IT Systems  >   Communications Networks  >   Internet  >  

Domain Name Systems

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DNS
DEFINITION: A canonical name is the properly denoted host name of a computer or network server. A CNAME specifies an alias or nickname for a canonical host name record in a domain name system (DNS) database. In programming, the term "canonical" means "according to the rules." The DNS is the standard method of defining the locations of sites on the Internet, particularly Web sites.
Domain Name Systems Reports
1 - 25 of 52 Matches Previous Page  |  Next Page
Case Study: How a Large Global Retailer Found Online Security
sponsored by Neustar®
WEBCAST: In this video, hear from the CTO of the second-fastest growing online retailer in the world as he discusses DNS protection that will leave you knowing your site's secure.
Posted: 03 Apr 2015 | Premiered: Apr 3, 2015

Neustar®

Prevent Attacks with Secure DNS
sponsored by Neustar®
WEBCAST: In this brief video, learn all you need to know about DNS security and how you can protect your online presence.
Posted: 03 Apr 2015 | Premiered: Apr 3, 2015

Neustar®

4 Ways DNS Can Enhance Online Traffic & Security
sponsored by Neustar®
WHITE PAPER: In this white paper, discover 4 ways to optimize your DNS for better business and tighter security.
Posted: 02 Apr 2015 | Published: 11 Nov 2013

Neustar®

3 Questions to Ask Your DNS Host about Lowering DDoS Risks
sponsored by Neustar®
WHITE PAPER: Read this white paper to learn the three questions you absolutely need to ask your DNS host about DDoS protection.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Neustar®

Protecting Critical DNS Infrastructure Against Attack
sponsored by Radware
WHITE PAPER: This white paper delves into the challenges of protecting DNS from DDoS attacks as well as the three new attack techniques. View now to learn a three phase strategy to mitigate these attacks.
Posted: 31 Mar 2015 | Published: 08 May 2013

Radware

Case Study: Migrating from IPv4 to IPv6
sponsored by Efficientip
CASE STUDY: This case study explains how one University was able to implement an IP address management solution that streamlined DDI infrastructure management and prepared the network for migration to IPv6.
Posted: 26 Mar 2015 | Published: 26 Mar 2015

Efficientip

How to Ensure Your IP Address Management is Working Properly
sponsored by Efficientip
WHITE PAPER: Access this white paper for several guidelines designed to make your network's IP addressing environment as manageable, flexible, secure, reliable and responsive as possible.
Posted: 23 Mar 2015 | Published: 31 Dec 2014

Efficientip

Unveil the Truth Behind Application Delivery Controllers (ADCs)
sponsored by Citrix
WHITE PAPER: This white paper explains the fundamentals of a load balancing system and its evolution to an ADC.
Posted: 19 Mar 2015 | Published: 01 Aug 2013

Citrix

Guard Your DNS with Better Protection
sponsored by Efficientip
WHITE PAPER: This white paper introduces a comprehensive, efficient DNS protection system.
Posted: 10 Mar 2015 | Published: 31 Dec 2014

Efficientip

Stop DDoS Attacks with DNS Protection
sponsored by Efficientip
WHITE PAPER: Access this white paper now to read about effective DNS protection and to learn how you can shield yourself from DDoS attacks.
Posted: 09 Mar 2015 | Published: 31 Dec 2014

Efficientip

How Hybrid DNS Can Save Your Security
sponsored by Efficientip
WHITE PAPER: This white paper suggests how you can protect your web site security with a hybrid DNS system.
Posted: 06 Mar 2015 | Published: 31 Dec 2014

Efficientip

Hybrid Cloud Model Enhances DNS Security
sponsored by Efficientip
WHITE PAPER: This white paper suggests one way to prevent DNS compromises – a hybrid cloud DNS server.
Posted: 05 Mar 2015 | Published: 31 Dec 2014

Efficientip

Survey Reveals the Danger of DNS Attacks
sponsored by Efficientip
WHITE PAPER: This survey on DNS attacks reveals how powerful DNS attacks are and what securities are most effective against them.
Posted: 05 Mar 2015 | Published: 30 Jun 2014

Efficientip

5 Reasons Why Your DNS Protection Isn't Doing Enough
sponsored by Efficientip
WHITE PAPER: This white paper lists 5 ways that traditional security solutions fail against DNS attacks.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

Efficientip

Why DNS Security is Essential
sponsored by Cloudmark
WHITE PAPER: This white paper covers exactly how attackers use DNS to compromise a network.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Cloudmark

Cloudmark Security Platform for DNS
sponsored by Cloudmark
ASSESSMENT TOOL: If you suspect that your DNS has been compromised, use this DNS analysis page from Cloudmark to send them a traffic sample for complimentary analysis—the first step to take along the path to proven security success.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

Cloudmark

A New Approach to DNS Security
sponsored by Cloudmark
VIDEO: This short video introduces a security platform that provides comprehensive protection of DNS networks, infrastructure, and traffic without the rigidity and cost of most network security solutions.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Cloudmark

Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

Infographic: Is Your DNS Really Protected?
sponsored by Cloudmark
RESOURCE: View this informative infographic now to learn more about the consequences of DNS attacks, and how you can prevent them within your enterprise.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Cloudmark

Protecting DNS Infrastructure: An Internet Utility That Demands New Security Solutions
sponsored by Cloudmark
WHITE PAPER: This exclusive white paper details key factors about the DNS threat landscape and offers a look at different security risks and types of attacks hackers are using to disrupt the network today. Read on to learn more.
Posted: 13 Jan 2015 | Published: 13 Jan 2015

Cloudmark

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Defending Against Application-Layer DDoS Attacks
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper explains the serious problem that DDoS threats present, and how it impacts your business.
Posted: 25 Jun 2014 | Published: 31 Dec 2013

Juniper Networks, Inc.

Protecting DNS Infrastructure—Inside and Out
sponsored by Infoblox
WHITE PAPER: This white paper unveils the critical risk your domain name system (DNS) is in, and offers leading strategies to help you protect your infrastructure against outside-in and inside-out threats.
Posted: 30 May 2014 | Published: 29 May 2014

Infoblox

Creating a Best-of-Breed DDI Solution in a Microsoft Environment
sponsored by Infoblox
WHITE PAPER: Access this informative whitepaper and learn how you can implement effective DNS, DHCP, and IP address management (DDI).
Posted: 22 May 2014 | Published: 22 May 2014

Infoblox

DNS in the Cloud: Building a Secure DNS Architecture
sponsored by F5 Networks
EGUIDE: Access this expert e-guide about DNS in the cloud to unveil the suggested tactics to improve DNS architectures and security, including DNSSEC signed zones.
Posted: 29 Jan 2014 | Published: 29 Jan 2014

F5 Networks
1 - 25 of 52 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement