All White Papers

Resources available: 1338

Cloud Managed Security: An Evolution in Enterprise Cloud Security

Private cloud techniques extend the protection of corporate governance and policies to the elasticity of a cloud platform- but that doesn't automatically make it secure. You need integrated cloud security controls to ensure that your data is always protected, in the cloud or elsewhere. This informative...

3 Questions to Ask Your DNS Host about Lowering DDoS Risks

It's no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone's a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and...

The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

DDoS attacks against high-tech firms have started to take a dangerous turn. It's called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar's 2014 Annual DDoS Attacks...

Taking a Holistic View of the Total Cost of Data Helps CIOs Optimize IT and Business Gains

Data is the lifeblood of business. This means that CIOs can no longer treat data management as just a component of their IT strategy; instead, they need to develop strategies that account for data's core role in driving business-enabling and revenue-generating activities.

DDoS Infographic: How Are Attacks Evolving?

For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger? What new tactics are criminals employing? See this infographic for clues.

Vendor Landscape: Application Delivery Controllers

Application delivery controllers (ADCs) only vaguely resemble the load balancers they started as. With a wide array of features coming from each vendor, it is important to evaluate the market before choosing a solution. This research will help you understand what's new in the ADC market, evaluate ADC...

Three Ways Your DNS Can Impact DDoS Attacks

Domain Name System (DNS) plays a big role in consumers' day-to-day Internet usage and is a critical factor when it comes to distributed denial-of-service (DDoS) attacks. Learn three ways your DNS can have an impact on DDoS attacks.

ROI Benefits from Automating Application Delivery Solutions

One of the key tenets of a modern data center is the ability to leverage technologies that enable automation in order to accelerate business processes and ultimately time to market. Organizations that continue to deploy legacy infrastructures and ignore this transformation to modern automated environments...

PCI DSS Compliance in Cloud Environments

PCI DSS is a pragmatic set of best practices and security measures that any organization must follow if they accept and handle cardholder data online. The PCI Security Standards Council released an information supplement to the PCI DSS requirements to help merchants to understand the challenges involved when...

Network Transformation: A Guide to Planning Your Journey to All-IP

Historically, communication service providers (CSPs) have viewed network transformation through the narrow lens of technology, as though it were a simple matter of upgrading equipment. But in reality, the solution is much more complex. To ensure a smooth transition to an all-IP network, it's essential...

©1994-2014 Infoworld, Inc.