Security Devices Research
Sponsored by: Citrix
This white paper examines the modern DoS landscape, and provides several solutions in dealing with current DoS threats, given their fast-growing numbers.
Sponsored by: Nominum, Inc.
This paper details the costs that were incurred by a global broadband provider after a DoS attack compromised their DNS. Access now and learn about the harsh realities of an ill-prepared infrastructure that couldn't cope with services outages. Read on to learn how you can prepare your own business to avoid a similar fate.
Sponsored by: Dell Software
The Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.
Sponsored by: Infoblox
This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Sponsored by: Cisco Systems, Inc.
This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
Sponsored by: Juniper Networks, Inc.
BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.
Sponsored by: APCON, Inc.
This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.
Sponsored by: Intel
This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.
Sponsored by: Dell, Inc.
Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.
Sponsored by: Ixia
Learn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.