• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

dos

Results 351 - 375 of 525Sort Results By: Published Date | Title | Company Name
By: F5 Networks Inc     Published Date: Dec 11, 2015
CIOs want harmony. Security directors loathe point products. Networks operations won’t buy into anything new. Stakeholders can get the harmony they need around DDoS mitigation by extending the F5 Application Delivery Controller into a hybrid solution: on-premises with a new cloud component.
Tags : 
software-defined networking, sdn, programability, cloud computing, mobility, it solutions, apps, cio, ddos, networking, security, it management
    
F5 Networks Inc
By: Webroot UK     Published Date: Sep 25, 2013
Managing web security in an increasingly challenging threat landscape. Cybercriminals have increasingly turned their attention to the web, which has become by farther predominant area of attack. Small wonder. Those who would do harm to our computer systems for profit or malice always manage to focus their efforts on our most vulnerable weak spots. Today, that is the web, for a wide number of reasons.
Tags : 
web security, webroot, web attack, ddos, web, internet security, malware, networking, security, enterprise applications
    
Webroot UK
By: MuleSoft     Published Date: Sep 09, 2019
La plus grande difficulté consiste justement à transformer une entreprise existante en une entreprise adoptant l'approche de l'écosystème et de la plateforme digitale comme logique dominante, de façon à intégrer l'économie des APIs. Ceci étant, qu'est-ce que cela implique-réellement et quelles sont les bonnes pratiques qui vous aideront dans cette entreprise ? En nous basant sur l'expérience de MuleSoft auprès de plus de 1 000 clients professionnels et sur les analyses de ProgrammableWeb.com, qui commente les succès et échecs de l'économie des APIs, nous avons conçu ce plan stratégique relatif aux APIs pour vous aider. Dans une approche très pragmatique, ce plan API stratégique se divise en quatre étapes. Chaque étape représente un ensemble de fondamentaux commerciaux et technologiques incontournables. Ceux-ci peuvent facilement être abordés par des organisations motivées qui disposent du soutien de leur corps exécutif et d'une bonne dose de patience. Ces étapes sont les suivantes : ›
Tags : 
    
MuleSoft
By: MX Logic     Published Date: May 21, 2008
Rootkits, Trojans, ransomware, Denial-of-Service and much more – this newly released white paper from MX Logic covers the everchanging security threat landscape. Learn what malicious intrusions are out there, how to identify them and how to keep your network safe.
Tags : 
botnets, dha, dos, denial of service, queen bot, malware, drive by, storm worm, blended threats, rootkits, trojans, spyware, viruses, virus, worm, worms, polymorphism, push propagation, pull propagation, zero day
    
MX Logic
By: MX Logic     Published Date: May 21, 2008
In this recent report, the Aberdeen Group’s research revealed that 100% of Best-in-Class companies consume some managed security services as part of their security strategy. The most widely deployed and easiest to implement managed security service is email security.
Tags : 
managed security services, managed services, email security, security solutions, web security, security incidents, data loss, malware infections, anti-botnet, denial-of-service, dha, dos, intrusion detection, security, network security, access control, anti virus, application security, hacker detection, internet security
    
MX Logic
By: Panda Security     Published Date: Jan 16, 2008
A new white paper from Panda Security discusses the new breed of silent online threats that can bypass traditional antivirus programs and penetrate even the most highly 'protected' networks.  Additionally, the sheer volume of malware has overwhelmed the antivirus industry as a whole. Collective Intelligence is a new global security model specifically designed to combat the next evolution of malicious code.
Tags : 
malware, virus, anti-virus, spyware, anti-spyware, anti-malware, bot, botnet, trojan, dos, denial of service, hacker, phish, phishing, panda, panda security, security, anti spam, anti spyware, anti virus
    
Panda Security
By: Panda Security     Published Date: Feb 27, 2008
E-mail is the primary communication tool upon which every business and corporation depends.  This communication source is also the battleground where cybercriminals use sophisticated email infiltration-techniques to propagate malware and attack corporate networks.
Tags : 
malware, hacker, hacking, hackers, email security, e-mail security, panda, panda security, denial of service, dos, phishing, spyware, network security, anti spyware, anti virus, ddos, vulnerability management
    
Panda Security
By: Webroot UK     Published Date: Nov 11, 2009
This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.
Tags : 
webroot, web security threat, phishing, antivirus, ddos, data leak, threat protection, configuration, compliance, remote work, network security, remote access, remote network management, anti spyware, anti virus, internet security, network security appliance, web service security
    
Webroot UK
By: Webroot UK     Published Date: Jan 30, 2014
In 2014, hackers and cyber thieves will continue to change their tactics, using new exploits to infect systems and steal data. This Executive Brief discusses the top five malware trends to keep an eye out for in 2014 and how Webroot SecureAnywhere can provide the endpoint protection that companies will need to be safe in 2014.
Tags : 
webroot, security, esecurity, cyber threat, malware, malware trends, breaches, safeguard, data protection, ddos attacks, web gateway security, online threats, virus, spyware protection, anti-phishing protection, it management
    
Webroot UK
By: SAS     Published Date: Apr 14, 2016
Todo individuo, todo ejecutivo y toda organización – y ahora, con el Internet de las Cosas (IoT), todos los objetos de su organización – son un viaje digital. Esto está obligando a las organizaciones de TI a no sólo manejar más responsabilidades sino también a sumar más a las que ya tiene. Al mismo tiempo, los profesionales empresariales adquieren mayores conocimientos técnicos y, mediante el uso de herramientas basadas en la nube, tienen ya la capacidad de iniciar proyectos tecnológicos por su propia cuenta.
Tags : 
    
SAS
By: SAS     Published Date: Apr 14, 2016
Como resultado de un mayor acceso a datos útiles, las compañías están usando con mayor frecuencia métodos analíticos sofisticados. Eso significa que a menudo hay una brecha entre la capacidad de una organización de producir resultados analíticos y su capacidad de aplicarlos efectivamente a su negocio.
Tags : 
    
SAS
By: Dell     Published Date: Sep 07, 2011
Take a dose of this Windows 7 desktop migration strategy. You'll have happy healthcare systems and improve patient care!
Tags : 
windows 7, microsoft deployment, desktop, inventory applications, windows xp, healthcare management, healthcare, public health, compliance, security management, windows, service management, desktop management
    
Dell
By: Sponsored by HP and Intel® Xeon® processors     Published Date: Nov 20, 2012
Hewlett-Packard's ProLiant DL360p and DL380p Gen8 rack-optimized servers are the flagship products carrying new tech-nologies and capabilities to market.
Tags : 
intel, tech dossier, proliant, dl360p, dl380p, gen8, severs
    
Sponsored by HP and Intel® Xeon® processors
By: Sponsored by HP and Intel® Xeon® processors     Published Date: Nov 20, 2012
When Hewlett-Packard set out to develop the next generation of its popular ProLiant server family, a key objective was to dramatically reduce the burden of manag-ing the servers-both individually and in aggregate across the data center.
Tags : 
intel, proliant, gen8, mgmt, efficiency
    
Sponsored by HP and Intel® Xeon® processors
By: Sponsored by HP and Intel® Xeon® processors     Published Date: Nov 20, 2012
As IT platforms have grown more sophis-ticated and complex, and as ITenviron-ments have become more converged and virtualized, enterprises' service and support requirements have changed dramatically.
Tags : 
intel, gen8, servers, hp insight online, xeon, tech dossier, proliant, hp proliant
    
Sponsored by HP and Intel® Xeon® processors
By: Sponsored by HP and Intel® Xeon® processors     Published Date: Nov 20, 2012
DATA CENTER INEFFICIENCIES RAISE IT COSTS AND RISKS.
Tags : 
intel, tech dossier, idg quick pulse, data center
    
Sponsored by HP and Intel® Xeon® processors
By: Lenovo and Intel®     Published Date: Oct 14, 2016
Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!
Tags : 
security, ransomware, spyware, malware, theft, it threat, anti spyware, ddos, hacker detection, internet security, security management
    
Lenovo and Intel®
By: Citrix     Published Date: Oct 26, 2017
Explore los beneficios del mundo real realizados por las compañías que utilizan SD-WAN y cómo la sucursal redefinida tiene impacto en una amplia gama de sectores.
Tags : 
    
Citrix
By: EverString     Published Date: Jun 27, 2018
Programs and campaigns can be tough to plan; and more often than not, too many marketers rely on guesswork to get it done. Your numbers need to head in the right direction, so your team must match its resources and spending with your most critical priorities. This ebook will walk you through the 4 must-dos of marketing budget planning so that your team can be more tactical with spending.
Tags : 
    
EverString
By: Nutanix     Published Date: Apr 24, 2017
Conviértase en un experto en Infraestructura Hiperconvergente Descargué el libro. La infraestructura tradicional (legacy), con sus componentes aislados como almacenamiento, redes y servidores, ya no es adecuada para cubrir las demandas cada vez mayores de las aplicaciones empresariales actuales ni el ritmo acelerado de las empresas modernas. Hoy, los expertos y líderes de TI están utilizando infraestructura Hiperconvergente para eliminar las barreras y complejidad de las plataformas tradicionales y brindar servicios de infraestructura en sus propias instalaciones (on-premise) pero con la velocidad, agilidad y eficiencia operativa de una nube pública. Descarga gratis el libro
Tags : 
infraestructura hiperconvergente, hiperconvergencia, cómo funciona nutanix, nutanix, hiperconvergencia de nutanix, ¿qué es un sistema convergente?, hci, almacenamiento empresarial, nube pública, nube empresarial, centro de datos, data center, definido por software
    
Nutanix
By: Limelight Networks     Published Date: Mar 02, 2018
Your online audience expects fast, flawless, secure experiences on any device in any location, every time. But whether you are delivering videos, your website, music, software or games, ensuring engaging online experiences from an increasing variety of devices around the world is a huge challenge. Content delivery networks (CDNs) can significantly improve the user experience of your online audiences. But not all CDNs deliver the same level of service. Dos and Don’ts of Evaluating and Deploying a CDN provides tips on how to determine what is most important to your organization and how to choose a CDN that meets your needs. Download this guide to learn: The four major performance factors that can affect user experience Why speed alone isn't an accurate measure of performance How a content audit can identify performance bottlenecks The role content storage can play in reducing costs and latency How to decide what features are most important to your business
Tags : 
content delivery network, cdn, web performance, web acceleration, digital content delivery, ddos protection, ddos, web application security, mobile delivery, global content delivery, live streaming, video on demand, video delivery, ott content delivery
    
Limelight Networks
By: Adobe     Published Date: Jul 09, 2015
Com o crescimento explosivo no uso de smartphones e tablets nos últimos cinco anos, a maioria dos profissionais de marketing desenvolveu estratégias para atrair clientes através de canais mobile. Nessa pesquisa, descobrimos que esses profissionais aprenderam a atingir os clientes por meio de dispositivos e plataformas, além de adaptar seus investimentos mobile à medida que eles se desenvolvem. Também analisamos e avaliamos as melhores práticas desses profissionais, de setores como: mídia e entretenimento, varejo e comércio, serviços financeiros, B2B e alta tecnologia. A pesquisa oferece uma visão geral dos investimentos em mobilidade pelos principais pro ssionais de marketing e o que é preciso para manter a liderança.
Tags : 
adobe, líderes, mobilidade, estratégia, web, tecnologia
    
Adobe
By: Adobe     Published Date: Feb 22, 2017
Today’s customers expect personal experiences no matter where they are, on every device. And it’s on your team to keep pace with every digital demand. That’s part of the unique challenge facing by creative studios. But with the right stock solution, you can save time for the big ideas, not the little to-dos. Read Put Time Back on Your Side: How Adobe Stock Can Jumpstart Your Creative Process to learn how to: • Integrate Adobe Stock for business with your existing Creative Cloud solutions • License stock images without toggling between platforms or reapplying edits • Work up to 10x faster with stock images
Tags : 
time management, pfeiffer, stock images, adobe, adobe stock, creative cloud
    
Adobe
By: Adobe     Published Date: Apr 13, 2017
Today’s customers expect personal experiences no matter where they are, on every device. And it’s on your team to keep pace with every digital demand. That’s part of the unique challenge facing by creative studios. But with the right stock solution, you can save time for the big ideas, not the little to-dos. Read Put Time Back on Your Side: How Adobe Stock Can Jumpstart Your Creative Process to learn how to: • Integrate Adobe Stock for business with your existing Creative Cloud solutions • License stock images without toggling between platforms or reapplying edits • Work up to 10x faster with stock images
Tags : 
creative assistance, graphic design, photo editing, creative cloud, design, creative design, photoshop, stock photography
    
Adobe
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter