Cerberus: Malware Triage and Analysis
[ Source: AccessData Group ]
October 2012-
This document reviews new malware analysis technology, Cerberus, which determines the behavior and intent of suspect binaries without the need for signatures, white lists or a sandbox environment. Using this “triage” approach, organizations are able to detect unknown threats that signature-based technologies will miss. In addition, they are able to gain critical information immediately, allowing them to take decisive action prior to engaging a malware team. There are tens of thousands of static executables on ...
Extend Security to the Edge with Web App Security
[ Source: Akamai ]
September 2010-
As enterprises move more of their business transactions online, they face the challenge of defending a perimeter that grows increasingly porous. The network firewalls that once locked down the enterprise perimeter are ineffective against Web-based attacks.
This white paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection, and then explores how a Web application firewall solution can overcome these challenges.
Leverage Cloud Security to Defend Your Perimeter
[ Source: Akamai ]
September 2010-
The complexity and scale of network and information security attacks have exploded in recent years. Traditional perimeter defense solutions have not kept pace with the rapid growth in risk.
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Layered Intelligent DDoS Mitigation Systems
[ Source: Arbor Networks ]
August 2011-
As the size, frequency and complexity of DDoS attacks increase, security and availability are quickly becoming top business concerns. Yet, traditional security products such as firewalls or intrusion prevention systems (IPS) are inadequate when it comes to stopping today's volumetric and application-layer DDoS attacks. The solution? A layered Intelligent DDoS Mitigation System (IDMS).
This paper examines some of the latest DDoS attack trends and provides service providers with best practices for delivering layered ...
Ovum Technology Audit: Arbor Pravail DDoS Protection Solution
[ Source: Arbor Networks ]
August 2011-
As the size, frequency and complexity of distributed denial of service (DDoS) attacks increase, data center security and availability are quickly becoming top business concerns. Yet, traditional security products such as firewalls and intrusion prevention systems (IPS) are inadequate when it comes to stopping today's complex, multi-faceted DDoS attacks.
Arbor Networks, a leading network security company, recently introduced the Pravail - Availability Protection System (APS) - focused specifically on securing enterprises and the ...
The Business Value of DDoS Protection
[ Source: Arbor Networks ]
February 2011-
As companies increasingly outsource their critical online operations such as Web sites, ecommerce, email and domain name system (DNS), the tolerance levels for outages and downtime continue to diminish. As a result, service availability is top of mind for hosting providers. Distributed denial of service (DDoS) has emerged as a major and growing threat to service provider availability - imposing cost and risk on both providers and their customers alike. Download this paper to learn ...
Anatomy of a Botnet
[ Source: Arbor Networks ]
March 2011-
As a wide-open environment, the Internet has allowed a large criminal element to thrive. For evidence, look no further than the escalating growth of botnets and distributed denial of service (DDoS) attacks that have been publicized in recent news. Download this paper to learn how emerging botnet and DDoS threats are identified, analyzed and mitigated to help protect organizations like yours from their impact.
Handling Modern Security Issues
[ Source: ArcSight ]
November 2009-
A new class of organizational threats and risks are emerging, that include the trusted insider. This threat is magnified by complex applications and a dynamic workforce with privileged access. This whitepaper shows you that connecting the dots can be done through six simple best practices.
Mitigating Fraud with the ArcSight SIEM Platform
[ Source: ArcSight ]
November 2009-
Online fraud is fueled by data theft and increasingly sophisticated cyber criminals, relying on misdirection and gaps in detection systems. Although fraud may never be eliminated entirely, The ArcSight SIEM Platform offers solutions that can accurately detect fraudulent activity and thus mitigate overall business risk.
ArcSight Logger 4: Combat Cybercrime, Demonstrate Compliance and Streamline IT Operations
[ Source: ArcSight ]
November 2009-
Governments and businesses are increasingly vulnerable to cyber crime by hackers, malware, and insiders. Log files can be used for forensic analysis of all types of security incidents. The key requirement is collection, centralized storage and fast analysis of events from various devices and applications. These requirements are highlighted in a case study incident on Boeing Corporation.