Videos Search Search Topics None Network & Cloud Automation (22) Security (42) DDI (1) Application Traffic Management (6) Sort None By Newest By Oldest By Title (A-Z) By Title (Z-A) Filter 65 results found Videos Hacking Demo #3 Data Exfiltration As the DNS protocol is authorized to go from the inside of the network to the Internet, some have found a way to use it to silently exfiltrate valuable data. Malware installed on a victim’s... Videos Hacking Demo #2 Command & Control This video portrays how malware uses command and control through the DNS protocol in order to contact the main server, to move onto their next act. In the previous video on phishing, one main infection... Videos Hacking Demo #1 Mail Infection This demo video presents how mail infection can help malware enter the enterprise network. Once the user has opened the infected email attachment (e.g. an invoice, proposal, funny picture, resume), the malware installs itself and... Videos Improve Disaster Recovery Planning with DNS GSLB Follow Meg & Tom in their IT adventures in this episode focusing on how a DRP can be a simple operation to prepare and execute with an Edge DNS GSLB solution. While application data controllers... Videos Fighting Malware with DNS Security Follow Meg & Tom in their IT adventures in this episode focusing on combating malware security risks and ransomware attacks. DNS should be leveraged, as it sees all client traffic intent. See Also Videos EfficientIP Solutions Overview In this video, you will see how EfficientIP solutions can help to modernize your network with security, automation and IP address management. Follow Jane, IT network administrator, who faces standard issues like the introduction of... « Previous 1 … 7 8 9 10 11 Next »
Videos Hacking Demo #3 Data Exfiltration As the DNS protocol is authorized to go from the inside of the network to the Internet, some have found a way to use it to silently exfiltrate valuable data. Malware installed on a victim’s...
Videos Hacking Demo #2 Command & Control This video portrays how malware uses command and control through the DNS protocol in order to contact the main server, to move onto their next act. In the previous video on phishing, one main infection...
Videos Hacking Demo #1 Mail Infection This demo video presents how mail infection can help malware enter the enterprise network. Once the user has opened the infected email attachment (e.g. an invoice, proposal, funny picture, resume), the malware installs itself and...
Videos Improve Disaster Recovery Planning with DNS GSLB Follow Meg & Tom in their IT adventures in this episode focusing on how a DRP can be a simple operation to prepare and execute with an Edge DNS GSLB solution. While application data controllers...
Videos Fighting Malware with DNS Security Follow Meg & Tom in their IT adventures in this episode focusing on combating malware security risks and ransomware attacks. DNS should be leveraged, as it sees all client traffic intent. See Also
Videos EfficientIP Solutions Overview In this video, you will see how EfficientIP solutions can help to modernize your network with security, automation and IP address management. Follow Jane, IT network administrator, who faces standard issues like the introduction of...