attack

Results 476 - 500 of 1440Sort Results By: Published Date | Title | Company Name
Published By: Digital Realty     Published Date: Feb 24, 2015
Today’s headlines are replete with accounts of major corporations that have found themselves under attack for their enterprise data. For data center operators, ensuring the security and continuity of their clients’ business operations is a key and compelling imperative. See how Digital Realty approaches data center security.
Tags : 
data center, security, infrastructure, cloud computing
    
Digital Realty
Published By: distilnetworks     Published Date: Jun 13, 2014
In the 2014 Annual Bad Bot Report, Distil Networks identifies the trends and changes of bad bot activity over the past year. This report serves as the industry standard of defining malicious attacks and reporting on bad bot origins and makeup to help organizations prepare for, and mitigate, this rapidly accelerating security threat.
Tags : 
block bot, block bots, data protection, distil networks, online trust, prevent web scraping, price scraping, web scraping
    
distilnetworks
Published By: Distributed Management Systems     Published Date: Jul 03, 2011
White Paper describing a new approach to multi-factor authentication for the Cloud
Tags : 
mutual authentication for the cloud, authentication at application level
    
Distributed Management Systems
Published By: Dropbox for Business     Published Date: Jun 09, 2014
Losing data is costly. According to the Ponemon Institute, the average data breach costs US organizations an estimated $200 per record, or $5.4 million total per breach. And apparently these breaches are equally likely to be from criminal attack as from employee or contractor negligence. It makes sense then that surveys point to data loss via unsecured file sync and share solutions as one of IT’s biggest concerns. IT professionals have spent years learning how to protect their organizations from hackers, but how do you ward off both external and internal threats when employees are seeking ways to collaborate more and more?
Tags : 
dropbox, data, workplace, breach, security
    
Dropbox for Business
Published By: Druva     Published Date: Aug 03, 2016
Ransomware has quadrupled since last year and it is estimated to be reach $1B this year. Gartner Research has outlined best practices to better prepare you for an attack and uncovers how modern backup technologies can help.
Tags : 
druva, gartner, best practices, technology, backup
    
Druva
Published By: Druva     Published Date: Aug 04, 2016
This IT guide provides actionable steps to reduce the impact of ransomware or other malware attacks. By quickly restoring data from time-indexed copies, organizations will be far less vulnerable to costly and debilitating ransom demands.
Tags : 
    
Druva
Published By: Druva     Published Date: Aug 04, 2016
This IT guide provides actionable steps to reduce the impact of ransomware or other malware attacks. By quickly restoring data from time-indexed copies, organizations will be far less vulnerable to costly and debilitating ransom demands.
Tags : 
technology, data, best practices, business technology
    
Druva
Published By: Druva     Published Date: Aug 05, 2016
Ransomware attacks have become commonplace and affect all kinds of organizations and industries nationwide. Learn why ransomware is on the rise and actionable steps to reduce the impact of ransomware and other malware attacks on your organization.
Tags : 
cloud backup, enterprise, cloud computing, best practices, storage
    
Druva
Published By: Dyn     Published Date: Jan 14, 2015
A DDoS Attack or distributed denial of service attack can happen to any online entity, at any time. By overwhelming your DNS infrastructure, malicious attackers can impair your website, tarnish your company’s reputation, and impact your bottom line. So what are your company’s risks and how can you mitigate them?
Tags : 
mitigation, dns ddos, ddos attacks, business security, bottom line, mitigation, improve results, cloud based
    
Dyn
Published By: Dyn     Published Date: Jan 14, 2015
Every user’s first interaction with your website begins with a series of DNS queries. Poor DNS performance can lead to slow page loads, dissatisfied customers, and lost business. However, you can improve results, contain costs, and make better use of valuable IT personnel by leveraging a cloud-based DNS service.
Tags : 
cloud based, dns service, ddos attack, user experience, infrastructure, dns performace
    
Dyn
Published By: Dyn     Published Date: Jan 14, 2015
Take a few minutes to read this whitepaper, evaluate the potential risk and the potential cost a DDoS attack will have on your business and gain key tips on how to mitigate both.
Tags : 
ddos attack, integration, mitigation, ddos outage, business protection, business security
    
Dyn
Published By: Dyn     Published Date: Oct 04, 2016
Distributed Denial of Service (DDoS) attacks increased by over 100% YoY. With nearly a quarter of the attacks aimed at the DNS layer and close to 80% not identified until they reach the DNS layer, it is no secret you should evaluate your Manage DNS provider critically as your first line defense in DDoS mitigation. Download this eBook to best equip your business against impending DDoS attacks including: • Common types of DDoS attacks and which layers of your infrastructure are most at risk • How to geographically isolate attacks and mitigate latency • How to get the best before, during and after attack protection
Tags : 
ddos, dns, cdn, attacks
    
Dyn
Published By: Dyn     Published Date: Nov 03, 2016
We all know that hybrid cloud adoption is exploding, with 80% of enterprises having at least some infrastructure in the cloud. This growth includes increased use of the internet to deliver applications, sites and services to employees, partners and customers. These companies need an internet performance management (IPM) strategy to ensure those services reach users effectively, starting with DNS. Join Trip Kucera and Dyn VP, Gary Sloper, as they discuss the impact of cloud and internet infrastructure across the cloud adoption lifecycle. Key focus points include: • Optimizing round trip times and latency, from time to first byte, to internet routing • Understanding and comparing cloud service providers • Protecting your service from route hijacks, DDoS attacks and mitigating vulnerabilities. Watch this short Video Webinar and learn how focusing on the DNS layer can help you plan, migrate and optimize your way to cloud success!
Tags : 
dyn, dns, hybrid, hybrid cloud, ipm
    
Dyn
Published By: Dyn     Published Date: Nov 03, 2016
The more you invest in an internet hybrid infrastructure, the more exposed you can be to internet events. At the internet infrastructure layer, this can mean unavailable destinations, poor performing paths and security events such as DDoS attacks. The fact is that there are thousands of internet events that happen every day and when it comes to DDoS attacks 97% of them happen at the infrastructure layer. You shouldn't rely on a single DNS service to protect you from all of these potential problems. Just like everything else in your IT architecture you should always have a backup plan. How you implement a redundant DNS architecture is not a given. Watch this informative webinar and learn about different ways you can get the benefits of a hardened internet infrastructure layer that fits your existing and planned online architecture. Get insights and examples from our DNS experts on different key approaches.
Tags : 
dyn, dns, hybrid infrastructure
    
Dyn
Published By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response
    
EMC Corporation
Published By: EMC Corporation     Published Date: Aug 05, 2014
Large organizations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up-to-the-minute situational awareness and rapid data-driven security decisions. This means that large organizations have entered the era of data security analytics. Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance
    
EMC Corporation
Published By: EMC Corporation     Published Date: Oct 01, 2014
RSA Security Analytics and RSA ECAT give security teams an edge in the hunt for cyber attacks.
Tags : 
cyber attacks, live, virtual, security, analytics, ecat
    
EMC Corporation
Published By: EMC Corporation     Published Date: Oct 01, 2014
RSA Security Analytics and RSA ECAT give security teams an edge in the hunt for cyber attacks.
Tags : 
cyber attacks, live, virtual, security, analytics, ecat
    
EMC Corporation
Published By: EMC Corporation     Published Date: Oct 01, 2014
Find out by watching the RSA Security Analytics and RSA ECAT on-demand video.
Tags : 
cyber attacks, virtual, security, analytics, ecat
    
EMC Corporation
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, enterprise authentication, security, identity security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, identitityguard, enterprise security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Complying with the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection Standards
Tags : 
entrust, nerc, cyber attacks, non compliance
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : 
enterprise authentication, securing identities, evolving environment, attacks, mobile platforms, user identities, network devices
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : 
identity guard, enterprise, securing identities, corporate network, mobile platforms
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
This white paper explores those guidelines and looks into which specific critical infrastructure solutions are required to avoid non-compliance.
Tags : 
solution, infrastructure protection, avoid non-compliance, cyberattack
    
Entrust Datacard
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search Resource Library