DNS Attacks White Papers

(View All Report Types)
Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

The Cybercrime Arms Race
sponsored by Kaspersky
WHITE PAPER: Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Kaspersky

Integrating Dell Equallogic™ Sans with Citrix XENSERVER: Realizing Virtualization's Full Potential
sponsored by DellEMC and Intel®
WHITE PAPER: XenServer enables consolidation of server and other infrastructure resources, by combining servers and storage into resource pools that can be apportioned to the applications with the highest business need.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

DellEMC and Intel®

Productivity, Internet Abuse, and How to Improve One by Eliminating the Other
sponsored by Bloxx, Inc.
WHITE PAPER: This white paper explains the effect of Internet abuse on employee productivity, which is huge and not fully appreciated.
Posted: 05 Sep 2008 | Published: 05 Sep 2008

Bloxx, Inc.

IDC White Paper: Key Criteria in Selecting an Enterprise Online PC Backup Solution
sponsored by Iron Mountain
WHITE PAPER: This paper illustrates the top–level benefits of online PC backup. Read this paper to learn more about how to choose an online PC backup solution for your mid-sized organization or enterprise!
Posted: 11 Jan 2010 | Published: 15 Dec 2008

Iron Mountain

Web Based Attacks
sponsored by Symantec Corporation
WHITE PAPER: This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.
Posted: 11 Jun 2009 | Published: 01 Feb 2009

Symantec Corporation

Migration and Security in SOA
sponsored by Torry Harris Business Solutions
WHITE PAPER: It is estimated that 90% of most external attacks take advantage of known vulnerabilities and misconfigured systems. This white paper provides comprehensive guidance on integrating security and access-control best practices into your SOA and WSOA initiatives. It includes such topics as access control and SOA security implementation models.
Posted: 03 Mar 2009 | Published: 03 Mar 2009

Torry Harris Business Solutions

The Top 3 Cost-Cutting Mistakes CIOs Make And How to Avoid Them
sponsored by Rally Software
WHITE PAPER: The current economic downturn has resulted in contraction of IT Department budgets and a mandate to allocate resources to only the most critical projects, then execute it flawlessly. In these tough times, it is imperative for CIOs to deliver more value as IT budgets fall.
Posted: 03 Apr 2009 | Published: 03 Apr 2009

Rally Software

Cisco Security Solutions - A Reference Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: This reference guide shows why security matters now more than ever. A strategic security solution empowers organizations to maintain their reputation, meet regulatory compliance standards, protect business information, and optimize business operations. Read on and discover how Cisco can help you meet those objectives.
Posted: 10 Jun 2009 | Published: 09 Jun 2009

Cisco Systems, Inc.

SeatonCorp Delivers Low Cost, High Reliability Virtual Desktops via Quest vWorkspace
sponsored by Dell Software
WHITE PAPER: Read this case study to see how the benefits of Quest® Software's vWorkspace helped SeatonCorp achieve lower cost, enhanced capabilities, higher reliability, easier management and easier end-user IT support.
Posted: 29 Jun 2009 | Published: 26 Jun 2009

Dell Software