DNS Attacks White Papers

(View All Report Types)
Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

The Cybercrime Arms Race
sponsored by Kaspersky
WHITE PAPER: Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Kaspersky

Achieving Cost Savings in Backup with Deduplication
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: This document discusses that dollars and time currently consumed by existing tape libraries can be far better utilized by moving to disk back-up with deduplication.
Posted: 09 Jul 2010 | Published: 09 Jul 2010

ExaGrid Systems, Inc.

Auto-Snapshot Manager/Vmware Edition Automated, Integrated, and Scalable Protection of Virtual Machines
sponsored by DellEMC and Intel®
WHITE PAPER: This paper will discuss High performance, space-efficient hypervisor-aware SAN-based snapshot and replication support, backup and recovery, IT infrastructure, as well as virtual security.
Posted: 24 Jun 2009 | Published: 24 Jun 2009

DellEMC and Intel®

7 Requirements of Data Loss Prevention
sponsored by Symantec Corporation
WHITE PAPER: This report provides a clear understanding of the capabilities a successful data loss prevention solution must deliver. It also incorporates insight into the capabilities that companies require from their solution.
Posted: 10 Mar 2009 | Published: 10 Mar 2009

Symantec Corporation

Tap Aggregation and Filtering to Enable Deep Packet Inspection (DPI)
sponsored by Gigamon
WHITE PAPER: Read this brief paper to learn how network monitoring using DPI analyzers is a mission critical application that is tailor-made for the Data Access Network (DAN) architecture and saves substantial amounts of money for the telecom carrier.
Posted: 01 Jul 2009 | Published: 01 Jul 2009

Gigamon

Windows Essential Business Server 2008: Deploying Windows Mobile 6 with Windows Essential Business Server 2008
sponsored by Microsoft
WHITE PAPER: This document provides step-by-step instructions for deploying devices powered with Windows Mobile 6 in an IT infrastructure that is based on the Windows Essential Business Server 2008 (Windows EBS 2008) server solution.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

Microsoft

Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER: This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Integrating Dell Equallogic™ Sans with Citrix XENSERVER: Realizing Virtualization's Full Potential
sponsored by DellEMC and Intel®
WHITE PAPER: XenServer enables consolidation of server and other infrastructure resources, by combining servers and storage into resource pools that can be apportioned to the applications with the highest business need.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

DellEMC and Intel®

Optimizing IT Service Delivery: The Need for Linux System Management
sponsored by Red Hat and JBoss
WHITE PAPER: One way IT organizations are handling the growing need to achieve IT efficiency is by implementing systems management functions in their business environments. As the business value of Linux based deployment increases, so does the need for Linux systems management. This IDC white paper will examine the key benefits of system management software.
Posted: 03 Sep 2009 | Published: 03 Sep 2009

Red Hat and JBoss