IT Systems  >   Communications Networks  >   Internet  >  

DNS

RSS Feed   
DNS Reports
 
How Securing Recursive DNS Proactively Protects Your Network
sponsored by Akamai Technologies
WHITE PAPER: Security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy, most IT departments still fail to explicitly protect the Domain Name System (DNS). Discover why this Internet protocol doesn't have to be a vulnerability.
Posted: 19 Jun 2018 | Published: 19 Jun 2018

Akamai Technologies

The Top 4 Networking Pitfalls to Avoid when Deploying Office 365
sponsored by Zscaler
WHITE PAPER: This white paper explores how to plan your Office 365 deployment strategically and make sure that your network, bandwidth, and firewalls are up to the task. Discover 4 of the top pitfalls to avoid when setting up your deployment so that you can ensure SaaS app performance and security.
Posted: 01 Aug 2018 | Published: 31 Dec 2017

Zscaler

Passive DNS for Threat Intelligence
sponsored by Farsight Security
RESOURCE: This technology overview explores how real-time and historical passive DNS data allows security analysts to enrich and refine existing threat data to transform threat feeds into actionable, relevant threat intelligence.
Posted: 23 May 2018 | Published: 23 May 2018

Farsight Security

Relayd vs. DNSdist
sponsored by Men and Mice
WEBCAST: Learn how DNS clients in different operating systems choose their DNS resolver among a list of available servers and how to minimize DNS threats with open-source load balancing tools.
Posted: 06 Nov 2017 | Premiered: Dec 8, 2016

Men and Mice

Using DNS Monitoring to Detect Network Breaches
sponsored by Dyn
EGUIDE: Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

Creating a Best-of-Breed DDI Solution in a Microsoft Environment
sponsored by Infoblox
WHITE PAPER: Access this informative whitepaper and learn how you can implement effective DNS, DHCP, and IP address management (DDI).
Posted: 22 May 2014 | Published: 22 May 2014

Infoblox

DevOps and DNS: Improving Web Application Performance at the DNS Layer
sponsored by Oracle Dyn
EBOOK: Find out how DNS can be combined with DevOps practices to deliver a modern, internet-driven system that fuels high web app performance.
Posted: 04 Jun 2018 | Published: 31 Dec 2017

Oracle Dyn

IBM X-Force 2013 Mid-Year Trend and Risk Report
sponsored by IBM
WHITE PAPER: In this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).
Posted: 06 Nov 2013 | Published: 30 Sep 2013

IBM

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

Rethink DNS to Optimize Performance and Manage Traffic in Hybrid Clouds
sponsored by Oracle Dyn
EBOOK: In this Rethink DNS e-book, discover smarter ways to use DNS to optimize network performance, build resiliency, and manage traffic across hybrid cloud environments.
Posted: 01 Jun 2018 | Published: 01 Jun 2018

Oracle Dyn
 
Browse by Report Type:
DNS White Papers | DNS Multimedia | DNS IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement