ddos attack

Results 76 - 100 of 136Sort Results By: Published Date | Title | Company Name

AT&T DDoS Defense with KONA Site Defender

Published By: AT&T     Published Date: Jul 28, 2015
Download this white paper to learn how AT&T DDoS Defense with KONA Site Defender service can extend protection from origin servers to edge servers for a comprehensive, multi-level approach to security.
Tags : 
at&t, ddos, ddos attack, kona site defender, origin services, security, cybersecurity, hackers
    
AT&T

Are you ready for a DDoS attack?

Published By: AT&T     Published Date: Jul 28, 2015
Read through the AT&T Top Readiness Tips below and see if you’re prepared for a DDoS attack and if not, what actions you can take today to get ready.
Tags : 
at&t, ddos, ddos attack, security, preparedness, cybersecurity, hackers
    
AT&T

DDos Resiliency Score Calculator

Published By: Incapsula     Published Date: Nov 06, 2017
Being aware of the risks and costs associated with DDoS attacks, most enterprises protect their websites and network infrastructure with some sort of mitigation solution. However, as the threat landscape continues to evolve, it’s getting harder to gauge your organization’s DDoS readiness and identify the soft spots in your defenses. The calculator measures your DDoS resiliency score based on a short questionnaire about your network infrastructure, security products and procedures. The results are provided in a detailed report that includes: Your DRS score, its meaning and implications Technical evaluation of a virtual penetration test Comparative analysis of your DRS within your business vertical Suggestions for improving your security posture
Tags : 
    
Incapsula

How to Build a DDoS Response Plan

Published By: Incapsula     Published Date: Nov 06, 2017
You’ve probably heard about distributed denial of service (DDoS) attacks, or maybe you’ve even been hit by one. If you’re like most organizations, you’ve already been DDoSed. Perhaps the attack was minor, a wakeup call, but then the attack subsided without causing damage and you just left DDoS protection on your “to-do list.” If you don’t have a DDoS attack plan, it’s probably time to bump it up to the top of your list. That’s because DDoS attacks are getting bigger, persistent, and more harmful. They inflict serious cost in terms of lost revenue, damaged systems and lost consumer trust. DDoS is no longer just a web server problem; infrastructure is now a target. The attacker’s ambition is clear: Take down your online existence and harm your organization.
Tags : 
    
Incapsula

DDoS Response Playbook

Published By: Incapsula     Published Date: Nov 06, 2017
Distributed denial of service (DDoS) attacks have become a fact of life for any business with a web presence. Whether you’re an enterprise, e-commerce business, local organization, or government offce—it’s merely a matter of time before you’re going to have to deal with the inevitable DDoS attack. The question is what can you do before an attack so you can have adequate defenses already in place. This handbook is a practical guide for planning and executing a DDoS response plan. It outlines pragmatic steps and best practices for choosing and setting up the right mitigation solution for your organization, how to authoritatively respond to an attack, and conduct a thorough post-attack analysis for developing follow-up defense strategies.
Tags : 
    
Incapsula

DDoS Protection Strategies: Choosing the Right Model

Published By: F5 Networks Inc     Published Date: Jan 31, 2017
By thinking proactively about DDoS defense, organizations can build a comprehensive strategy to mitigate attacks. Choosing from on-premises security devices, cloud-scrubbing services, and a hybrid approach to DDoS protection allows organizations to customize their security strategy to their application architecture and business needs.
Tags : 
ddos, ddos defense, security
    
F5 Networks Inc

Debunking the Top Four Myths About DDoS Attacks

Published By: F5 Networks Inc     Published Date: Aug 25, 2017
DDoS attacks seem to constantly be in the news, continually evolving and growing in complexity. You may have heard about the big, volumetric attacks that took down Donald Trump’s campaign website and Brazilian government sites during the Olympics. But while volumetric attacks still reign supreme, there are other, more insidious, low-level DoS attacks that can also damage your site, your applications, and your business. If you think you’re ready for a DDoS attack—or that you don’t need to worry about one—make sure you’re not buying into some of these popular myths.
Tags : 
    
F5 Networks Inc

Arbor Networks Enables DDoS Protection for Cloud Service and Hosting Providers

Published By: Arbor Networks     Published Date: Jan 18, 2013
This Frost & Sullivan whitepaper provides an overview of the latest DDoS attack trends, and offers examples of how cloud service and hosting providers can use Arbor Networks solutions to protect their data centers from DDoS attacks and increase revenue by offering Arbor-based, managed DDoS protection services.
Tags : 
ddos, arbor networks, cloud services, protection, data center, ddosattack, hosting provider, business technology
    
Arbor Networks

Defending Against Advanced Attacks

Published By: McAfee     Published Date: Jan 23, 2013
Stopping denial of service attacks is imperative for business continuity, but the complexities of these attacks makes protecting the service infrastructure that much harder. Read this white paper to understand why McAfee recommends an integrated and layered approach.
Tags : 
dos, ddos, attacks, threats, layered security, advanced threats, advanced attacks, malware, anti spam, anti spyware, anti virus, application security, disaster recovery, email security, encryption, firewalls, hacker detection, identity management, internet security, intrusion detection
    
McAfee

The New Reality of Stealth Crimeware

Published By: McAfee     Published Date: Feb 06, 2013
Take the stealth, creativity and patience of Stuxnet, the commercialism, wide distribution and easy-to-use toolkits of Zeus, and you understand the potency of today’s malware. Start planning now to protect your intellectual property and other assets.
Tags : 
zues, stuxnet, stealthy threats, rootkits, malware, rootkit binaries, zero-day vulnerabilities, botnet, ddos attacks, keylogging, phishing, trojans, embedded security, endpoint security, anti spam, anti spyware, anti virus, encryption, hacker detection, internet security
    
McAfee

Case Study: How Weebly utilized a hybrid DDoS Protection approach

Published By: F5 Networks Inc     Published Date: Feb 18, 2015
As a website building service for consumers, Weebly is often the target of DDoS attacks. Previously they mitigated attacks through an internally built security infrastructure but the increasing scale and complexity of DDoS attacks had the company evaluating secondary protection. Learn how Weebly is well protected from DDoS threats of all sizes and complexities after incorporating an added layer of protection and resulting uninterrupted DDoS mitigation and analysis.
Tags : 
ddos attacks, ddos protection, ddos solutions, mitgation, security, it management, business intelligence, data protection, database security
    
F5 Networks Inc

Top 5 Malware Trends for 2014 and How to Combat Them

Published By: Webroot UK     Published Date: Jan 30, 2014
In 2014, hackers and cyber thieves will continue to change their tactics, using new exploits to infect systems and steal data. This Executive Brief discusses the top five malware trends to keep an eye out for in 2014 and how Webroot SecureAnywhere can provide the endpoint protection that companies will need to be safe in 2014.
Tags : 
webroot, security, esecurity, cyber threat, malware, malware trends, breaches, safeguard, data protection, ddos attacks, web gateway security, online threats, virus, spyware protection, anti-phishing protection, it management, business technology
    
Webroot UK

Beware the Beastly Threats of IT Security

Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!
Tags : 
security, ransomware, spyware, malware, theft, it threat, anti spyware, ddos, hacker detection, internet security, security management
    
Lenovo and Intel®

Information Security Threat Landscape: Recent Trends and 2015 Outlook

Published By: Cyveillance     Published Date: Apr 03, 2015
In this white paper, we recap notable trends and events in information security from 2014 and look forward to what information security professionals should expect in 2015. The past year was a landmark one in the information security field, with massive data breaches capturing the public’s attention, powerful bugs causing headaches for IT teams and end users, DDoS attacks breaking records, and phishing remaining a general annoyance – or worse – for all Internet users. In this whitepaper, we discuss these trends as well as key areas of concern for 2015, including: - The impact of the Internet of Things - The growing importance of threat intelligence - The increasing influence of BRICS nations - The evolution of encryption standards - The changing role of the CISO
Tags : 
information security threat, information security, protection, security breach, internet security, networking, security, it management
    
Cyveillance

DDoS Survival Handbook: The Ultimate Guide to Everything You Need to Know About DDoS Attacks

Published By: Singlehop     Published Date: Oct 01, 2014
DDoS Survival Handbook: The Ultimate Guide to Everything You Need to Know About DDoS Attacks.
Tags : 
ddos attacks, it security, data breaches, security, it management, best practices, business activity monitoring, risk management
    
Singlehop

ThousandEyes for DDoS Attack Analysis

Published By: ThousandEyes     Published Date: Jan 14, 2018
ThousandEyes highlights the impact of an ongoing DDoS attack, provides visibility into the effectiveness of the mitigation and provides insight into the strategies of DDoS mitigation vendors.
Tags : 
thousandeyes, ddos, migration, network migration, network security, wireless security, data protection, secure content management
    
ThousandEyes

10 Steps to Mitigate a DDoS Attack in Real Time

Published By: F5 Networks     Published Date: Mar 18, 2015
The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs, and stay protected in the future.
Tags : 
f5 networks, ddos, ip security, real time attack, data protection, secure business, network security, hacker detection, intrusion prevention, data loss prevention
    
F5 Networks

Increase application security and availability with Imperva

Published By: AWS     Published Date: Oct 07, 2019
Imperva, an APN Security Competency Partner, can help protect your application workloads on AWS with the Imperva SaaS Web Application Security platform. The Imperva high-capacity network of globally distributed security services protects websites against all types of DDoS threats, including networklevel Layer 3 and Layer 4 volumetric attacks—such as synchronized (SYN) floods and User Datagram Protocol (UDP) floods—and Layer 7 application-level attacks (including the OWASP Top 10 threats) that attempt to compromise application resources. Harnessing real data about current threats from a global customer base, both the Web Application Firewall (WAF) and DDoS protection, incorporate an advanced client classification system that blocks malicious traffic without interfering with legitimate users. Enterprises can easily create custom security rules in the GUI to enforce their specific security policy. In addition, this versatile solution supports hybrid environments, allowing you to manage th
Tags : 
    
AWS

Gain Rapid Threat Protection with Automated DDoS and WAF Solutions

Published By: AWS     Published Date: Oct 09, 2019
Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousness—and scope—of the attacks they constantly face. APN Security Competency Partner Imperva provides automated security solutions that can help you defend against both known and zero-day attacks and increase visibility across your entire Amazon Web Services (AWS) environment, to rapidly stop attacks and quickly identify the real threats that need to be investigated. Join our upcoming webinar to learn how DigiCert has protected both their AWS and on-premises environments from DDoS attacks and other threats by using Imperva’s SaaS Web Application Security solution. This versatile security offering helps keep application workloads safe across cloud and on-premises environments and can be managed from a single pane of glass, enabling security teams to more effectively and efficiently secure business
Tags : 
    
AWS

Understanding And Mitigating DNS DDoS Attacks

Published By: Dyn     Published Date: Jan 14, 2015
A DDoS Attack or distributed denial of service attack can happen to any online entity, at any time. By overwhelming your DNS infrastructure, malicious attackers can impair your website, tarnish your company’s reputation, and impact your bottom line. So what are your company’s risks and how can you mitigate them?
Tags : 
mitigation, dns ddos, ddos attacks, business security, bottom line, mitigation, improve results, cloud based, migration, monitoring, ddos, business intelligence
    
Dyn

Deliver Superior User Experiences With A Cloud-Based DNS Service

Published By: Dyn     Published Date: Jan 14, 2015
Every user’s first interaction with your website begins with a series of DNS queries. Poor DNS performance can lead to slow page loads, dissatisfied customers, and lost business. However, you can improve results, contain costs, and make better use of valuable IT personnel by leveraging a cloud-based DNS service.
Tags : 
cloud based, dns service, ddos attack, user experience, infrastructure, dns performace, ddos, business intelligence
    
Dyn

Evaluating The Cost of A DDoS Attack

Published By: Dyn     Published Date: Jan 14, 2015
Take a few minutes to read this whitepaper, evaluate the potential risk and the potential cost a DDoS attack will have on your business and gain key tips on how to mitigate both.
Tags : 
ddos attack, integration, mitigation, ddos outage, business protection, business security, infrastructure, ddos, business intelligence
    
Dyn

Web Attack Survival Guide

Published By: Imperva     Published Date: Sep 19, 2013
This guide will help you protect your organization from external threats targeting your high-value applications and data assets.
Tags : 
imperva, ddos, hackers, cybercriminals, cyberattacks, malware, phishing, web attack, spam, virus, network security, application security, email security, encryption, hacker detection, internet security, intrusion prevention, web service security, secure content management
    
Imperva

Cutting the Cost of Application Security

Published By: Imperva     Published Date: Jun 14, 2012
This paper describes the financial implications of Web attacks, DDoS attacks, and other Web-based threats. It shows how the SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and Website downtime.
Tags : 
imperva, application security, security costs, roi, firewall, ddos, web attacks, it spending, firewalls, security management, return on investment, web service security, data protection, business technology
    
Imperva

What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

Published By: Imperva     Published Date: Nov 07, 2013
This white paper outlines the application threat landscape; explains why next generation firewalls are ill-equipped to stop web attacks; and provides six essential requirements for protecting web applications.
Tags : 
imperva, web applications, web application security, ddos, web attack, data protection, firewalls, next gen firewalls, validation, sql injection, hacker detection, single sign on, web services, web service security, database security
    
Imperva
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.