Sort results by: Published date | Company name

Cerberus: Malware Triage and Analysis [ Source: AccessData Group ]
October 2012- This document reviews new malware analysis technology, Cerberus, which determines the behavior and intent of suspect binaries without the need for signatures, white lists or a sandbox environment. Using this “triage” approach, organizations are able to detect unknown threats that signature-based technologies will miss. In addition, they are able to gain critical information immediately, allowing them to take decisive action prior to engaging a malware team. There are tens of thousands of static executables on ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Extend Security to the Edge with Web App Security [ Source: Akamai ]
September 2010- As enterprises move more of their business transactions online, they face the challenge of defending a perimeter that grows increasingly porous. The network firewalls that once locked down the enterprise perimeter are ineffective against Web-based attacks.

This white paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection, and then explores how a Web application firewall solution can overcome these challenges.

[WHITE PAPER]
Read Abstract | Go to White Paper

Leverage Cloud Security to Defend Your Perimeter [ Source: Akamai ]
September 2010- The complexity and scale of network and information security attacks have exploded in recent years. Traditional perimeter defense solutions have not kept pace with the rapid growth in risk.

This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.

[WHITE PAPER]
Read Abstract | Go to White Paper

Layered Intelligent DDoS Mitigation Systems [ Source: Arbor Networks ]
August 2011- As the size, frequency and complexity of DDoS attacks increase, security and availability are quickly becoming top business concerns. Yet, traditional security products such as firewalls or intrusion prevention systems (IPS) are inadequate when it comes to stopping today's volumetric and application-layer DDoS attacks. The solution? A layered Intelligent DDoS Mitigation System (IDMS).

This paper examines some of the latest DDoS attack trends and provides service providers with best practices for delivering layered ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Ovum Technology Audit: Arbor Pravail DDoS Protection Solution [ Source: Arbor Networks ]
August 2011- As the size, frequency and complexity of distributed denial of service (DDoS) attacks increase, data center security and availability are quickly becoming top business concerns. Yet, traditional security products such as firewalls and intrusion prevention systems (IPS) are inadequate when it comes to stopping today's complex, multi-faceted DDoS attacks.

Arbor Networks, a leading network security company, recently introduced the Pravail - Availability Protection System (APS) - focused specifically on securing enterprises and the ...

[WHITE PAPER]
Read Abstract | Go to White Paper

The Business Value of DDoS Protection [ Source: Arbor Networks ]
February 2011- As companies increasingly outsource their critical online operations such as Web sites, ecommerce, email and domain name system (DNS), the tolerance levels for outages and downtime continue to diminish. As a result, service availability is top of mind for hosting providers. Distributed denial of service (DDoS) has emerged as a major and growing threat to service provider availability - imposing cost and risk on both providers and their customers alike. Download this paper to learn ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Anatomy of a Botnet [ Source: Arbor Networks ]
March 2011- As a wide-open environment, the Internet has allowed a large criminal element to thrive. For evidence, look no further than the escalating growth of botnets and distributed denial of service (DDoS) attacks that have been publicized in recent news. Download this paper to learn how emerging botnet and DDoS threats are identified, analyzed and mitigated to help protect organizations like yours from their impact.

[WHITE PAPER]
Read Abstract | Go to White Paper

Handling Modern Security Issues [ Source: ArcSight ]
November 2009- A new class of organizational threats and risks are emerging, that include the trusted insider. This threat is magnified by complex applications and a dynamic workforce with privileged access. This whitepaper shows you that connecting the dots can be done through six simple best practices.

[WHITE PAPER]
Read Abstract | Go to White Paper

Mitigating Fraud with the ArcSight SIEM Platform [ Source: ArcSight ]
November 2009- Online fraud is fueled by data theft and increasingly sophisticated cyber criminals, relying on misdirection and gaps in detection systems. Although fraud may never be eliminated entirely, The ArcSight SIEM Platform offers solutions that can accurately detect fraudulent activity and thus mitigate overall business risk.

[WHITE PAPER]
Read Abstract | Go to White Paper

ArcSight Logger 4: Combat Cybercrime, Demonstrate Compliance and Streamline IT Operations [ Source: ArcSight ]
November 2009- Governments and businesses are increasingly vulnerable to cyber crime by hackers, malware, and insiders. Log files can be used for forensic analysis of all types of security incidents. The key requirement is collection, centralized storage and fast analysis of events from various devices and applications. These requirements are highlighted in a case study incident on Boeing Corporation.

[WHITE PAPER]
Read Abstract | Go to White Paper
View All