Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
BURLINGTON, MA -- (Marketwired) -- 06/05/13 -- Arbor Networks, Inc., a leading provider of network security and management solutions for enterprise and service provider networks, is hosting a webinar this week with BrightTalk on the topic of "The New 'Denial of Service' Attack: Why you may no longer be protected." Arbor Networks' John Trollinger will co-present with IANS Faculty member and security expert Dave Shackleford during the webinar, which takes place on June 12, 2013, at 11:00am ET.
This webinar will focus on examples of high profile, multi-vector attacks that use stealth components and application vulnerabilities to shut down or infiltrate an enterprise's network. Attendees will learn which types of attacks cloud providers and service providers are stopping and which types need to be handled on the internal enterprise network. John Trollinger and Dave Shackleford will also recommend a framework that will help organizations move toward a more secure stance against denial of service attacks.
WHO:
John Trollinger, product marketing manager - enterprise security, Arbor Networks
Dave Shackleford, IANS Faculty member and security expert
WHAT:
There was a time when distributed denial of service (DDoS) attacks threatened business operations by simply "flooding the network pipe" with traffic congestion. But that has all changed. Today's sophisticated and targeted attacks use a multitude of vectors to overwhelm and infiltrate websites and online services -- disrupting an enterprise's online presence and the customer's ability to do business with the company under attack.
While enterprises once could rely solely on their cloud service providers, ISPs, and perimeter security to protect against these attacks, many are just now learning they are vulnerable to the new types of denial of service attacks. Some of these highly targeted attacks are taking down online services while others are being used as a diversionary tactic to distract from an advanced malware attack.
This webinar will review the evolution in the denial of service landscape, discussing best practices for protecting enterprise networks from these stealthy and complex denial of service attacks.
WHERE:
"The New 'Denial of Service' Attack: Why you may not be protected" webinar
Register here: http://www.brighttalk.com/webcast/9051/75733
WHEN:
June 12, 2013, 11:00am ET
About Arbor Networks
Arbor Networks, Inc. is a leading provider of network security and management solutions for enterprise and service provider networks, including the vast majority of the world's Internet service providers and many of the largest enterprise networks in use today. Arbor's proven network security and management solutions help grow and protect customer networks, businesses and brands. Through its unparalleled, privileged relationships with worldwide service providers and global network operators, Arbor provides unequalled insight into and perspective on Internet security and traffic trends via the ATLAS® Active Threat Level Analysis System. Representing a unique collaborative effort with 270+ network operators across the globe, ATLAS enables the sharing of real-time security, traffic and routing information that informs numerous business decisions.
For technical insight into the latest security threats and Internet traffic trends, please visit our website at arbornetworks.com and our blog at http://ddos.arbornetworks.com.
Trademark Notice: Arbor Networks, Peakflow, ArbOS, How Networks Grow, ATLAS, Pravail, Arbor Optima, Cloud Signaling, the Arbor Networks logo and Arbor Networks: Smart. Available. Secure. are all trademarks of Arbor Networks, Inc. All other brand names may be trademarks of their respective owners.
Kevin Whalen
Arbor Networks
781 362 4377
kwhalen@arbor.net
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs