{"id":13521,"date":"2021-06-28T06:00:54","date_gmt":"2021-06-28T06:00:54","guid":{"rendered":"https:\/\/nsfocusglobal.com\/recursos\/"},"modified":"2026-04-17T18:07:46","modified_gmt":"2026-04-17T18:07:46","slug":"recursos","status":"publish","type":"page","link":"https:\/\/nsfocusglobal.com\/pt-br\/recursos\/","title":{"rendered":"Recursos"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"13521\" class=\"elementor elementor-13521\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-dce-background-image-url=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/01\/hybrid-ddos-defenses-hero.jpg\" class=\"has_ae_slider elementor-section elementor-top-section elementor-element elementor-element-7191da63 elementor-section-height-min-height elementor-section-full_width elementor-section-height-default elementor-section-items-middle ae-bg-gallery-type-default\" data-id=\"7191da63\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4fd3853f ae-bg-gallery-type-default\" data-id=\"4fd3853f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7955ec elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"7955ec\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Recursos<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44aa205a elementor-widget elementor-widget-text-editor\" data-id=\"44aa205a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Saiba mais sobre o NSFOCUS nos recursos listados abaixo. <\/strong><\/p><p><strong>Escolha fichas t\u00e9cnicas para informa\u00e7\u00f5es b\u00e1sicas de produtos ou whitepapers para discuss\u00f5es t\u00e9cnicas e de neg\u00f3cios sobre as solu\u00e7\u00f5es NSFOCUS.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-dce-background-color=\"#F2F4FC\" class=\"has_ae_slider elementor-section elementor-top-section elementor-element elementor-element-1ba94b0e elementor-section-boxed elementor-section-height-default elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"1ba94b0e\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b9ad7d5 ae-bg-gallery-type-default\" data-id=\"b9ad7d5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b23bb97 elementor-widget elementor-widget-eael-adv-tabs\" data-id=\"1b23bb97\" data-element_type=\"widget\" data-widget_type=\"eael-adv-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div data-scroll-on-click=\"\" data-scroll-speed=\"300\" id=\"eael-advance-tabs-1b23bb97\" class=\"eael-advance-tabs eael-tabs-horizontal eael-tab-auto-active eael-tab-toggle\" data-tabid=\"1b23bb97\">\n            <div class=\"eael-tabs-nav \">\n                <ul class=\"eael-tab-inline-icon\" role=\"tablist\">\n                                            <li id=\"datasheets\" class=\" eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"datasheets-tab\" aria-expanded=\"false\">\n                            \n                                                                <svg class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >FICHAS T\u00c9CNICAS<\/span>                            \n                                                    <\/li>\n                                            <li id=\"reports\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"reports-tab\" aria-expanded=\"false\">\n                            \n                                                                <svg class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >REPORTS<\/span>                            \n                                                    <\/li>\n                                            <li id=\"whitepapers\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"whitepapers-tab\" aria-expanded=\"false\">\n                            \n                                                                <svg class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >WHITEPAPERS<\/span>                            \n                                                    <\/li>\n                                            <li id=\"casestudies\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"casestudies-tab\" aria-expanded=\"false\">\n                            \n                                                                <svg class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Estudos de Caso<\/span>                            \n                                                    <\/li>\n                                            <li id=\"info\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"info-tab\" aria-expanded=\"false\">\n                            \n                                                                <svg class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Infogr\u00e1ficos<\/span>                            \n                                                    <\/li>\n                                            <li id=\"articles\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"articles-tab\" aria-expanded=\"false\">\n                            \n                                                                <svg class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Artigos<\/span>                            \n                                                    <\/li>\n                    \n                                  <\/ul>\n            <\/div>\n            \n            <div class=\"eael-tabs-content\">\n\t\t        \n                    <div id=\"datasheets-tab\" class=\"clearfix eael-tab-content-item \" data-title-link=\"datasheets-tab\">\n\t\t\t\t        <div class=\"well\" style=\"text-align: center\"><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2024\/11\/On-Premises-DDoS-Defenses-Datasheet-241101.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img decoding=\"async\" class=\"aligncenter wp-image-4255 size-full\" src=\"\/wp-content\/uploads\/2021\/05\/NSFOCUS_OnPremises_DDoS-Datasheet_5.17.2021.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/On-Premises-DDoS-Defenses-Datasheet-241101.pdf\" target=\"_blank\" rel=\"noopener\"><strong>On-Premises DDoS Defenses<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/04\/NSFOCUS-Cloud-DPS-Datasheet_S_v0.9.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img decoding=\"async\" class=\"aligncenter wp-image-4255 size-full\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/NSFOCUS_CloudDPS-Datasheet_5.17.2021.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/04\/NSFOCUS-Cloud-DPS-Datasheet_S_v0.9.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Cloud DPS<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/05\/NSFOCUS_WAF-datasheet250520.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img decoding=\"async\" class=\"aligncenter wp-image-4255 size-full\" src=\"\/wp-content\/uploads\/2021\/05\/NSFOCUS_WAF-Datasheet_5.17.2021.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/05\/NSFOCUS_WAF-datasheet250520.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Web Application Firewall<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/09\/NTI-datasheet-220923.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4255 size-full\" src=\"\/wp-content\/uploads\/2021\/05\/NSFOCUS_NTI-Datasheet_5.17.2021.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/09\/NTI-datasheet-220923.