IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Smurfing

RSS Feed    Add to Google    Add to My Yahoo!
Smurfing White Papers (View All Report Types)
 
Fortinet Threat Trends in 2015
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper presents today's four most significant cyber-security threats from the hacker's perspective. Access this resource to learn the steps that you need to take to protect your organization from being the next breach victim, as well as how to shift from a reactive to a proactive security approach.
Posted: 05 Jun 2015 | Published: 25 Feb 2015

Fortinet, Inc.

Design, Deploy, and Manage a DDoS Protection Architecture
sponsored by F5 Networks
WHITE PAPER: An increasing number of distributed denial-of-service (DDoS) attacks has caused many businesses to redesign their networks and better protect application-layer attacks. In this white paper, learn how a multi-tier DDoS protection architecture can help you protect your network and higher-layer application protocols from the four categories of DDoS.
Posted: 31 Mar 2014 | Published: 30 Nov 2013

F5 Networks

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

The Cybercrime Arms Race
sponsored by Kaspersky Lab
WHITE PAPER: Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Kaspersky Lab

Threat Analysis: Understanding and Combating DDoS Attacks
sponsored by Dell SecureWorks
WHITE PAPER: This analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations.
Posted: 31 May 2011 | Published: 31 May 2011

Dell SecureWorks

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Defending Against Denial of Service Attacks
sponsored by F5 Networks
WHITE PAPER: Access this white paper for key information about how denial of service (DoS) attacks have taken advantage of the lack of security and compliance measures around network availability. Read on to learn how you can leverage networks and applications to defend against these threats.
Posted: 25 Nov 2013 | Published: 31 Oct 2012

F5 Networks

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva
WHITE PAPER: This paper describes the most critical database security threats, offers risk mitigation strategies, and provides information about Imperva SecureSphere Database Security Solutions.
Posted: 19 Aug 2009 | Published: 03 Aug 2009

Imperva

Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: This series of technical briefs examines the key factors you need to consider regarding unified threat management (UTM) solutions as they impact security, performance, management, and consolidation.
Posted: 05 Dec 2007 | Published: 01 Dec 2007

SonicWALL

Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER: This white paper presents a cost breakdown of a Web application firewall solution versus the potential costs of remediation after a successful Web attack. Click now to see why this solution is worth the investment.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Imperva
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement