Threat Whitepapers


Sort by: Date | Company | Title


Key Communications Systems Are Always Available, Highly Responsive for Global Mining Company
By F5 Networks | 16/7/2014
Mining company Teck Resources wanted to ensure high availability and responsiveness for its critical employee communications systems. To achieve this goal, Teck chose a comprehensive F5 traffic management and secure access solution that provides high availability and give users a more responsive experience.
Download this now


Protecting Against Application DDoS Attacks : A Three-Step Solution
By F5 Networks | 16/7/2014
Today’s security threats increasingly involve application-layer DDoS attacks mounted by organized groups of attackers to damage web-facing applications by exhausting resources. F5 BIG-IP ASM provides application-layer protection against DDoS attacks.
Download this now


DDoS Protection: Recommended Practices
By F5 Networks | 16/7/2014
A DDoS attack can be a stressful engagement where parts of the network will be unresponsive and equipment may be failing all around. That is not the time to be planning a defense—preparing your network applications during “peacetime” will go a long way to helping you mitigate the attack in the future.
Download this now


Rackspace Hosting Links Dedicated Servers to Cloud for Maximum Scalability and Flexibility
By F5 Networks | 16/7/2014
Rackspace Hosting, the world’s leading specialist in hosting and cloud computing, wanted to offer its customers an easy way to link dedicated managed servers to cloudbased servers. The company used Application Delivery Networking devices from F5 to help build a hybrid service called RackConnect.
Download this now


Intelligent Traffic Management
By F5 Networks | 16/7/2014
Communications service providers (CSPs) are struggling with an explosion of data traffic resulting from increased mobile usage, streaming video, resource-intensive over-thetop (OTT) applications, and smart device proliferation. At the same time, CSPs must deploy new network technologies and services to stay competitive and satisfy customers.
Download this now


Insurance Provider Broadens Customer Experience, and Boosts Security
By F5 Networks | 16/7/2014
Pekin Insurance, a large Midwestern insurance policy provider with 1,200 agencies and 7,500 independent agents, is always striving to better serve its customers. Pekin wanted to give its growing number of tech-savvy customers direct online access to policy and billing information. To do that, Pekin launched a new web application, called My PI that would deliver a self-service customer portal.
Download this now


F5 Solution Supports Critical Applications, Enhances Patient Care
By F5 Networks | 16/7/2014
A healthcare organization’s small application management staff must ensure high availability and fast delivery of thousands of critical administrative and clinical applications. See what they did to meet those goals.
Download this now


White Paper The DDoS Threat Spectrum
By F5 Networks | 15/7/2014
Bolstered by favorable economics, today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
Download this now


The DDoS Threat Spectrum
By F5 Networks | 14/7/2014
Bolstered by favorable economics, today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
Download this now


What is Threat Emulation Technology
By CheckPoint | 14/11/2013
Threat Emulation uses a sandbox as a separate, isolated environment in which files are open and run to determine whether they are safe or malicious. In this infographic, we look at its implementation and the technology required to avoid infecting a corporate network.
Download this now