Packet Monkey Reports

Types of DNS Attacks Reveal DNS Defense Tactics
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchSecurity.com details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!
Posted: 21 Mar 2013 | Published: 21 Mar 2013

TechTarget Security

The real need for distributed denial-of-service protection: How to stop DDoS attacks
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses the immediate need for DDoS protection services and what you put at risk by not protecting your organization today. Uncover how these attacks work, the damage they can cause and best practices to stop them.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

TechTarget Security

Security as a Service: Benefits and Risks of Cloud-Based Security
sponsored by TechTarget Security
EGUIDE: Uncover the fresh approach cloud-based Security as a Service (SaaS) is bringing to the market and learn the top benefits and risks to get help deciding if this is a viable option for your organization.
Posted: 01 Mar 2013 | Published: 01 Mar 2013

TechTarget Security

The Business Case for Managed DDos Protection
sponsored by Neustar®
WHITE PAPER: This whitepaper provides a snapshot of the evolving DDoS threat, provides guidance on what to look for in a managed DDoS solution and presents a financial cash-flow analysis scenario of an investment in a managed DDoS protection service.
Posted: 18 Nov 2011 | Published: 17 Nov 2011

Neustar®

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by TechTarget Security
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

TechTarget Security

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

Akamai Shields Leading Retailer from Ddos Attacks During Critical Holiday Shopping Period - and Protects $10 Million in Revenues
sponsored by Akamai Technologies
CASE STUDY: In this case study, learn how one online retailer was able to maintain online operations and protect $10 million in revenue by implementing Akamai’s DDoS Defender Security Solution and utilizing Akamai Intelligent Platform to deflect and reflect malicious attacks.
Posted: 04 Apr 2012 | Published: 04 Apr 2012

Akamai Technologies

Navigating Today's DDoS Landscape
sponsored by Ixia
WHITE PAPER: Learn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.
Posted: 02 May 2014 | Published: 02 May 2014

Ixia

State of DNS Availability Report
sponsored by Verisign, Inc.
WHITE PAPER: This domain name system (DNS) availability report illustrates the risks and impact that site downtime can have on revenue generation, business continuity, customer loyalty and more.
Posted: 11 Nov 2011 | Published: 11 Nov 2011

Verisign, Inc.

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM