IT Management  >   Systems Operations  >   Security  >   Network Security  >  

DOSA

RSS Feed    Add to Google    Add to My Yahoo!
DOSAReports
 
Four Ways DNS Can Accelerate Business Growth
sponsored by Neustar®
WHITE PAPER: This exclusive paper discusses the plethora of benefits that a robust and secure DNS can provide your organization. Read on to find out how you can significantly enhance your web experience for users, driving new streams of revenue.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

MidWestern Community Bank Defends Againts Online Attacks
sponsored by Juniper Networks, Inc.
CASE STUDY: This case study examines a Midwestern community bank that has experienced DDoS attacks coming from a foreign country.
Posted: 27 Jun 2014 | Published: 31 Jan 2014

Juniper Networks, Inc.

Types of DNS Attacks Reveal DNS Defense Tactics
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!
Posted: 21 Mar 2013 | Published: 21 Mar 2013

SearchSecurity.com

Proven Practices for Securing Your Website Against DDoS Attacks
sponsored by Dyn
WEBCAST: This expert webcast discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.
Posted: 26 Aug 2014 | Premiered: Aug 25, 2014

Dyn

Is Your Data Center Ready for Today’s DDoS Threats?
sponsored by Fortinet, Inc.
VIDEO: This webinar gives a description of distributed denial-of-services attacks and explains the benefits of a DDoS mitigation solution.
Posted: 30 Jul 2014 | Premiered: 17 Apr 2014

Fortinet, Inc.

Defending Against Denial of Service Attacks
sponsored by F5 Networks
WHITE PAPER: Access this white paper for key information about how denial of service (DoS) attacks have taken advantage of the lack of security and compliance measures around network availability. Read on to learn how you can leverage networks and applications to defend against these threats.
Posted: 25 Nov 2013 | Published: 31 Oct 2012

F5 Networks

Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: This series of technical briefs examines the key factors you need to consider regarding unified threat management (UTM) solutions as they impact security, performance, management, and consolidation.
Posted: 05 Dec 2007 | Published: 01 Dec 2007

SonicWALL

FortiGate DoS Protection - Block Malicious Traffic Before It Affects Critical Applications and Systems
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization’s network from being used to attack another organization.
Posted: 01 Aug 2011 | Published: 29 Jul 2011

Fortinet, Inc.

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

Mega-DDoS Attack Prevention: How to Prepare for Larger DDoS Attacks
sponsored by F5 Networks
EGUIDE: In this e-guide, leading industry expert Brad Casey explains the mechanics behind high-bandwidth distributed denial of service (DDoS) attacks and key recommendations on how to prevent them.
Posted: 29 Jan 2014 | Published: 29 Jan 2014

F5 Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement