Neustar

Displaying 1-9 of 9 results

  • White Papers // May 2015

    4 Security Industry Analyst Recommendations on DDoS Protection

    Neustar found that many of the recommendations are currently found in SiteProtect DDoS protection services with future trends aligned to near term implementation. Following are 4 key take-aways with insights to the report’s DDoS protection recommendations.

    Sponsored By Neustar

  • White Papers // May 2015

    Think You are Safe from DDoS Attacks?

    Amazon Web Services is the world’s top cloud platform. That’s probably why you’re on it – to enjoy reliable, scalable and affordable cloud computing. But while AWS excels at many things, it’s mainly left to the developer to protect against a range of cyberattacks, including DDoS. In fact, AWS does...

    Sponsored By Neustar

  • White Papers // May 2015

    DDoS Report

    Neustar surveyed hundreds of IT professionals in the United States to get a broad perspective on the current threat and impact of DDoS attacks, and to learn which protection strategies companies are embracing. Distilling this survey data, we created the latest iteration of our annual report on the DDoS landscape.

    Sponsored By Neustar

  • White Papers // Feb 2015

    The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

    DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar’s 2014 Annual DDoS Attacks and Impact Survey....

    Sponsored By Neustar

  • White Papers // Feb 2015

    Four Tools to Capture DDoS Attacks in Monitoring

    Most cloud DDoS mitigation services are offered on-demand, meaning that customers can enable the service when they are the victim of a DDoS attack. But how can a company find out - quickly - that it is under attack? Sometimes it is difficult to know. This piece lists four monitoring...

    Sponsored By Neustar

  • White Papers // Feb 2015

    Video: Rodney Joffe Explores Cybercrime’s Underground Economy

    More and more criminals are using DDoS attacks as a distraction or "smokescreen" for other cybercrimes like theft of data or even funds. Watchin this video for a behind-the-scenes tour of what this "underground economy" of the Internet really looks like a place where criminals sell stolen credit cards and...

    Sponsored By Neustar

  • White Papers // Feb 2015

    Don't Let Your DDoS Defense Fall Behind

    Today’s DDoS incidents tend to be briefer and some can be as much as 100 times larger than even just a few years ago. Sometimes criminals use a DDoS attack as a smokescreen to distract IT security teams from other multivector attacks aimed at stealing funds, customer data and intellectual...

    Sponsored By Neustar

  • White Papers // Apr 2011

    Overnight Success: Helping Small And Mid-Sized Businesses Prepare For Sudden Spikes In Online Traffic And Sales

    The short history of the Internet is replete with stories of major crashes, Distributed Denial of Service (DDoS) attacks and just plain downtime, but the ones the authors hear about always involve big names. The outages are embarrassing and costly. Maybe a few IT heads get to roll, but the...

    Provided By Neustar

  • White Papers // Nov 2009

    ROI of Common Short Code and SMS Mobile Marketing

    Mobile has hit the mainstream in the U.S. At the end of 2008, the number of mobile subscribers had grown to 270 million, reaching 87% of U.S. households. The availability of unlimited data and text messaging plans has pushed consumer mobile usage beyond voice to text messaging and Internet access....

    Provided By Neustar

  • White Papers // Feb 2015

    The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

    DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar’s 2014 Annual DDoS Attacks and Impact Survey....

    Sponsored By Neustar

  • White Papers // Feb 2015

    Four Tools to Capture DDoS Attacks in Monitoring

    Most cloud DDoS mitigation services are offered on-demand, meaning that customers can enable the service when they are the victim of a DDoS attack. But how can a company find out - quickly - that it is under attack? Sometimes it is difficult to know. This piece lists four monitoring...

    Sponsored By Neustar

  • White Papers // Feb 2015

    Video: Rodney Joffe Explores Cybercrime’s Underground Economy

    More and more criminals are using DDoS attacks as a distraction or "smokescreen" for other cybercrimes like theft of data or even funds. Watchin this video for a behind-the-scenes tour of what this "underground economy" of the Internet really looks like a place where criminals sell stolen credit cards and...

    Sponsored By Neustar

  • White Papers // Feb 2015

    Don't Let Your DDoS Defense Fall Behind

    Today’s DDoS incidents tend to be briefer and some can be as much as 100 times larger than even just a few years ago. Sometimes criminals use a DDoS attack as a smokescreen to distract IT security teams from other multivector attacks aimed at stealing funds, customer data and intellectual...

    Sponsored By Neustar

  • White Papers // May 2015

    4 Security Industry Analyst Recommendations on DDoS Protection

    Neustar found that many of the recommendations are currently found in SiteProtect DDoS protection services with future trends aligned to near term implementation. Following are 4 key take-aways with insights to the report’s DDoS protection recommendations.

    Sponsored By Neustar

  • White Papers // May 2015

    Think You are Safe from DDoS Attacks?

    Amazon Web Services is the world’s top cloud platform. That’s probably why you’re on it – to enjoy reliable, scalable and affordable cloud computing. But while AWS excels at many things, it’s mainly left to the developer to protect against a range of cyberattacks, including DDoS. In fact, AWS does...

    Sponsored By Neustar

  • White Papers // May 2015

    DDoS Report

    Neustar surveyed hundreds of IT professionals in the United States to get a broad perspective on the current threat and impact of DDoS attacks, and to learn which protection strategies companies are embracing. Distilling this survey data, we created the latest iteration of our annual report on the DDoS landscape.

    Sponsored By Neustar

  • White Papers // Nov 2009

    ROI of Common Short Code and SMS Mobile Marketing

    Mobile has hit the mainstream in the U.S. At the end of 2008, the number of mobile subscribers had grown to 270 million, reaching 87% of U.S. households. The availability of unlimited data and text messaging plans has pushed consumer mobile usage beyond voice to text messaging and Internet access....

    Provided By Neustar

  • White Papers // Apr 2011

    Overnight Success: Helping Small And Mid-Sized Businesses Prepare For Sudden Spikes In Online Traffic And Sales

    The short history of the Internet is replete with stories of major crashes, Distributed Denial of Service (DDoS) attacks and just plain downtime, but the ones the authors hear about always involve big names. The outages are embarrassing and costly. Maybe a few IT heads get to roll, but the...

    Provided By Neustar