IT Management  >   Systems Operations  >   Security  >   Network Security  >  

DOSA

RSS Feed    Add to Google    Add to My Yahoo!
DOSA Reports
 
Security as a Service: Benefits and Risks of Cloud-Based Security
sponsored by SearchSecurity.com
EGUIDE: Uncover the fresh approach cloud-based Security as a Service (SaaS) is bringing to the market and learn the top benefits and risks to get help deciding if this is a viable option for your organization.
Posted: 01 Mar 2013 | Published: 01 Mar 2013

SearchSecurity.com

Four Considerations for Addressing the DDoS Risk for Carrier and Cloud Hosting Providers
sponsored by Radware
WHITE PAPER: In this white paper, you'll learn the four key considerations for addressing sophisticated DDoS attacks.
Posted: 02 Oct 2015 | Published: 15 Jan 2015

Radware

Information security trends
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from CompTIA, based on original research, assesses the current trends in information security.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Targeted Cyber Attacks
sponsored by GFI Software
PRODUCT LITERATURE: Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war.
Posted: 25 Jun 2007 | Published: 25 Jun 2007

GFI Software

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: This series of technical briefs examines the key factors you need to consider regarding unified threat management (UTM) solutions as they impact security, performance, management, and consolidation.
Posted: 05 Dec 2007 | Published: 01 Dec 2007

SonicWALL

Evolving Security Technologies Present New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Akamai Shields Leading Retailer from Ddos Attacks During Critical Holiday Shopping Period - and Protects $10 Million in Revenues
sponsored by Akamai Technologies
CASE STUDY: In this case study, learn how one online retailer was able to maintain online operations and protect $10 million in revenue by implementing Akamai’s DDoS Defender Security Solution and utilizing Akamai Intelligent Platform to deflect and reflect malicious attacks.
Posted: 04 Apr 2012 | Published: 04 Apr 2012

Akamai Technologies

Comprehensive Protection for Email and Web: The World's Most Critical Business Applications
sponsored by Fortinet, Inc.
WHITE PAPER: Email and the web have revolutionized business communication, providing an unmatched blend of reach, scalability, timeliness, efficiency and overall effectiveness.
Posted: 18 Feb 2008 | Published: 01 Dec 2006

Fortinet, Inc.

Protecting the Enterprise Against Today's Distributed Denial of Service (DDoS) Attacks
sponsored by Corero Network Security
WHITE PAPER: With today’s increasing reliance on the Internet, it is of utmost importance to ensure security and uninterrupted availability in order to maintain a competitive advantage. View this resource now to explore the risks of DDoS attacks, the latest DDoS attack trends, guidelines for a DDoS defense program and more.
Posted: 26 Mar 2012 | Published: 26 Mar 2012

Corero Network Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement