ddos

Results 151 - 175 of 187Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 14, 2014
Gives an insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks.
Tags : 
ddos attacks, it security, ddos mitigation, security, it management
    
IBM
Published By: CloudFlare     Published Date: Jul 25, 2016
CloudFlare’s advanced DDoS protection, provisioned as a service at the network edge, matches the sophistication and scale of such threats, and can be used to mitigate DDoS attacks of all forms and sizes including those that target the UDP and ICMP protocols, as well as SYN/ACK, DNS amplification and Layer 7 attacks. This document explains the anatomy of each attack method and how the CloudFlare network is designed to protect your web presence from such threats.Below you will find detailed information on these attacks and how the CloudFlare network protects against them.
Tags : 
cloudflare, best practices, technology, security, access control, business technology
    
CloudFlare
Published By: Arbor Networks     Published Date: Feb 04, 2011
Download this paper to learn how to evaluate your risk vs. the expected returns from investing in a DDoS defense solution.
Tags : 
ddos protection, arbor networks, dns, domain name system, distributed denial of service, botnet, ddos defense solution, roi calculation, ddos attacks
    
Arbor Networks
Published By: Arbor Networks     Published Date: Mar 07, 2011
Download this paper to learn how emerging botnet and DDoS threats are identified, analyzed and mitigated to help protect organizations like yours from their impact.
Tags : 
ddos attacks, arbor networks, botnet, distributed denial of services, asert, yoyoddos botnet, bot
    
Arbor Networks
Published By: Arbor Networks     Published Date: Jan 31, 2013
Because of the damage they cause and the bewildering speed with which they mutate, botnets are perceived as malevolent and unstoppable. Fortunately there are companies such as Arbor Networks, which are dedicated to analyzing and stopping botnets.
Tags : 
anatomy of a botnet, botnet, ddos, global basis, distributed denial of service, analyzing, service, arbor networks, security, it management, data management, business technology, data center
    
Arbor Networks
Published By: Arbor Networks     Published Date: Jan 31, 2013
This paper will look at DDoS attacks in detail. It will illustrate the attack vectors being used and describe why the threat to organizations is greater than ever before
Tags : 
anti-ddos, products, services, critical, business environment, ips devices, firewall, arbor network, security, knowledge management, data management, business technology, data center
    
Arbor Networks
Published By: Arbor Networks     Published Date: Jan 31, 2013
This white paper examines why IPS devices and firewalls fail to stop DDoS threats. It also describes how an intelligent DDoS mitigation system (IDMS) offers an ideal solution by enabling a layered defense strategy to combat DDoS attacks.
Tags : 
firewalls, intrusions, ips, fall short on ddos protection, ips devices, ddos attacks, security, it management, data management, business technology, data center
    
Arbor Networks
Published By: Arbor Networks     Published Date: Jan 31, 2013
This Frost & Sullivan whitepaper provides an overview of the latest DDoS attack trends, and offers examples of how cloud service and hosting providers can use Arbor Networks solutions to protect their data centers from DDoS attacks and more.
Tags : 
security, it management, data management, business technology, data center
    
Arbor Networks
Published By: Arbor Networks     Published Date: Mar 06, 2013
According to Infonetics Research, the DDoS market is being driven by high visibility attacks, Internet traffic growth, enterprise, mobile and managed security services demand. Learn more with this Infonetics Research report on DDoS.
Tags : 
arbor networks, ddos, security, infonetics, prevention appliance report, data management, business technology, data center
    
Arbor Networks
Published By: Cisco     Published Date: Aug 18, 2014
Optimize benefits from your Cisco ASA 5500-X Series Next-Generation Firewall, and better secure your network from malicious activity, with a proven firewall and IPS design guide. Use this guide for faster, more reliable, and more predictable deployment.
Tags : 
security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network, vulnerabilities, firewall, optimize, security
    
Cisco
Published By: Kaspersky     Published Date: May 11, 2016
As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.
Tags : 
kaspersky, cybercrime, cyber attack, ddos, hackers, roi, security breach, firewall, mobile security, business technology
    
Kaspersky
Published By: Black Lotus     Published Date: Apr 21, 2014
Newly updated for April 2014 with Q1 attack data, download the latest DDoS Threat Advisory from Black Lotus to learn about the latest threats facing your company.
Tags : 
black lotus, black lotus communications, ddos, denial of service, security threat, hackers, spam, fishing, firewall, intrusion, mobile secuirty
    
Black Lotus
Published By: Staminus Communications     Published Date: May 06, 2014
In this installment of a series of white papers about the true cost of DDoS attacks, StamSOC (Staminus Security Operation Center) will discuss the history of the attacks, the wide reaching impacts, and the true costs associated with DDoS attacks.
Tags : 
staminus communications, staminus, ddos, ddos attacks, hosting security, security
    
Staminus Communications
Published By: Corero     Published Date: Dec 05, 2014
Few hosting providers today offer sufficient protection from DDoS attacks, so those that can implement robust DDoS attack protection will be able to more efficiently protect their hosted infrastructure and gain a competitive advantage in the marketplace. They’ll also be positioned to create incremental revenue streams from high-value, managed DDoS attack protection services.
Tags : 
corero, ddos, distributed denial of service, data protection, ddos attack, threat protection, hosted threats
    
Corero
Published By: GFI     Published Date: Jul 24, 2007
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
adobe, adobe acrobat, acrobat, gfi, spam, image spam, pdf spam, anti-spam, anti spam, email security, zombie, zombies, botnet, botnets, hacker, vulnerability, filtering, blocking, mailessentials, mail essentials
    
GFI
Published By: GFI     Published Date: Jun 13, 2008
Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR spam that has an effect similar to a Distributed Denial of Service on the email system. In this paper we provide a technical explanation of NDR Spam and recommend solutions that can prevent or limit exposure to this kind of unsolicited email.
Tags : 
email security, ddos, denial of service, distributed denial of service, ndr, spam, non-delivery report, non delivery report, anti spam, anti-spam, gfi, security
    
GFI
Published By: Microworld     Published Date: Dec 12, 2007
Spam is the vilest manifestation of e-mail abuse. This white paper provides information about Spam, losses caused by Spam, how Spam works and suggests key features that a good Anti-Spam software should have.
Tags : 
email security, email, dos, ddos, denial of service, denial-of-service, spam, anti-spam, anti spam, filter, filtering, blocking, block, microworld
    
Microworld
Published By: Infoblox     Published Date: Dec 28, 2012
Learn about defeating Dos/DDoS attacks in real time -- Know about the causes of rapid growth in the number of Denial of Service (DoS/DDoS) attacks and more.
Tags : 
infoblox, dos, ddos, denial of service attacks, security, denial of service, isp, internet service provider, it management, business technology
    
Infoblox
Published By: Arbor Networks     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches.
Tags : 
cyber threats, security, ddos, data breaches, atlas, frost & sullivan, cloud, hosting, cloud computing, network
    
Arbor Networks
Published By: Arbor Networks     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, cyber attacks, research, enterprise, mobile, cloud, security
    
Arbor Networks
Published By: Arbor     Published Date: Sep 20, 2013
Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but is increasingly a feature or additional aspect of other advanced targeted attacks. The motivation of modern attackers can be singular, but the threat landscape continues to become more complex and mixes various threats to increase the likelihood of success. There have certainly been cases where the MSSP was successful at mitigating against an attack but the target Website still went down due to corruption of the underlying application and data. In order to defend networks today, enterprises need to deploy DDoS security in multiple layers, from the perimeter of their network to the provider cloud, and ensure that on-premise equipment can work in harmony with provider networks for effective and robust attack mitigation
Tags : 
distributed denial of service, ddos attack, financial services, financial services company, ddos defense, ddos protection, security, finance, ddos mitigation
    
Arbor
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection, business technology
    
Arbor
Published By: Arbor     Published Date: Sep 20, 2013
Today’s hosting provider can increase revenue by capitalizing on the growing demand of business customers for hosted online operations—provided, of course, that it can safeguard these critical operations against DDoS-related outages. Using the simple, step-by-step approach described in this paper, providers can model the financial impact of a DDoS attack on their operations and calculate the ROI of an effective DDoS defense solution.
Tags : 
distributed denial of services, defense solutions, security, financial management, ddos attacks, ddos protection, ddos defense system, ddos protection solutions, roi
    
Arbor
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee