dos

Results 176 - 200 of 482Sort Results By: Published Date | Title | Company Name
Published By: Sophos     Published Date: Mar 30, 2017
With an estimated 500,000 'Internet of Things' devices using default security credentials it's little wonder that the recent Mirai botnet's DDoS attack was able to cause such widespread disruption. But it isn't just the average home-user that's at risk. Organizations like yours are being targeted with bespoke malware in order to compromise your network and add your servers and devices to malicious botnets. This paper explains why these attacks are so successful, how a typical infection takes place and what security systems your organization should have in place to defend against botnet proliferation.
Tags : 
web protection, email protection, web application firewall, intrusion protection, sandboxing, threat protection
    
Sophos
Published By: Forcepoint     Published Date: Apr 20, 2016
En 2014, les fuites de données ont compromis plus de 700 millions de dossiers, engendrant des pertes financières estimées à au moins 400 millions $, et la fréquence des incidents liés à la sécurité est passée à 66 pour cent. Mais ne laissez pas la crainte étouffer votre croissance. Le rapport sur la prévention contre le vol de données se penche principalement sur la manière de vous protéger lorsque vous innovez, mais selon une perspective plus large en termes de portée et plus intelligente dans l’application.
Tags : 
security, data theft prevention, data security, security application
    
Forcepoint
Published By: Arbor     Published Date: Feb 07, 2013
How the Arbor Security Engineering & Response Team (ASERT) Discovers, Analyzes and Mitigates DDoS Attacks
Tags : 
arbor, ddos attacks, botnet, business technology
    
Arbor
Published By: Arbor     Published Date: Feb 07, 2013
HOW TO PROTECT YOUR DATA CENTER’S AVAILABILITY
Tags : 
arbor, firewalls, ddos protection, intrusion prevention systems, ips, business technology
    
Arbor
Published By: Arbor     Published Date: Feb 07, 2013
The single biggest factor holding back enterprises from leveraging hosting and cloud service providers continues to be security and availability concerns.
Tags : 
arbor, ddos, cloud service, hosting providers, attack trends, protection services, business technology
    
Arbor
Published By: Arbor     Published Date: Feb 07, 2013
In today’s environment, any enterprise operating online—which means just about any type and size of organization—can become a target because of who they are, what they sell, who they partner with or for any other real or perceived affiliations.
Tags : 
arbor, anti-ddos, ddos attacks, threat, business technology
    
Arbor
Published By: Arbor     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches.
Tags : 
cyber threats, security, ddos, data breaches, atlas, frost & sullivan, cloud, hosting, cloud computing, network
    
Arbor
Published By: Arbor     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, market trends, infonetics, ddos prevention, arbor networks, security, network, intrusion prevention
    
Arbor
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
Until recently, security teams for organizations in many industries believed they didn’t need to worry about DDoS attacks, but the latest data from the Verizon 2017 Data Breach Investigations Report indicates that businesses of all sizes in nearly every industry run the risk of being attacked.¹ IoT devices are increasingly compromised, recruited into botnets, and offered up by their creators as for-hire DDoS services. Additionally, there are numerous DDoS tools and services that are easily accessible and easy to use, even for the untechnical novice.
Tags : 
protection, ddos, security, reporting, organization, device
    
F5 Networks Inc
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization's network from being used to attack another organization.
Tags : 
fortinet, fortigate dos protection, malicious traffic, denial of service, ddos protection, network security, fortios, attacks
    
Fortinet, Inc.
Published By: Citrix Systems     Published Date: Jul 25, 2016
This white paper examines the current DoS landscape and discusses common approaches for dealing with the modern DoS threat. It explains how the Citrix® NetScaler® application delivery controller (ADC) provides a robust yet highly affordable foundation for an organization’s DoS defenses. Benefits of the NetScaler solution include:
Tags : 
    
Citrix Systems
Published By: CareCloud     Published Date: Sep 23, 2014
Gastroenterology practices today are under immense pressure from the combination of declining reimbursement and rising costs. Among other recent challenges, CMS’s dramatic cuts to the 2014 Medicare reimbursement rates for upper GI endoscopy services dealt a tough blow to gastroenterologists across the country.
Tags : 
carecloud, gastroenterology, profitability, medicare reimbursement, rising costs
    
CareCloud
Published By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
For many years, traditional businesses have had a systematic set of processes and practices for deploying, operating and disposing of tangible assets and some forms of intangible asset. Through significant growth in our inquiry discussions with clients, and in observing increased attention from industry regulators, Gartner now sees the recognition that information is an asset becoming increasingly pervasive. At the same time, CDOs and other data and analytics leaders must take into account both internally generated datasets and exogenous sources, such as data from partners, open data and content from data brokers and analytics marketplaces, as they come to terms with the ever-increasing quantity and complexity of information assets. This task is clearly impossible if the organization lacks a clear view of what data is available, how to access it, its fitness for purpose in the contexts in which it is needed, and who is responsible for it.
Tags : 
    
Waterline Data & Research Partners
Published By: ArborNetworks     Published Date: Sep 16, 2015
Don't ignore DDoS; instead, take preventive action. With that in mind, IDC believes that hybrid defense scenarios (on-premises equipment married with cloud services) will continue to grow as organizations seek to parry advanced application and large-scale volumetric attacks and as solution providers and product vendors work to deliver joint solutions.
Tags : 
networking, security, it management, business technology
    
ArborNetworks
Published By: ArborNetworks     Published Date: Nov 30, 2015
This paper outlines the challenges of DDoS attacks and describes the features you need in a DDoS prevention solution to more effectively protect your network from these threats.
Tags : 
arbor, ddos, protection, enterprise, data security, security, business technology
    
ArborNetworks
Published By: ArborNetworks     Published Date: Feb 12, 2016
Today’s DDoS attacks are an easy way to interrupt businesses.
Tags : 
ddos protection, arbor networks, insegment, best practices, policies, data
    
ArborNetworks
Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Cox Business     Published Date: May 31, 2017
For cybersecurity professionals, 2016 presented a year of distributed denial of service (DDoS) attacks that were unprecedented. Week after week, the public was inundated with news of hacks, attacks, and data leaks. It didn’t take long for everybody to realize the old axiom of cybersecurity still holds true - there are two types of companies: those who are hacked and know about it, and those who are hacked and soon will find out. As a key player in the war against DDoS attacks, Neustar has been on the front line, detecting, alerting, and mitigating strikes to keep companies and their customers safe.
Tags : 
    
Cox Business
Published By: Oracle + Dyn     Published Date: Aug 31, 2017
"Hybrid cloud adoption is exploding, with 80% of enterprises having at least some infrastructure in the cloud. This growth includes increased use of multiple endpoints to deliver applications, sites and services, requiring a performance management strategy to ensure those services reach users effectively. This educational webinar will cover the importance of: • Optimizing round trip times and latency, with clear real-time data • Understanding the importance of load balancing and active failover • Protecting your service from route hijacks, DDoS attacks and mitigating vulnerabilities Watch this short Video Webinar and learn how focusing on the DNS layer can help you plan, migrate and optimize your way to cloud success! Watch now! "
Tags : 
    
Oracle + Dyn
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
DDoS attacks increase by over 100% year over year. What’s scarier is that 82% of enterprises described DDoS attacks as crippling to their business. In order to have a secure disaster recovery plan and overcome these increasingly sophisticated threats you need a highly resilient and scalable DNS infrastructure. Download this quick guide and learn: Common types of DDoS attacks and which layers of your infrastructure are most at risk How to geographically isolate attacks and mitigate latency when you have multiple endpoints How to get the best before, during and after attack protection Get the guide!
Tags : 
    
Oracle + Dyn
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System or DNS is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct online asset (website, application, etc) efficiently. Knowing the complexities and best practices of this layer of your online infrastructure will help your organization build redundancy, improve end-user performance and establish a top notch DR plan. Download this guide to DNS top terms and actionable concepts including: Anycast vs. Unicast networks CNAME DDoS and Hijacking Load Balancing and GSLB
Tags : 
    
Oracle + Dyn
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"DDoS attacks increase by over 100% year over year. What’s scarier is that 82% of enterprises described DDoS attacks as crippling to their business. In order to have a secure disaster recovery plan and overcome these increasingly sophisticated threats you need a highly resilient and scalable DNS infrastructure. Download this quick guide and learn: • Common types of DDoS attacks and which layers of your infrastructure are most at risk • How to geographically isolate attacks and mitigate latency when you have multiple endpoints • How to get the best before, during and after attack protection Get the guide! "
Tags : 
    
Oracle + Dyn
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System or DNS is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct online asset (website, application, etc) efficiently. Knowing the complexities and best practices of this layer of your online infrastructure will help your organization build redundancy, improve end-user performance and establish a top notch DR plan. Download this guide to DNS top terms and actionable concepts including: • Anycast vs. Unicast networks • CNAME • DDoS and Hijacking • Load Balancing and GSLB Learn more! "
Tags : 
    
Oracle + Dyn
Published By: Akamai Technologies     Published Date: Jul 02, 2018
What to expect and how to prepare your best defense DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee