Networking Research Library

Powered by Bitpipe.com

Domain Name SystemsResearch

  • DNS Challenges in a Changing Landscape

    Sponsored by: F5 Networks

    This infographic provides a number of statistics that illustrate the current challenges of deploying an available, secure, high-performance DNS (Domain Name System) infrastructure.

  • DNS Challenges in a Changing Landscape

    Sponsored by: F5 Networks

    View this infographic to discover common challenges of DNS management, and get the stats on the top availability and security concerns of DNS administrators, including outages and DDoS attacks.

  • What You Should Be Asking Your DNS Host About Lowering DDoS Risks

    Sponsored by: Neustar®

    This white paper provides answers to three questions about DDoS attacks that you need to ask your DNS host before, not after, your company becomes a target.

  • Defending Against Application-Layer DDoS Attacks

    Sponsored by: Juniper Networks, Inc.

    This white paper explains the serious problem that DDoS threats present, and how it impacts your business.

  • Protecting DNS Infrastructure—Inside and Out

    Sponsored by: Infoblox

    This white paper unveils the critical risk your domain name system (DNS) is in, and offers leading strategies to help you protect your infrastructure against outside-in and inside-out threats.

  • Four Ways DNS Can Accelerate Business Growth

    Sponsored by: Neustar®

    This exclusive paper discusses the plethora of benefits that a robust and secure DNS can provide your organization. Read on to find out how you can significantly enhance your web experience for users, driving new streams of revenue.

  • Seven Strategies for Identifying Who’s Behind Advanced Cyber Attacks

    Sponsored by: FireEye

    When establishing your security strategy, the ability to recognize who your attackers are and how they work is essential. This informative guide breaks down the nature of malware attacks and what they reveal about the culprit, including their location, ties to other malware attacks, and connections to common threat factors.

  • The F5 Intelligent DNS Scale Reference Architecture

    Sponsored by: F5 Networks

    The Domain Name System (DNS) is arguably the primary technology enabling the internet. This guide explores why DNS architecture is essential to your network and how you can build an available, intelligent, secure, and scalable infrastructure.

  • Top Five DNS Security Attack Risks and How to Avoid Them

    Sponsored by: Infoblox

    Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.

  • Types of DNS Attacks Reveal DNS Defense Tactics

    Sponsored by: SearchSecurity.com

    This E-Guide from SearchSecurity.com details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!

  • CW Buyer's Guide: IPV6 Migration

    Sponsored by: ComputerWeekly.com

    This Computer Weekly Buyer's guide takes you through the steps you need to take to migrate to IPv6 and explains the potential impact on your business.

  • IPV6 Transition – Why the rush ?

    Sponsored by: ComputerWeekly.com

    This report from Ovum warns that enterprises need to recognise that they will need to move to IPv6, even if they have IPv4 addresses available. They should treat IPv6 like any other disaster recovery plan.

  • Creating a Best-of-Breed DDI Solution in a Microsoft Environment

    Sponsored by: Infoblox

    Access this informative whitepaper and learn how you can implement effective DNS, DHCP, and IP address management (DDI).

  • DNS in the Cloud: Building a Secure DNS Architecture

    Sponsored by: F5 Networks

    Access this expert e-guide about DNS in the cloud to unveil the suggested tactics to improve DNS architectures and security, including DNSSEC signed zones.

  • DNS Attack Prevention: Inside DNS Components Vulnerable to Attack

    Sponsored by: F5 Networks

    In this expert e-guide, industry leader Char Sample explains why the domain name system (DNS) is an attractive target for hackers, and which of its 4 components is most vulnerable. Click now to also unveil 3 mitigation tactics.

  • Master List of DNS Terminology

    Sponsored by: Dyn

    In this eBook, you'll find the most common DNS terms and their definitions to help you better understand DNS.

  • IBM X-Force 2013 Mid-Year Trend and Risk Report

    Sponsored by: IBM

    In this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).

  • Ballarat Grammar Secures BYOD with HP Sentinel SDN

    Sponsored by: Hewlett-Packard Company

    In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.

  • Top 5 DNS Security Attack Risks and How to Avoid Them

    Sponsored by: Infoblox

    This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.

  • Disaster Preparedness for Core Network Services

    Sponsored by: Infoblox

    This white paper will take a look at how failures can unexpectedly disrupt core network services and the applications that depend on them despite employing traditional approaches to providing redundant configurations. Read this white paper to learn how to minimize the effects of failures to ensure business continuity.

  • The Dynamic DNS Infrastructure

    Sponsored by: F5 Networks

    This resource details a full-proxy architecture for DNS that provides a complete solution for global, local, and cloud load balancing, helping you overcome all the growth and security challenges the DNS is facing.

  • How a DNS Firewall Helps in the Battle Against Advanced Persistent Threat and Similar Malware

    Sponsored by: Infoblox

    Uncover the role a DNS firewall can play in your security strategy for reducing loss of data due to stealthy advanced persistent threats (APTs) and other malware attacks.

  • DNS Firewalls and Defense Tactics

    Sponsored by: Infoblox

    Gain an in-depth look at today's most popular domain name system (DNS) attacks and the defense tactics against them. In addition, uncover how a DNS firewall can help keep your organization safe.

  • STATE OF DNS AVAILABILITY REPORT

    Sponsored by: Verisign, Inc.

    View this informative white paper to learn more about the domain name system vulnerabilities that you should keep in mind for the busy season. Find out some of the challenges of availability and the impact downtime can have on your enterprise by accessing this resource.

  • Cisco Prime Network Registrar

    Sponsored by: Cisco Systems, Inc.

    Learn about a solution that will help you simplify the management of IP addresses and ease your transition to IPv6.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Networking Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.