IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Distributed Denial of Service Attacks

RSS Feed    Add to Google    Add to My Yahoo!
Distributed Denial of Service Attacks White Papers (View All Report Types)
 
The DDoS Factor: Cost, Facts & Insight into 2017's Most Advanced Cyberattack Vector
sponsored by A10 Networks
WHITE PAPER: In September 2016, cybersecurity journalist Brian Krebs fell victim to one of the largest DDoS attacks ever recorded. Learn about this incident as well as other organizations' DDoS hardships. Discover why DDoS attacks are so dangerous to every enterprise and see the financial impact these attacks have had in recent months.
Posted: 19 Oct 2016 | Published: 30 Sep 2016

A10 Networks

DDoS Recommended Practices
sponsored by F5 Networks
WHITE PAPER: In this white paper, learn recommended network and application practices for successful DDoS attack protection.
Posted: 24 Apr 2017 | Published: 30 Dec 2016

F5 Networks

Understanding What Matters Most When Selecting Managed DNS
sponsored by Dyn
WHITE PAPER: In this DNS evaluation guide, learn about the critical role DNS plays in the user experience, the advantages of a cloud-based managed DNS service and key criteria for evaluating a managed DNS service provider.
Posted: 09 May 2017 | Published: 30 Dec 2016

Dyn

How The Mirai Botnet is Fueling Today's Largest and Most Crippling DDoS Attacks
sponsored by Akamai
WHITE PAPER: The largest DDoS attacks have increased greatly in strength and doubled in attack size in 2016. Access this whitepaper to uncover how to defend against DDoS attacks and stay ahead of the malicious threats like the Mirai botnet.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

Akamai

How Are DDoS Attacks Evolving?
sponsored by Neustar┬«
WHITE PAPER: This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against.
Posted: 05 May 2014 | Published: 05 May 2014

Neustar®

Approaches to Distributed Denial of Service (DDoS) Protection: A Cost Analysis
sponsored by VeriSign, Inc
WHITE PAPER: Do you know what a Distributed Denial of Service (DDoS) attack might cost your organization? This white paper defines DDoS, examines the elements that make up a DDoS protection solution, and compares three different approaches to DDoS protection. Read this paper to learn how to ramp up protection and reduce costs.
Posted: 07 Jun 2010 | Published: 03 Jun 2010

VeriSign, Inc

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

Threat Analysis: Understanding and Combating DDoS Attacks
sponsored by Dell SecureWorks
WHITE PAPER: This analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations.
Posted: 31 May 2011 | Published: 31 May 2011

Dell SecureWorks

Design, Deploy, and Manage a DDoS Protection Architecture
sponsored by F5 Networks
WHITE PAPER: An increasing number of distributed denial-of-service (DDoS) attacks has caused many businesses to redesign their networks and better protect application-layer attacks. In this white paper, learn how a multi-tier DDoS protection architecture can help you protect your network and higher-layer application protocols from the four categories of DDoS.
Posted: 31 Mar 2014 | Published: 30 Nov 2013

F5 Networks

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement