• About yourself 
  • Download

The bot threat (U.S. English)

PDF 580 KB | 4 pages
Overview

Today's enterprise networks can be attacked in a number of ways. None are more daunting than the Internet robot or simply, the bot. Bots are malicious code programs that are automated to infect a computer network.

This paper explains how a botnet works and how security professionals can fully protect your network from botnet attacks. It also discusses how HP has invested...

Today's enterprise networks can be attacked in a number of ways. None are more daunting than the Internet robot or simply, the bot. Bots are malicious code programs that are automated to infect a computer network.

This paper explains how a botnet works and how security professionals can fully protect your network from botnet attacks. It also discusses how HP has invested considerable amounts of time, effort, and resources in delivering security intelligence solutions to identify and mitigate the risks posed by botnets and other malicious code attacks. HP solutions include HP TippingPoint Next Generation IPS (NGIPS), powered by X-Armour, and Reputation Digital Vaccine (RepDV).

image | 4AA3-9451ENW Click to enlarge
  Close Overlay
The bot threat
2
How a botnet works
2
Protecting against bots/botnets
3
The right strategy always wins
4
About HP
4
Tell us about yourself
Required *
 
+