Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

dos

Results 251 - 275 of 495Sort Results By: Published Date | Title | Company Name
Published By: Infoblox     Published Date: Dec 28, 2012
Learn about defeating Dos/DDoS attacks in real time -- Know about the causes of rapid growth in the number of Denial of Service (DoS/DDoS) attacks and more.
Tags : 
infoblox, dos, ddos, denial of service attacks, security, denial of service, isp, internet service provider
    
Infoblox
Published By: Infoblox     Published Date: Sep 04, 2013
Press headlines are filled by reports of malware attacks. Malware attacks, once the reserve of amateurs largely for amusement, are now launched by a number of entities. Today, a malware attack can literally come from anywhere in the world and can impact even the largest organization.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Infoblox     Published Date: Sep 04, 2013
Security challenges, costs & solutions for IT practitioners
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Infoblox     Published Date: Nov 07, 2013
According to the Ponemon Institute, the annual cost of malware breaches averaged $8.4 million. Read this white paper to gain insights into critical information to safeguard against DNS security threats and disrupt malware communications to your DNS servers.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Infoblox     Published Date: Sep 09, 2014
Stories about devastating cyberattacks are plaguing the news. Why? The DNS protocol is easy to exploit. See your network the way hackers do—as an easy target. Learn how you can effectively secure your DNS infrastructure today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Infoblox     Published Date: Sep 09, 2014
DNS is a key part of enterprise networks but increasingly targeted by hackers. Traditional security measures such as next-generation firewalls or secure web gateways won’t shield your infrastructure from attacks. Learn how to protect your DNS today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Infoblox     Published Date: Sep 09, 2014
An integrated DNS architecture is needed in today’s networking landscape. Designing a secure DNS architecture requires more than increased bandwidth and QPS. Learn how to build a secure and scalable DNS solution to ensure network availability.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Infor     Published Date: Mar 07, 2017
El objetivo de las operaciones de un almacén es dar una respuesta perfecta los pedidos: entregar exactamente lo que un cliente pide, a tiempo y con una eficiencia óptima. El módulo de almacenes de una solución de planificación de recursos empresariales (ERP – Enterprise Resources Management) puede ayudar a los almacenes más pequeños. Pero los módulos de gestión de almacenes de los ERP tienen limitaciones y, en el caso de empresas con operaciones más complejas, puede ser más inteligente optar por las capacidades adicionales de un sistema de gestión de almacenes avanzado (WMS, Warehouse Management System).
Tags : 
    
Infor
Published By: Infor     Published Date: Mar 07, 2017
Como responsable de ventas y operaciones, usted tiene importantes responsabilidades, tales como establecer prioridades, planificar e implementar estrategias de la cadena de suministro, impulsar mejoras y, al mismo tiempo, adaptarse rápidamente a los requisitos cambiantes del mercado y de los clientes, y ajustar esos cambios en la demanda y en la oferta, y todo sin olvidar los resultados financieros.
Tags : 
    
Infor
Published By: Infor     Published Date: Jun 13, 2017
El retorno de la inversión de la digitalización se puede acelerar reduciendo costes o aumentando ingresos. Según se detalla en «El próximo gran paso en fabricación: construir un Ecosistema industrial digital», casi dos terceras partes de los fabricantes esperan que las tecnologías de fabricación digitales, les ayuden a reducir los gastos generales al menos en un 11%.
Tags : 
    
Infor
Published By: Intel     Published Date: Aug 24, 2017
Debido a los cambios tecnológicos que se están dando en las organizaciones, estas dependerán cada vez más de plataformas digitales para proveer sus productos y servicios. Más de la mitad de las empresas con las que hablamos, dijeron que incrementarían sus gastos en su principal hosting, y en su CSP (Proveedor de Servicio de Nube) para el 2017, y los planes por Q para alojamiento así como CSP demuestran que los gastos irán incrementando persistentemente. Al suscribirte, estás confirmando que eres mayor de 18 años, y que estás de acuerdo con que Intel te contacte a través de emails relacionados a marketing o por teléfono con información sobre productos de Intel, eventos y actualizaciones. Puedes cancelar tu suscripción cuando quieras. Las páginas web de Intel están sujetas a nuestro aviso de privacidad y Términos y Usos.
Tags : 
    
Intel
Published By: Intel     Published Date: Aug 24, 2017
La demanda de los clientes por servicios basados en la nube sólo aumentará en los próximos años. En este mercado altamente competitivo, los CSP que pueden operar más eficientemente y ofrecer los servicios más innovadores obtendrán la mayor base de clientes.
Tags : 
    
Intel
Published By: Intel     Published Date: Sep 05, 2017
Intel® Xeon® y Microsoft® Azure™, apoyando el crecimiento de la CRE. Las atribuciones de la CRE se han triplicado tras la aprobación de La Reforma Energética en 2013, por ende la CRE se enfrentó a nuevos retos que implicaron una profunda y rápida reestructuración en la forma de trabajo. La creación de la Oficialía de Partes Electrónica (OPE) y la decisión de utilizar una nube híbrida para hacer llegar estos servicios directamente a los permisionarios fueron factores determinantes para lograr alcanzar las metas. Al suscribirte, estás confirmando que eres mayor de 18 años, y que estás de acuerdo con que Intel te contacte a través de emails relacionados a marketing o por teléfono con información sobre productos de Intel, eventos y actualizaciones. Puedes cancelar tu suscripción cuando quieras. Las páginas web de Intel están sujetas a nuestro aviso de privacidad y Términos y Usos.
Tags : 
    
Intel
Published By: Ipswitch     Published Date: Mar 14, 2014
Due to the massive volume and complexity of the information – compounded by the use of cumbersome DOS scripts – Viva Health needed to simplify and automate their file transfer processes while also remaining in compliance of various regulations. See how they accomplished both objectives with MOVEit Central.
Tags : 
ipswitch, moveit, information management, automation, file transfer, file transfer process, regulatory compliance, file transfer system
    
Ipswitch
Published By: Juniper Networks     Published Date: Sep 10, 2014
Understand the changing threat landscape and how to secure your business against Distributed Denial of Service attacks with our Whitepaper. Read about the latest detection and mitigation strategies to ensure always-on protection.
Tags : 
security, ddos attacks, detection, prevention, mitigation strategy, always on-protection
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 19, 2015
Apprenez à protéger votre réseau, aujourd'hui et à l'avenir. Lisez notre dossier de solutions et découvrez comment vous protéger face à des menaces passant par le contenu et les applications, gérer la bande passante et réduire la complexité grâce à notre pare-feu de nouvelle génération.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks vSRX Virtual Firewall vs. the Competition
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: Kaspersky     Published Date: May 11, 2016
As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.
Tags : 
kaspersky, cybercrime, cyber attack, ddos, hackers, roi, security breach, firewall
    
Kaspersky
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Small-to-medium sized businesses (SMB) are increasingly relying upon web-based applications and web-enabled services for running their business. Applications such as CRM, e-commerce transactions and other web-enabled applications are accessed both locally and remotely from outside the business facilities. These web-based applications are vulnerable to attacks from viruses, intrusions, and denial of service (DoS) attacks, as traffic comes into the network through various ports and firewalls without being inspected.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
    
KEMP Technologies
Published By: Lane Telecommunications     Published Date: Apr 14, 2009
The fax market is changing significantly though not in the way predicted by many. Far from an inevitable decline brought about by the emergence of e-mail, the demand for fax, particularly from larger companies, is actually growing. The way that fax is managed within the business is also undergoing a significant period of transition.
Tags : 
kudos, lane, lane telecommunications, fax over ip, foip, ip network, integrated business communications, integrated ip
    
Lane Telecommunications
Published By: Lane Telecommunications     Published Date: Apr 14, 2009
The introduction of e-mail and its exponential expansion into every aspect of business life presented a significant challenge to the fax industry and for some observers it was a foregone conclusion that fax was destined for a rapid demise. It is interesting to note, therefore, that fax has actually continued on a steady growth path that is predicted to continue well into the future.
Tags : 
kudos, lane, fax, foip, fax over internet protocol, migration strategy, network resources, multifunctional peripherals
    
Lane Telecommunications
Published By: Lane Telecommunications     Published Date: Apr 14, 2009
There is little doubt that Multi Function Peripherals (MFP) offer businesses of all sizes significant benefits: they combine printing, scanning, copying and fax functions in one machine and deliver considerable cost and space savings. They also address some very important business process, management and legal issues faced by virtually every business. Within this discussion document we concentrate on the fax element and look specifically at the integration of MFPs with network fax run through a fax server such as Lane’s Passport Fax Server.
Tags : 
fax over internet protocol, mfp, multi function peripherals, network fax, erp applications, off-the-shelf, compliance, fragmented audit trail
    
Lane Telecommunications
Published By: Lenovo and Intel     Published Date: Oct 17, 2016
Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!
Tags : 
security, ransomware, spyware, malware, theft, it threat
    
Lenovo and Intel
Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!
Tags : 
security, ransomware, spyware, malware, theft, it threat
    
Lenovo and Intel®
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.