ComputerWeekly.com Research Library

Powered by Bitpipe.com

Domain Name Systems Research

  • SURFnet Selects Thales Luna HSMs to Secure DNSSEC Material

    Sponsored by: Thales

    As part of an organization-wide initiative to ensure DNS security and compliance, SURFnet partnered with Thales to address several challenges they were facing related to DNS. Read this case study to see why they chose Thales as their DNS security and compliance partner and learn more about the outcomes of this initiative.

  • SIG - AV-TEST Evaluates Secure Web Gateway and DNS-Layer Security Efficacy

    Sponsored by: Cisco Umbrella

    In September and October 2020 AV-TEST performed a review of comparable security offerings from Akamai, Infoblox, Palo Alto Networks, Netskope, Cisco, and Zscaler. The test was commissioned by Cisco to determine how well vendors protected remote workers against malware, phishing sites and malicious websites.

  • Using digital twins to cut costs and improve safety at Shell

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.

  • Forrester: Accelerate Threat Resolution With DNS

    Sponsored by: Infoblox

    Security and risk (S&R) professionals rely on DNS for 3 priorities: early detection and blocking of threats, investigation and response to threats and quick identification of compromised devices. How can organizations get a holistic view of the importance of DNS to security? Browse this Forrester report to learn why DNS is crucial in DLP.

  • Top 5 Use Cases for Cisco Umbrella

    Sponsored by: Cisco Umbrella

    The modern workplace has evolved to include remote access and mobile devices, while also introducing a new generation of complex security threats. In this e-book, 5 customers share the unique ways Cisco Umbrella protects their network. Read on to unlock the use cases.

  • DNS Monitoring and What it Means for the Enterprise

    Sponsored by: AppNeta

    DNS is part of your network's backbone, and as a result, it's inherently tied to your network's performance, its security, and – ultimately – the user experience that it delivers. Find out how you can effectively monitor DNS performance across all of your locations so that you can identify and resolve issues before they negatively impact end users.

  • Online domain maturity

    Sponsored by: ComputerWeekly.com

    Analysts Bob Tarzey and Clive Longbottom explain how organisations can provide a top-rate online experience for their customers

  • Types of DNS Attacks Reveal DNS Defense Tactics

    Sponsored by: SearchSecurity.com

    This E-Guide from SearchSecurity.com details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!

  • IPV6 Transition – Why the rush ?

    Sponsored by: ComputerWeekly.com

    This report from Ovum warns that enterprises need to recognise that they will need to move to IPv6, even if they have IPv4 addresses available. They should treat IPv6 like any other disaster recovery plan.

  • DNS Co-Founder Discusses the Need for a More Secure DNS

    Sponsored by: Dyn

    This expert e-guide features a Q&A with Paul Mockapetris, inventor of the Domain Name System, where he discusses the immediate need for a more secure DNS and Internet. Additionally, learn what security risks IoT will bring to DNS.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

  • How DNS Information Can Help Cut Millions from Your Infrastructure Costs

    Sponsored by: Dyn

    This expert e-guide explains why DNS intelligence is the key to better network capacity planning and dynamic resourcing. Access now to begin planning to cut your infrastructure costs dramatically in the coming years.

  • Defending Against Application-Layer DDoS Attacks

    Sponsored by: Juniper Networks, Inc.

    This white paper explains the serious problem that DDoS threats present, and how it impacts your business.

  • Protecting DNS Infrastructure—Inside and Out

    Sponsored by: Infoblox

    This white paper unveils the critical risk your domain name system (DNS) is in, and offers leading strategies to help you protect your infrastructure against outside-in and inside-out threats.

  • Creating a Best-of-Breed DDI Solution in a Microsoft Environment

    Sponsored by: Infoblox

    Access this informative whitepaper and learn how you can implement effective DNS, DHCP, and IP address management (DDI).

  • Master List of DNS Terminology

    Sponsored by: Dyn

    In this eBook, you'll find the most common DNS terms and their definitions to help you better understand DNS.

  • IBM X-Force 2013 Mid-Year Trend and Risk Report

    Sponsored by: IBM

    In this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).

  • Ballarat Grammar Secures BYOD with HP Sentinel SDN

    Sponsored by: Hewlett Packard Enterprise

    In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.

  • Top Five DNS Security Attack Risks and How to Avoid Them

    Sponsored by: Infoblox

    Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.

  • Top 5 DNS Security Attack Risks and How to Avoid Them

    Sponsored by: Infoblox

    This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.

  • Disaster Preparedness for Core Network Services

    Sponsored by: Infoblox

    This white paper will take a look at how failures can unexpectedly disrupt core network services and the applications that depend on them despite employing traditional approaches to providing redundant configurations. Read this white paper to learn how to minimize the effects of failures to ensure business continuity.

  • How a DNS Firewall Helps in the Battle Against Advanced Persistent Threat and Similar Malware

    Sponsored by: Infoblox

    Uncover the role a DNS firewall can play in your security strategy for reducing loss of data due to stealthy advanced persistent threats (APTs) and other malware attacks.

  • DNS Firewalls and Defense Tactics

    Sponsored by: Infoblox

    Gain an in-depth look at today's most popular domain name system (DNS) attacks and the defense tactics against them. In addition, uncover how a DNS firewall can help keep your organization safe.

  • STATE OF DNS AVAILABILITY REPORT

    Sponsored by: Verisign, Inc.

    View this informative white paper to learn more about the domain name system vulnerabilities that you should keep in mind for the busy season. Find out some of the challenges of availability and the impact downtime can have on your enterprise by accessing this resource.

  • Cisco Prime Network Registrar

    Sponsored by: Cisco Systems, Inc.

    Learn about a solution that will help you simplify the management of IP addresses and ease your transition to IPv6.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences