IT Management  >   Systems Operations  >   Network Management  >  

Domain Management

RSS Feed    Add to Google    Add to My Yahoo!
Domain Management Reports
 
Understanding and Mitigating DDoS
sponsored by Dyn
WHITE PAPER: DoS/DDoS attacks aren't going anywhere and they're only getting harder to detect and remedy. You need a highly resilient DNS infrastructure to mitigate today's sophisticated attacks.This white paper reviews DNS Denial of Service attack concepts and mitigation strategies.
Posted: 11 Mar 2016 | Published: 24 Feb 2016

Dyn

IPv6 Transition Planning and Strategies for DHCP and DNS
sponsored by Cisco Systems, Inc.
WHITE PAPER: IPv4 addresses are running out and service providers need to make immediate decisions regarding deployment of IPv6. This paper will outline strategic considerations and approaches to the transition to IPv6 in a service provider environment.
Posted: 03 Aug 2011 | Published: 03 Aug 2011

Cisco Systems, Inc.

The F5 Intelligent DNS Scale Reference Architecture
sponsored by F5 Networks
WHITE PAPER: The Domain Name System (DNS) is arguably the primary technology enabling the internet. This guide explores why DNS architecture is essential to your network and how you can build an available, intelligent, secure, and scalable infrastructure.
Posted: 22 Jan 2014 | Published: 30 Nov 2013

F5 Networks

Why Managed DNS Services and Why Now?
sponsored by Verisign, Inc.
WEBCAST: In this webinar Yankee Group presents its Managed DNS Service Bill of Rights - what Enterprises need to expect and demand from a managed DNS service provider.
Posted: 03 Jun 2011 | Premiered: Jun 3, 2011

Verisign, Inc.

Managing DNS Services for Greater Network Security and Availability
sponsored by Neustar®
WHITE PAPER: Learn how to manage your DNS services for greater network security and availability.
Posted: 24 Aug 2007 | Published: 01 Aug 2007

Neustar®

Cisco Prime Network Registrar
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn about a solution that will help you simplify the management of IP addresses and ease your transition to IPv6.
Posted: 02 Jul 2012 | Published: 29 Feb 2012

Cisco Systems, Inc.

DNS Attack Prevention: Inside DNS Components Vulnerable to Attack
sponsored by F5 Networks
EGUIDE: In this expert e-guide, industry leader Char Sample explains why the domain name system (DNS) is an attractive target for hackers, and which of its 4 components is most vulnerable. Click now to also unveil 3 mitigation tactics.
Posted: 29 Jan 2014 | Published: 29 Jan 2014

F5 Networks

STATE OF DNS AVAILABILITY REPORT
sponsored by Verisign, Inc.
WHITE PAPER: View this informative white paper to learn more about the domain name system vulnerabilities that you should keep in mind for the busy season. Find out some of the challenges of availability and the impact downtime can have on your enterprise by accessing this resource.
Posted: 26 Sep 2012 | Published: 26 Sep 2012

Verisign, Inc.

DNS in the Cloud: Building a Secure DNS Architecture
sponsored by F5 Networks
EGUIDE: Access this expert e-guide about DNS in the cloud to unveil the suggested tactics to improve DNS architectures and security, including DNSSEC signed zones.
Posted: 29 Jan 2014 | Published: 29 Jan 2014

F5 Networks

IT service management in a virtualized world
sponsored by FrontRange Solutions Inc.
WHITE PAPER: Many IT organizations are excited about the prospects of incorporating Cloud-based technologies into their present/future vision. Download this whitepaper and learn how you can leverage Cloud services for increased resiliency and efficiency.
Posted: 02 Jul 2013 | Published: 02 Jul 2013

FrontRange Solutions Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement