Tuesday, February 17, 2009

Network-based protection against denial-of-service-attacks

Verizon Business' expanded services protect against denial-of-service-attacks
Network World logo

Wide Area Networking Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by HP
rule

HP Get the latest on Storage Virtualization
Storage virtualization reduces the complexity of managing, backing up and archiving data. Learn the differences between the three main storage virtualization technologies which are in the data path, out-of band and split path in this informative guide. Find out which technology is best suited for your environment.

rule

Spotlight Story
Network-based protection against denial-of-service-attacks

Steve Taylor By Steve Taylor and Jim Metzler
A recent announcement by Verizon Business concerning an expanded suite of protection "in the cloud" from denial-of-service-attacks is a great example of services that should be provided within the service providers' networks - something that we've been advocating for years. Read full story

Steve Taylor is president of Distributed Networking Associates and publisher/editor-in-chief of Webtorials. Jim Metzler is vice president of Ashton, Metzler & Associates.

Related News:

Verizon extends DoS detection service to 23 countries Verizon Business is extending the reach of its Denial of Service Detection service to 23 new countries, including Canada, the United Kingdom and Japan.

Verizon service steps up analysis of security risks Managed security services from Verizon Business get stronger risk-correlation capabilities.

Microsoft patches flaw that could compromise, cripple Exchange Microsoft Tuesday released a critical patch designed to thwart hackers who could take over Exchange Servers or shut them down with denial-of-service attacks.

Tech industry group battles botnets Several ISPs and Internet companies will meet in San Francisco early next year to adopt a common strategy for combating botnets, the remotely controlled networks that are used to carry out distributed denial-of-service ...

Internet has a trash problem, researcher says Somewhere between 1% and 3% of all traffic on the Internet is meaningless packets of information, used in distributed denial-of-service attacks to knock Web sites offline.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by HP
rule

HP Get the latest on Storage Virtualization
Storage virtualization reduces the complexity of managing, backing up and archiving data. Learn the differences between the three main storage virtualization technologies which are in the data path, out-of band and split path in this informative guide. Find out which technology is best suited for your environment.

rule

Avoid the SMB Technology Quagmire
SMBs have concrete technology needs, but it's difficult to find cost-effective, easy to manage and secure solutions. Get real-world advice on how to complete this task in this Special Briefing, "Avoiding Techno-quicksand for Small and Medium Businesses." Find out how to select the right products for your organization today.
Download this Special Briefing now.


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09 including New York in February, Denver in March, Chicago in April.
Register now, attend free

 

02/17/09

Today's most-read stories:

  1. Microsoft announces $250,000 Conflicker worm bounty
  2. Evolution of PCs, Macs, Internet, routing, cell phones, Microsoft Windows
  3. Palm pulls the plug on Palm OS, bets the future on Pre's webOS
  4. Largest coordinated ATM rip-off ever nets $9+ million
  5. Iridium calls may suffer outages from satellite crash
  6. Microsoft renames, expands free online services for higher-ed
  7. New amplifier paves way for 10Gbps wireless Web
  8. NSA identifies top 25 programming errors
  9. Rumor mill: Cisco to buy VMware?
  10. Did Borat help Cisco?


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: