IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Attacks

RSS Feed    Add to Google    Add to My Yahoo!
Attacks Reports
 
Design, Deploy, and Manage a DDoS Protection Architecture
sponsored by F5 Networks
WHITE PAPER: An increasing number of distributed denial-of-service (DDoS) attacks has caused many businesses to redesign their networks and better protect application-layer attacks. In this white paper, learn how a multi-tier DDoS protection architecture can help you protect your network and higher-layer application protocols from the four categories of DDoS.
Posted: 31 Mar 2014 | Published: 30 Nov 2013

F5 Networks

Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012

SearchSecurity.com

Information security breaches survey 2012
sponsored by ComputerWeekly.com
IT BRIEFING: Rising security breaches cost UK billions over the last 12 months as cyber attacks reached record levels, according to the 2012 Information Security Breaches survey.
Posted: 24 Apr 2012 | Published: 24 Apr 2012

ComputerWeekly.com

3 Approaches to Stop DDoS Attacks
sponsored by Radware
WHITE PAPER: This white paper examines the threat landscape of DDoS attacks and details the shortcomings of traditional security approaches. You will uncover how to evaluate and craft a new security strategy to mitigate DDoS attacks based on whether you compute on-premises, in the cloud, or in a hybrid environment. View now to learn more.
Posted: 27 Mar 2015 | Published: 04 Mar 2015

Radware

Overcoming Security Breaches and Minimizing the Impact
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

Information security trends
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from CompTIA, based on original research, assesses the current trends in information security.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Cisco CleanAir Technology
sponsored by Cisco Systems, Inc.
WEBCAST: Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012

Cisco Systems, Inc.

Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: This series of technical briefs examines the key factors you need to consider regarding unified threat management (UTM) solutions as they impact security, performance, management, and consolidation.
Posted: 05 Dec 2007 | Published: 01 Dec 2007

SonicWALL

The Extraordinary Failure of Anti-Virus Technology
sponsored by SecureWave
WHITE PAPER: Anti-Virus technology fails to prevent computers from virus infections. This paper examines how whitelisting prevents malware and defends against evolving threats. Learn about five common security breaches and how whitelisting can help prevent them.
Posted: 02 Feb 2007 | Published: 01 Feb 2007

SecureWave

Features of a Comprehensive Application Security Solution
sponsored by Citrix
WHITE PAPER: This white paper discusses the features of a comprehensive application security solution.
Posted: 07 Jun 2010 | Published: 07 Jun 2010

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement