Welcome to the Corero Resource Center

In the Resource Center you’ll find the glossary, webinars, case studies, reports, white papers, FAQs, data sheets and videos all related to distributed denial of service (DDoS) attacks.

DDos attack spectrum

This DDoS attack glossary is intended to provide a high level overview of the various DDoS attack types, typical DDoS attack characteristics and DDoS blocking or anti-DDoS protection techniques.


Responding to the Modern Day DDoS Attack

Protect Your Network: A network security webinar, presented by LSI

Enhancing Your Services Portfolio with Managed DDoS Protection

DDoS Protection for Hosting Providers. Expand Your Cloud Offering and Protect Your Services

Case Studies

Liquid Web Turns to Corero for More Comprehensive Protection Against DDoS Attacks

htp GmbH in Hanover Places Trust in DDoS Protection Provided by Corero Network Security

Die DDoS-Evolution. Und warum sie gerade Provider betrifft. htp GmbH in Hannover entscheidet sich für DDoS-Schutz von Corero Network Security(Content in German)

Inline DDoS Mitigation Eliminates the Need for Human Intervention: Reduces Costs


NSS Labs DDoS Prevention Test Report on Corero SmartWall

DDoS Impact and Opportunity in the Service Provider Environment

Tackling the growing threat of DDoS in Telecoms

DDoS Trends and Analysis 2015 Mid-Year Report

White Papers

The DDoS Managed Security Services Playbook

The Evolution of DDoS Protection

The DDoS Protection Playbook for Hosting Providers

Corero Network Security First Line of Defense® Executive Overview


Corero Network Security Services FAQs

Corero SmartWall Threat Defense System FAQs

Distributed Denial of Service (DDoS) FAQs

Data Sheets

Corero SmartWall® Network Threat Defense - Virtual Edition (vNTD Monitor)

Corero SmartWall Integration with Verisign Openhybrid⢠Solution Brief

SecureWatch Analytics Overview

SmartWall Threat Defense System Solution Brief


Corporate Overview Video

Attack of the Month Video Blog Series: Blended DDoS Attacks

Maybe the Cloud Can Help Secure the Internet

Attack of the Month Video Blog Series: Network Layer Attacks In ICS