.

Backups 98
article thumbnail

What Is Log Monitoring? Benefits & Security Use Cases

eSecurity Planet

While logs are also used by developers and IT teams to address performance and operations issues, our focus is on the security uses of log data. These security logs document the events and actions, when they happened, and the causes of errors. System logs include information about user activity.

Risk 92