Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

dos

Results 76 - 100 of 495Sort Results By: Published Date | Title | Company Name
Published By: Arbor Networks     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches.
Tags : 
cyber threats, security, ddos, data breaches, atlas, frost & sullivan, cloud, hosting
    
Arbor Networks
Published By: Arbor Networks     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, cyber attacks, research, enterprise, mobile, cloud, security
    
Arbor Networks
Published By: Arbor Networks     Published Date: Jan 31, 2013
Because of the damage they cause and the bewildering speed with which they mutate, botnets are perceived as malevolent and unstoppable. Fortunately there are companies such as Arbor Networks, which are dedicated to analyzing and stopping botnets.
Tags : 
anatomy of a botnet, botnet, ddos, global basis, distributed denial of service, analyzing, service, arbor networks
    
Arbor Networks
Published By: Arbor Networks     Published Date: Jan 31, 2013
This paper will look at DDoS attacks in detail. It will illustrate the attack vectors being used and describe why the threat to organizations is greater than ever before
Tags : 
anti-ddos, products, services, critical, business environment, ips devices, firewall, arbor network
    
Arbor Networks
Published By: Arbor Networks     Published Date: Jan 31, 2013
This white paper examines why IPS devices and firewalls fail to stop DDoS threats. It also describes how an intelligent DDoS mitigation system (IDMS) offers an ideal solution by enabling a layered defense strategy to combat DDoS attacks.
Tags : 
firewalls, intrusions, ips, fall short on ddos protection, ips devices, ddos attacks, security, it management
    
Arbor Networks
Published By: Arbor Networks     Published Date: Jan 31, 2013
This Frost & Sullivan whitepaper provides an overview of the latest DDoS attack trends, and offers examples of how cloud service and hosting providers can use Arbor Networks solutions to protect their data centers from DDoS attacks and more.
Tags : 
security, it management, data center
    
Arbor Networks
Published By: Arbor Networks     Published Date: Mar 06, 2013
According to Infonetics Research, the DDoS market is being driven by high visibility attacks, Internet traffic growth, enterprise, mobile and managed security services demand. Learn more with this Infonetics Research report on DDoS.
Tags : 
arbor networks, ddos, security, infonetics, prevention appliance report, data center
    
Arbor Networks
Published By: ArborNetworks     Published Date: Sep 16, 2015
Don't ignore DDoS; instead, take preventive action. With that in mind, IDC believes that hybrid defense scenarios (on-premises equipment married with cloud services) will continue to grow as organizations seek to parry advanced application and large-scale volumetric attacks and as solution providers and product vendors work to deliver joint solutions.
Tags : 
networking, security, it management
    
ArborNetworks
Published By: ArborNetworks     Published Date: Nov 30, 2015
This paper outlines the challenges of DDoS attacks and describes the features you need in a DDoS prevention solution to more effectively protect your network from these threats.
Tags : 
arbor, ddos, protection, enterprise, data security, security
    
ArborNetworks
Published By: ArborNetworks     Published Date: Nov 30, 2015
This white paper will walk you through four steps essential to building a business case for better DDoS protection— one that’s compelling to your business as a whole.
Tags : 
arbor, ddos, threat, protection, security
    
ArborNetworks
Published By: ArborNetworks     Published Date: Feb 12, 2016
DDoS prevention appliances are the first line of defense for most service providers and large enterprises around the globe looking to protect themselves from brute-force attacks on network or resource availability, and with the unprecedented number, size, and coverage of DDoS attacks since the floodgates opens in 2008, vendors who build DDoS prevention solutions have seen and continue to see a significant increase in demand. This report covers actuals for 4Q14 and 1Q15.
Tags : 
arbor network, ddos, service provider, biannual report, security
    
ArborNetworks
Published By: ArborNetworks     Published Date: Feb 12, 2016
Today’s DDoS attacks are an easy way to interrupt businesses.
Tags : 
ddos protection, arbor networks, insegment, best practices, policies, data
    
ArborNetworks
Published By: ArborNetworks     Published Date: Feb 12, 2016
The modern enterprise is dependent upon connectivity at every level. Every business initiative, whether driven by sales, marketing, manufacturing, finance, R&D or HR, is dependent upon reliable network availability and continuity. Disrupting that continuity is what Distributed Denial of Service (DDoS) attacks are all about.
Tags : 
arbor network, ddos, enterprise, attack, network
    
ArborNetworks
Published By: Aruba Networks     Published Date: Nov 15, 2013
El lugar de trabajo de la próxima generación se centra totalmente en la movilidad. En este año 2013 hay más dispositivos móviles con conexión a Internet que personas en el planeta, de modo que la tecnología informática debe proporcionar una conectividad sin restricciones a cada tipo de usuario —trabajadores, contratistas, invitados e incluso clientes— apropiada para la función de cada uno y el tipo de dispositivo que utiliza. Se pone de manifiesto que la movilidad en el lugar de trabajo no es sólo para el beneficio propio del usuario y de la productividad. La migración hacia la movilidad genera varias ventajas en TI. Descárguese este documento técnico para descubrir las ventajas....
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs
    
Aruba Networks
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
Se prevé que los ciberataques tendrán un coste de 6 billones de dólares para la economía mundial en 2021, en comparación con los 3 billones de dólares de 2016. Algunos los describen como «la mayor amenaza para empresas de todo el mundo». La preocupación pública por la seguridad de los datos está aumentando, no solo por los delitos que se cometen con los datos sustraídos, sino también por cómo usan nuestros datos personales las empresas con las que interactuamos.
Tags : 
rgpd, repercusion, entorno, gestion, datos
    
AstuteIT_ABM_EMEA
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 12, 2018
En un momento en que las empresas pretenden emular la agilidad de desarrollo de las compañías de Internet e innovar en mercados muy competitivos, el desarrollo de las aplicaciones se ha hecho cada vez más complejo. Los ingentes códigos fuente monolíticos que tradicionalmente acompañan a las aplicaciones empresariales ralentizan el lanzamiento de nuevos servicios. Además, la dispersión y aislamiento de los equipos de desarrollo y de operaciones dificultan la coordinación. A eso hay que añadirle que los usuarios son cada vez más exigentes y las empresas deben escalar y monitorizar las implementaciones para poder ofrecer una experiencia satisfactoria y un gran rendimiento. Todo ello, desde luego, sin interrumpir los servicios.
Tags : 
microservicios, evolucion, arquitectura, aplicaciones, modernas
    
AstuteIT_ABM_EMEA
Published By: AT&T     Published Date: Jul 28, 2015
Download this white paper to learn how AT&T DDoS Defense with KONA Site Defender service can extend protection from origin servers to edge servers for a comprehensive, multi-level approach to security.
Tags : 
at&t, ddos, ddos attack, kona site defender, origin services, security, cybersecurity, hackers
    
AT&T
Published By: AT&T     Published Date: Jul 28, 2015
Read through the AT&T Top Readiness Tips below and see if you’re prepared for a DDoS attack and if not, what actions you can take today to get ready.
Tags : 
at&t, ddos, ddos attack, security, preparedness, cybersecurity, hackers
    
AT&T
Published By: Avi Networks     Published Date: May 14, 2018
Avi Vantage is the only solution that delivers built-in application analytics in addition to enterprise-grade load balancing and application security. With millions of data points collected in real time, the platform delivers network-DVR like capabilities with the ability to record and display application analytics over specific time intervals (last 15 minutes, hour, day, week etc.) or for individual transactions. These application insights including total round trip time for each transaction, application health scores, errors, end user statistics, and security insights (DDoS attacks, SSL vulnerabilities, ciphers etc.) simplify troubleshooting of applications.
Tags : 
    
Avi Networks
Published By: AWS     Published Date: Jul 16, 2019
Ypsomed is a leader in the development and manufacturing of injection and infusion systems. The company is keenly aware of the multi-billion dollar problem of poor medication adherence and the need to measure medicine intake and ensure doses are taken at the correct time. Ypsomed sought to create a digital solution for medication adherence monitoring and smart device management for contract research organizations’ (CROs) use in clinical trials, including self-injection systems for trial participants to administer medications at home. Yet the company faced serious demands for remote device management, global scale, and privacy and security regulations such as HIPAA and GDPR. To solve these challenges, Ypsomed adopted Philips’ HealthSuite digital platform (HSDP), a cloud platform built on Amazon Web Services (AWS). HSDP allows Ypsomed to connect devices to the cloud and remotely manage them; store data; and manage and scale services globally within healthcare regulatory, privacy, and s
Tags : 
    
AWS
Published By: Black Lotus     Published Date: Apr 21, 2014
Newly updated for April 2014 with Q1 attack data, download the latest DDoS Threat Advisory from Black Lotus to learn about the latest threats facing your company.
Tags : 
black lotus, black lotus communications, ddos, denial of service, security threat, hackers, spam, fishing
    
Black Lotus
Published By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
    
Butler Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
As empresas que dependem muito da TI para prestar serviços aos clientes são movidas constantemente pelas pressões do mercado para desenvolver e lançar novas funções de software que atendam às exigências cada vez maiores. Facilitar a colaboração entre o desenvolvimento e as operações de TI e colocar o aplicativo no mercado mais rapidamente e com maior qualidade são fundamentais para o sucesso dos negócios. Este resumo da solução apresenta informações sobre o movimento do DevOps, por que ele é importante e como é possível cruzar o abismo para melhorar a colaboração e gerar rapidamente valor para a empresa. Você aprenderá como as soluções da CA Technologies para DevOps otimizarão seu portfólio de tecnologias de TI em um ritmo de versões mais previsível e rápido, permitindo confirmar os resultados de cada fase do ciclo de vida do software que sejam positivos para a empresa.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
À medida que a complexidade dos aplicativos aumenta e a exigência da redução do tempo de colocação no mercado continua aumentando, as empresas adotam cada vez mais a solução Application Release Automation para manter sua vantagem competitiva. Este white paper ajudará a entender como a solução Application Release Automation pode ajudar você a economizar recursos valiosos e otimizar seu processo de implementação de aplicativos, e evitar muitos dos problemas que os clientes sofrem no momento de desenvolver e manter scripts com recursos próprios.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
"As empresas que dependem muito da TI para prestar serviços aos clientes são movidas constantemente pelas pressões do mercado para desenvolver e lançar novas funções de software que atendam às exigências cada vez maiores. Facilitar a colaboração entre o desenvolvimento e as operações de TI e colocar o aplicativo no mercado mais rapidamente e com maior qualidade são fundamentais para o sucesso dos negócios. Este resumo da solução apresenta informações sobre o movimento do DevOps, por que ele é importante e como é possível cruzar o abismo para melhorar a colaboração e gerar rapidamente valor para a empresa. Você aprenderá como as soluções da CA Technologies para DevOps otimizarão seu portfólio de tecnologias de TI em um ritmo de versões mais previsível e rápido, permitindo confirmar os resultados de cada fase do ciclo de vida do software que sejam positivos para a empresa."
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.