DDoS Attacks White Papers

(View All Report Types)
The Cybercrime Arms Race
sponsored by Kaspersky
WHITE PAPER: Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Kaspersky

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

How Retailers Use LTE as Wireless WAN to Improve Service & Operations
sponsored by Ericsson
WHITE PAPER: Innovation is changing retail from the storefront to the back office and beyond. Because of this transformation, IT teams and the enterprise networks they manage have never been more important. In this white paper, explore emerging trends in retail IT and considerations for choosing futureproof edge network solutions for retail.
Posted: 08 Feb 2021 | Published: 20 May 2020

Ericsson

Support PCI Security Compliance with Enhanced Solutions from IBM
sponsored by IBM
WHITE PAPER: This white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

7 Essential Steps of Network Security
sponsored by Qualys
WHITE PAPER: This paper details the essential aspects of putting into place a measurable and sustainable 7 step vulnerability management program, and demonstrates how QualysGuard automates everything you need along the way.
Posted: 07 Nov 2008 | Published: 07 Nov 2008

Qualys

Keys to Microsoft Application Acceleration: Advances in Delivery Systems
sponsored by Citrix
WHITE PAPER: Read this paper to learn how you can ensure significantly faster access to the Microsoft applications your users depend on. Download this complimentary guide to discover how an integrated advanced delivery solution can help you.
Posted: 19 Sep 2008 | Published: 18 Sep 2008

Citrix

Successful Mobile Deployments Require Robust Security
sponsored by Lopez Research
WHITE PAPER: Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.
Posted: 20 May 2009 | Published: 20 May 2009

Lopez Research

Cisco Continuous Data Protection for Files
sponsored by Cisco Systems, Inc.
WHITE PAPER: Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software.
Posted: 25 Mar 2009 | Published: 25 Mar 2009

Cisco Systems, Inc.

Cisco Virtual Office Deployment Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: Cisco Virtual Office is a highly scalable solution for medium and large organizations looking to provide teleworkers, small offices, and mobile users with office-like experience combining voice, video, wireless, and real-time data applications in a secure environment. This deployment guide provides full details.
Posted: 18 Jun 2009 | Published: 09 Jun 2009

Cisco Systems, Inc.

7 Requirements of Data Loss Prevention
sponsored by Symantec Corporation
WHITE PAPER: This report provides a clear understanding of the capabilities a successful data loss prevention solution must deliver. It also incorporates insight into the capabilities that companies require from their solution.
Posted: 10 Mar 2009 | Published: 10 Mar 2009

Symantec Corporation