DDoS White Papers

In computer security, a Denial-of-Service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users. Typically the targets are high-profile web servers where the attack is aiming to cause the hosted web pages to be unavailable on the Internet. It is a computer crime that violates the Internet proper use policy as indicated by the Internet Architecture Board (IAB).
Results 1 - 25 of 88Sort Results By: Published Date | Title | Company Name
By: Adlib Software     Published Date: Jan 13, 2014

Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.

Tags : content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion, sharepoint, filenet, documentum, ecm, opentext, archive, assets, digital assets, website development, networking, it management, knowledge management
    
By: ThousandEyes     Published Date: Jan 14, 2018

ThousandEyes highlights the impact of an ongoing DDoS attack, provides visibility into the effectiveness of the mitigation and provides insight into the strategies of DDoS mitigation vendors.

Tags : thousandeyes, ddos, migration, network migration, network security, wireless security, data protection, secure content management
    
By: Lenovo     Published Date: Oct 14, 2016

Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!

Tags : security, ransomware, spyware, malware, theft, it threat, anti spyware, ddos, hacker detection, internet security, security management
    
By: Dyn     Published Date: Oct 04, 2016

Distributed Denial of Service (DDoS) attacks increased by over 100% YoY. With nearly a quarter of the attacks aimed at the DNS layer and close to 80% not identified until they reach the DNS layer, it is no secret you should evaluate your Manage DNS provider critically as your first line defense in DDoS mitigation. Download this eBook to best equip your business against impending DDoS attacks including: • Common types of DDoS attacks and which layers of your infrastructure are most at risk • How to geographically isolate attacks and mitigate latency • How to get the best before, during and after attack protection

Tags : ddos, dns, cdn, attacks, internet security, ipsec
    
By: Kaspersky     Published Date: May 11, 2016

As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.

Tags : kaspersky, cybercrime, cyber attack, ddos, hackers, roi, security breach, firewall, mobile security, network security, email security, firewalls, hacker detection, internet security, intrusion prevention, security policies, wireless security, return on investment, business technology, data loss prevention
    
By: Cisco     Published Date: Mar 16, 2016

This white paper published by Frost & Sullivan and Cisco examines the role, capabilities, and advantages of service providers in the DDoS mitigation process, as well as how this role might develop in the future.

Tags : service providers, ddos, security, cyber security, cyber threats, cyber attack, ddos attacks, access control, anti spam, anti spyware, anti virus, application security, internet security, intrusion detection, intrusion prevention
    
By: Akamai Technologies     Published Date: Mar 10, 2016

When your Internet-facing network comes under DDoS attack, does your entire organization panic – or does everyone know exactly what to do? Read this whitepaper to learn how to protect network assets, websites, and web applications against DDoS attacks and best practices for adding DDoS mitigation to a corporate incident response plan.

Tags : ddos mitigation, best practices, akamai technology, cyberdefense, cyber security, anti spam, anti virus, ddos, hacker detection, internet security, intrusion detection, intrusion prevention
    
By: ArborNetworks     Published Date: Feb 12, 2016

Today’s DDoS attacks are an easy way to interrupt businesses.

Tags : ddos protection, arbor networks, insegment, best practices, policies, data, application security, ddos, internet security, intrusion prevention, security policies, vulnerability management
    
By: Arbor Networks     Published Date: Mar 23, 2015

After a discussion of the costs of DDoS attacks and current mitigation solutions, this paper examines Arbor Cloud, a DDoS service from Arbor Networks. This Technology Spotlight also provides advice for organizations evaluating DDoS mitigation solutions.

Tags : arbor networks, arbor, ddos, denial of service, denial of service attacks, network security, network overload, internet security, web service security, data protection, customer experience management, business technology
    
By: F5 Networks     Published Date: Mar 18, 2015

The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs, and stay protected in the future.

Tags : f5 networks, ddos, ip security, real time attack, data protection, secure business, network security, hacker detection, intrusion prevention, data loss prevention
    
By: Arbor Networks     Published Date: Mar 13, 2015

Having the right tools and establishing key processes in advance can help prevent or mitigate the impact of a DDoS attack. Learn more by downloading this complimentary toolkit with research and best practices from Gartner and Arbor Networks.

Tags : arbor, arbor networks, ddos, denial of service, ddos attack, cloud ddos protection, network security, web service security, database security, cloud computing, business technology, data loss prevention
    
By: Dyn     Published Date: Jan 14, 2015

A DDoS Attack or distributed denial of service attack can happen to any online entity, at any time. By overwhelming your DNS infrastructure, malicious attackers can impair your website, tarnish your company’s reputation, and impact your bottom line. So what are your company’s risks and how can you mitigate them?

Tags : mitigation, dns ddos, ddos attacks, business security, bottom line, mitigation, improve results, cloud based, migration, monitoring, ddos, business intelligence
    
By: Dyn     Published Date: Jan 14, 2015

Every user’s first interaction with your website begins with a series of DNS queries. Poor DNS performance can lead to slow page loads, dissatisfied customers, and lost business. However, you can improve results, contain costs, and make better use of valuable IT personnel by leveraging a cloud-based DNS service.

Tags : cloud based, dns service, ddos attack, user experience, infrastructure, dns performace, ddos, business intelligence
    
By: Dyn     Published Date: Jan 14, 2015

Take a few minutes to read this whitepaper, evaluate the potential risk and the potential cost a DDoS attack will have on your business and gain key tips on how to mitigate both.

Tags : ddos attack, integration, mitigation, ddos outage, business protection, business security, infrastructure, ddos, business intelligence
    
By: Dyn     Published Date: Jan 14, 2015

Whether you are a seasoned expert or just beginning to look into how DNS can improve the performance of your businesses’ services, let this quick guide to DNS terminology be your comprehensive one-stop shop.

Tags : dns, domain name system, ip addresses, terminology, denial of service, query, cache, dns client, ddos, business intelligence, ebusiness
    
By: Corero     Published Date: Dec 05, 2014

Few hosting providers today offer sufficient protection from DDoS attacks, so those that can implement robust DDoS attack protection will be able to more efficiently protect their hosted infrastructure and gain a competitive advantage in the marketplace. They’ll also be positioned to create incremental revenue streams from high-value, managed DDoS attack protection services.

Tags : corero, ddos, distributed denial of service, data protection, ddos attack, threat protection, hosted threats, intrusion prevention, customer satisfaction, data center design and management, colocation and web hosting, data loss prevention
    
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics, business continuity, compliance, ddos, disaster recovery, email security, encryption, firewalls, hacker detection, high availability, identity management, internet security, intrusion detection
    
By: Riverbed     Published Date: Aug 22, 2014

Businesses rely on SharePoint availability and performance. This infographic shows the impact of SharePoint slowdowns, challenges with delivering SharePoint and recommendations for an effective SharePoint deployment.

Tags : business performance, sharepoint availability, performance, challenges, delivery, recommendation, effective, deployment, network performance, network performance management, ddos, application performance management, productivity, service management
    
By: Citrix     Published Date: May 08, 2014

A report into the need for datacenter security and how Citrix NetScaler is the solution.

Tags : datacenter security, netscaler, citrix, defense, access control, application security, ddos, internet security, application integration, data protection, data center, mobile device management
    
By: Citrix     Published Date: May 08, 2014

A report into the marked insurgence of denial of service (DoS) attacks and the benefits of Citrix NetScaler in the defense of these attacks.

Tags : denial of service, dos, adc, defence, security, citrix, netscaler, access control, ddos, intrusion prevention, application integration, application performance management, mobile device management
    
By: Staminus Communications     Published Date: May 06, 2014

In this installment of a series of white papers about the true cost of DDoS attacks, StamSOC (Staminus Security Operation Center) will discuss the history of the attacks, the wide reaching impacts, and the true costs associated with DDoS attacks.

Tags : staminus communications, staminus, ddos, ddos attacks, hosting security, security, hacker detection, intrusion prevention, voice over ip, data center design and management, vulnerability management
    
By: Black Lotus     Published Date: Apr 21, 2014

Newly updated for April 2014 with Q1 attack data, download the latest DDoS Threat Advisory from Black Lotus to learn about the latest threats facing your company.

Tags : black lotus, black lotus communications, ddos, denial of service, security threat, hackers, spam, fishing, firewall, intrusion, mobile secuirty, network security, firewalls, hacker detection, internet security, intrusion prevention, data protection, data loss prevention
    
By: Citrix     Published Date: Apr 16, 2014

This white paper examines the current DoS landscape and discusses common approaches for dealing with the modern DoS threat.

Tags : dos, denial of service, citrix, netscaler, http attacks, posts attacks, migration, data protection, network security, ddos, wireless security, data loss prevention, infrastructure management
    
By: Imperva     Published Date: Nov 07, 2013

This white paper outlines the application threat landscape; explains why next generation firewalls are ill-equipped to stop web attacks; and provides six essential requirements for protecting web applications.

Tags : imperva, web applications, web application security, ddos, web attack, data protection, firewalls, next gen firewalls, validation, sql injection, hacker detection, single sign on, web services, web service security, database security
    
By: F5 Networks Inc     Published Date: Oct 31, 2013

Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.

Tags : distributed denial of service, ddos, mitigation, f5 technology, taxonomy, network attacks, session attacks, application attacks, business logic attacks, security, protections, data loss prevention, attack tools, network reconnaissance, low-bandwith asymmetric attacks, anti-attack technology, network security, application security, security management
    
Start   Previous   1 2 3 4    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.