Sort results by: Published date | Company name

Building Enterprise File Transfer Processes that Improve Security, Compliance [ Source: Accellion ]
April 2008- This whitepaper covers how IT departments can provide workers with file transfer technology that addresses security and compliance needs without putting an unreasonable burden on normal work processes and the ways people prefer to work. Information can be at risk of loss or exposure when it is being sent from one person to another, depending on the file transfer process that is used.

Email is the easiest and most common method used, but ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Cerberus: Malware Triage and Analysis [ Source: AccessData Group ]
October 2012- This document reviews new malware analysis technology, Cerberus, which determines the behavior and intent of suspect binaries without the need for signatures, white lists or a sandbox environment. Using this “triage” approach, organizations are able to detect unknown threats that signature-based technologies will miss. In addition, they are able to gain critical information immediately, allowing them to take decisive action prior to engaging a malware team. There are tens of thousands of static executables on ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Wireless Security: Key Trends And Issues [ Source: AirTight Networks ]
April 2008- In this presentation by AirTight Networks, various forms of wireless security issues are addressed. Topics include WiFi threats, wireless breaches, 802.11n and others.

[WHITE PAPER]
Read Abstract | Go to White Paper

Wireless Security and Management: New Challenges, New Opportunities [ Source: AirWave Wireless ]
April 2008- From improper administrative access to stolen and lost devices, common wireless security vulnerabilities must be addressed to ensure proper management.

[WHITE PAPER]
Read Abstract | Go to White Paper

Extend Security to the Edge with Web App Security [ Source: Akamai ]
September 2010- As enterprises move more of their business transactions online, they face the challenge of defending a perimeter that grows increasingly porous. The network firewalls that once locked down the enterprise perimeter are ineffective against Web-based attacks.

This white paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection, and then explores how a Web application firewall solution can overcome these challenges.

[WHITE PAPER]
Read Abstract | Go to White Paper

Leverage Cloud Security to Defend Your Perimeter [ Source: Akamai ]
September 2010- The complexity and scale of network and information security attacks have exploded in recent years. Traditional perimeter defense solutions have not kept pace with the rapid growth in risk.

This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.

[WHITE PAPER]
Read Abstract | Go to White Paper

Why Anti-DDoS Products and Services are Critical for Today's Business Environment: Protecting against Modern DDoS Threats [ Source: Arbor Networks ]
April 2012- This white paper examines DDoS attacks in detail. It illustrates the attack vectors being used and describes why the threat to organizations is greater than ever before. It explains why traditional firewall and IPS solutions fall short in protecting organizations against today's sophisticated DDoS attacks. The Arbor Networks solution, profiled within, is described as a complete, purpose-built solution that Frost & Sullivan believes can provide protection against the wide range of DDoS attacks targeting corporate data ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Planning Security Budgets: Quantify the Financial Risk of DDoS [ Source: Arbor Networks ]
March 2012- Size, frequency and complexity of distributed denial of service (DDoS) attacks are all on the rise, making data center security and availability a top concern for most enterprises. The goal of the attack is to prevent the data center from functioning. This translates, potentially, to a complete shutdown of ecommerce transactions, email delivery, voice or DNS services, Web site access and other business-critical services. The business impact will depend on the length of time the ...

[WHITE PAPER]
Read Abstract | Go to White Paper

The Cloud Signaling Coalition: ISPs and Enterprises Working Together to Block the Evolving DDoS Threat [ Source: Arbor Networks ]
March 2012- As distributed denial of service (DDoS) attacks escalate in size and complexity, their detection and mitigation requires the collaboration of all stakeholders - from the enterprise to the service provider. The Cloud Signaling Coalition (CSC), from Arbor Networks, enables this collaboration by facilitating the local and upstream mitigation of application-layer DDoS attacks, as well as flood-based DDoS attacks, in an automated and real-time manner.

This white paper examines how cloud signaling works and ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Ovum Technology Audit: Arbor Pravail DDoS Protection Solution [ Source: Arbor Networks ]
August 2011- As the size, frequency and complexity of distributed denial of service (DDoS) attacks increase, data center security and availability are quickly becoming top business concerns. Yet, traditional security products such as firewalls and intrusion prevention systems (IPS) are inadequate when it comes to stopping today's complex, multi-faceted DDoS attacks.

Arbor Networks, a leading network security company, recently introduced the Pravail - Availability Protection System (APS) - focused specifically on securing enterprises and the ...

[WHITE PAPER]
Read Abstract | Go to White Paper
View All