White Papers by Topic: Security

Resources available: 327

Advanced Attacks Demand New Defenses

Cyber-criminals wielding APTs have plenty of innovative techniques to evade network and endpoint defenses. It's scary stuff, and ignorance is definitely not bliss. How to fight back? Think security that's distributed, stratified, and adaptive.

Securing Mobility, From Device to Network

At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email) on a single platform (often BlackBerry devices). Those days are long gone. ts.

Data Protection eGuide

In this eGuide, CSO and sister publications IDG News Service, Computerworld, and CIO pull together news, trend, and how-to articles about the increasingly difficult task of protecting corporate data.

Step Out of the Bull's-Eye

Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.

Where You Mitigate Heartbleed Matters

Read this article to learn more about why customers must choose the most strategic point in the network at which to deploy their selected mitigation.

Do More With Less: How CARFAX Consolidated Their Security Solutions

Through a consolidated F5 solution, CARFAX cut site downtime to zero, secures its data, and deployed a high-performance infrastructure to support its rapid growth.

Fight Malware, Malfeasance and Malingering

Every year brings more extreme sets of threats than the last. The good news is that there are a range of mitigation options. The question is which solution offers the greatest protection & control without adding complexity or unnecessary costs.

F5 Data Center Firewall Aces Performance Test

F5's BIG-IP 10200v with Advanced Firewall Manager (AFM) can handle traffic at 80-Gbps rates while screening and protecting tens of millions of connections and simultaneously load-balancing server traffic. Learn more in this whitepaper.

The DDoS Threat Spectrum

Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.

The Opportunities and Challenges of the Cloud

In this report F5 poses questions to IDC analysts, Sally Hudson and Phil Hochmuth, on behalf of F5's customers to better understand the opportunities and challenges of the cloud.

©1994-2014 Infoworld, Inc.