ddos

Results 1 - 25 of 202Sort Results By: Published Date | Title | Company Name
Published By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
    
Limelight
Published By: F5 Networks     Published Date: Mar 18, 2015
The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs, and stay protected in the future.
Tags : 
f5 networks, ddos, ip security, real time attack, data protection, secure business
    
F5 Networks
Published By: Limelight Networks     Published Date: Feb 21, 2018
From the boardroom to the backroom, everyone is looking for ways to protect their digital content from cyber threats like DDoS attacks, unauthorized access or theft. In this white paper, we’ll discuss ten different ways to protect your digital content, ensure high availability and maintain superior quality of experience for every digital visitor.
Tags : 
    
Limelight Networks
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks
Published By: Cisco     Published Date: Aug 18, 2014
You have to know the threats to stop them. It's not a question of if – but when and how – Internet criminals will get into your network. The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the revival of distributed denial-of-service (DDoS) attacks.
Tags : 
security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network, vulnerabilities, security
    
Cisco
Published By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : 
cloud security, scale, data center, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Die Cloud ist ein Servernetzwerk, das Daten, Software und Services umfasst. Auf Clouddienste wird für gewöhnlich über das Internet, und nicht lokal in einem Rechenzentrum, zugegriffen. Wenn es um Cybersicherheit geht, verlassen sich immer mehr Unternehmen auf die Cloud. Die zwei Hauptgründe: 1. Aufgrund der sich ständig ändernden Bedrohungslandschaft wird immer mehr Umfang, Genauigkeit, Erfahrung und kollektive Intelligenz benötigt. Diese Anforderungen können die meisten Unternehmen intern nicht erfüllen. 2. Lokale Appliances und Unternehmensrechenzentren haben prinzipiell ihre Grenzen, wenn es um Abwehrmechanismen gegen DDoS- (Distributed Denial of Service) und Webangriffe geht.
Tags : 
    
Akamai Technologies
Published By: Infoblox     Published Date: Sep 09, 2014
Stories about devastating cyberattacks are plaguing the news. Why? The DNS protocol is easy to exploit. See your network the way hackers do—as an easy target. Learn how you can effectively secure your DNS infrastructure today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
Until recently, security teams for organizations in many industries believed they didn’t need to worry about DDoS attacks, but the latest data from the Verizon 2017 Data Breach Investigations Report indicates that businesses of all sizes in nearly every industry run the risk of being attacked.¹ IoT devices are increasingly compromised, recruited into botnets, and offered up by their creators as for-hire DDoS services. Additionally, there are numerous DDoS tools and services that are easily accessible and easy to use, even for the untechnical novice.
Tags : 
protection, ddos, security, reporting, organization, device
    
F5 Networks Inc
Published By: Akamai     Published Date: Jul 01, 2011
Learn Why Protecting Your Online Channels and Applications is Critical.
Tags : 
akamai, security capabilities, online channel protection, web applications, ddos, distributed denial of service, threat landscape, firewall, siteshield, gtm, dns, edns, edge tokenization
    
Akamai
Published By: Arbor     Published Date: Sep 15, 2014
Die Erhöhung von DDoS-Angriffen kurbelt die Nachfrage an umfassenden Lösungen an “This market engineering study comes at a time when DDoS attacks are accelerating in purpose, sophistication, complexity, scale, and frequency. Businesses of all size have proven to be susceptible to these attacks, and though DDoS is not a new concern, the risk of DDoS attack probability and potential for damages is at an all-time high. As a result, DDoS mitigation is a top-of-mind consideration for IT and security organizations around the world, and demand for DDoS mitigation solutions is growing rapidly.”
Tags : 
market engineering, ddos attacks, it security
    
Arbor
Published By: Arbor Networks     Published Date: Mar 07, 2011
Download this paper to learn how emerging botnet and DDoS threats are identified, analyzed and mitigated to help protect organizations like yours from their impact.
Tags : 
ddos attacks, arbor networks, botnet, distributed denial of services, asert, yoyoddos botnet, bot
    
Arbor Networks
Published By: Arbor Networks     Published Date: Sep 29, 2012
Botnets and DDoS attacks are perceived as being malevolent and unstoppable. Fortunately there are companies like Arbor Networks, who are dedicated to analyzing and stopping botnets and DDoS attacks on a global basis.
Tags : 
ddos attacks, distribution denial of service, botnet, network infrastructure, database security, data center, security threats
    
Arbor Networks
Published By: Arbor     Published Date: Feb 07, 2013
How the Arbor Security Engineering & Response Team (ASERT) Discovers, Analyzes and Mitigates DDoS Attacks
Tags : 
arbor, ddos attacks, botnet, business technology
    
Arbor
Published By: Trend Micro SaaS     Published Date: Mar 17, 2009
West Coast Labs performed an anti-spam comparative test on various email solutions related to spam detection rate over a series of at least 100,000 emails per solution.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, sophos, symantec, west coast, interscan, distributed denial of service, ddos, filtering
    
Trend Micro SaaS
Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
West Coast Labs performed a comparison test on a range of email solutions (appliances, software, and hosted service solutions) to measure their relative spam detection rates over a series of at least 100,000 genuine spam emails using West Coast Labs real-time spam feed.
Tags : 
saas, trend, trend micro, websense, barracuda, anti-spam, antispam, spam filter service, spam filter for exchange, hosted antispam, managed antispam, enterprise anti-spam, mcafee, ironport, fortinet, software as a service, trendlabs, email security, security, interscan messaging
    
Trend Micro SaaS
Published By: Akamai Technologies     Published Date: May 24, 2017
Webanwendungs- und DDoS-Angriffe lassen sich nicht vorhersehen und treffen Unternehmen ohne Vorwarnung. Für die meisten DDoS-Angriffe (Distributed Denial of Service) ist nicht viel Know-how erforderlich. Angreifer können günstig Ressourcen mieten, die auf entsprechenden Seiten leicht zu finden sind. Trotz des geringen Preises führen DDoS-Angriffe zu vielen Problemen: • Betriebsunterbrechung • Verlust vertraulicher Daten • Niedrigere Nutzerproduktivität • Rufschädigung • Beeinträchtigung von Partnerschaften und Kundenbeziehungen • Umsatzverlust Je nach Branche können sich so schnell Schäden von Zehntausenden US-Dollar ergeben – in einigen Fällen geht der Schaden sogar in die Millionen. Nur 2 % der Unternehmen gaben an, ihre Webanwendungen seien in den vergangenen 12 Monaten nicht Opfer eines Angriffs geworden. Bei 98 % war das Gegenteil der Fall.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Angriffe auf Webanwendungen bzw. DDoS-Attacken lassen sich nicht vorhersehen und treffen Unternehmen ohne Vorwarnung. Die Angriffe können vertrauliche Daten und Websiteressourcen für illegitime Zwecke zugänglich machen, die Performance reduzieren oder Seiten sogar vollständig offline nehmen. Verantwortungsvolle Unternehmen blockieren proaktiv Webangriffe, um ihren Ruf, die Verfügbarkeit und Performance der Website sowie ihre vertraulichen Daten zu schützen.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 05, 2017
Web application and DDoS attacks hit enterprises without warning or reason. Most Distributed Denial of Service (DDoS) attacks require little skill to launch with attackers can simply rent resources from DDoS-for-hire sites at a low cost.. In comparison, DDoS attacks typically result in: • Operational disruption • Loss of confidential data • Lost user productivity • Reputational harm • Damage to partner and customer relations • Lost revenue Depending on your industry, that could add up to tens of thousands of dollars in damage – and in some cases it could be millions. Only 2% of organizations said their web applications had not been compromised in the past 12 months – 98% said they had.
Tags : 
ddos, technical support, data security, application security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Web application and DDoS attacks hit enterprises without warning or reason. The attacks can expose confidential data and website resources to malicious uses, reduce performance, and render sites unavailable. Responsible organizations proactively block web attacks to protect their reputations, site availability, site performance, and confidential data.
Tags : 
application, security, performance, web attacks, data security
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.