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Threat Intelligence<\/strong><\/a><\/div><\/div><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/10\/Cloud-Security-Service-for-Enterprise_Datasheet_20220923.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/10\/Cloud-Security-Service-cover-1.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/10\/Cloud-Security-Service-for-Enterprise_Datasheet_20220923.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Cloud Security Service for Enterprise<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2018\/08\/NSFOCUS_CloudDPS_Hosting-datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/05\/CloudDPS_Hosting_Providers.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2018\/08\/NSFOCUS_CloudDPS_Hosting-datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Cloud DPS for Hosting Providers<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2020\/02\/NSFOCUS_CloudDPS-datasheet_2.2020.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/05\/CloudDPS_Enterprise.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2020\/02\/NSFOCUS_CloudDPS-datasheet_2.2020.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Cloud DPS for Enterprise<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Hybrid-DDoS-Defenses_solutionbrief_19Apr17.DJ_.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Hybrid-DDoS-Defenses_solutionbrief_19Apr17.DJ_.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Hybrid-DDoS-Defenses_solutionbrief_19Apr17.DJ_.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Hybrid DDoS Defenses Solution<\/strong><\/a><\/div><\/div><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2018\/08\/NSFOCUS-CiaB-Datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/08\/ciab.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2018\/08\/NSFOCUS-CiaB-Datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Cloud in a Box<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/NSFOCUS-NGIPS-Datasheet_220930.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/06\/NSFOCUS-NGIPS-Datasheet-cover-e1624871389293-116x150.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/09\/NSFOCUS-NGIPS-Datasheet_220930.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Next Generation Intrusion Prevention System <\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2018\/10\/TAS_datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/10\/tas.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2018\/10\/TAS_datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Threat Analysis System<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2018\/10\/NSFOCUS_EISA-datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/10\/eisa.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2018\/10\/NSFOCUS_EISA-datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Exposed Internet Surface Analysis<\/strong><\/a><\/div><\/div><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2019\/02\/NSFOCUS_ATM_datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2019\/02\/nsf-atm-ds.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2019\/02\/NSFOCUS_ATM_datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Attack Threat Monitoring<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/10\/NSFOCUS_ADBOS-datasheet-20231023-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2021\/06\/NSFOCUS_ADBOS-datasheet-cover-e1624871593393-116x150.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/10\/NSFOCUS_ADBOS-datasheet-20231023-1.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Active Defense Business Operating System<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2018\/08\/NSFOCUS-WVSS-Datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/08\/wvss.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2018\/08\/NSFOCUS-WVSS-Datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Web Vulnerability Scanning System<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/04\/RSAS-Datasheet-250415.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4255 size-full\" src=\"\/wp-content\/uploads\/2023\/01\/rsas-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/04\/RSAS-Datasheet-250415.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Remote Security Assessment System<\/strong><\/a><\/div><\/div><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/10\/NSFOCUS-Cloud-WAAP-Datasheet-20221009-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/10\/Cloud-WAAP-cover-1.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/10\/NSFOCUS-Cloud-WAAP-Datasheet-20221009-1.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Cloud WAAP<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/02\/NGFW-datasheet_20240229.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/09\/ngfwcover-e1664509297754.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/02\/NGFW-datasheet_20240229.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Next-Generation Firewall<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2023\/04\/NSFOCUS-PTaaS-Datasheet-230428.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2023\/04\/PTaaS-datasheet-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2023\/04\/NSFOCUS-PTaaS-Datasheet-230428.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Penetration Testing As A Service<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/04\/NSFOCUS-EASM-Datasheet0428.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4255 size-full\" src=\"\/wp-content\/uploads\/2023\/04\/EASM-datasheet-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/04\/NSFOCUS-EASM-Datasheet0428.pdf\" target=\"_blank\" rel=\"noopener\"><strong>External Attack Surface Management<\/strong><\/a><\/div><\/div><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2025\/03\/ISOP-Datasheet-20250304.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2023\/08\/isop-datasheet-cover-e1690960010433.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2025\/03\/ISOP-Datasheet-20250304.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Intelligent Security Operations Platform<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/12\/CTEM-Datasheet-20231222.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4255 size-full\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/ctemdatasheetcover-e1694768230642.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/12\/CTEM-Datasheet-20231222.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Continuous Threat Exposure Management<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/09\/NSFOCUS-DRPS-Datasheet_240912.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4255 size-full\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/09\/drps-datasheet-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/09\/NSFOCUS-DRPS-Datasheet_240912.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Digital Risk Protection Service<\/strong><\/a><\/div><\/div><\/div>                    <\/div>\n\t\t        \n                    <div id=\"reports-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"reports-tab\">\n\t\t\t\t        <div class=\"row\" style=\"text-align: center\"><p><!-- 2025 --><\/p><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/resources\/2025-cybersecurity-trend-report\/\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/04\/2025-Cybersecurity-Trend-report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/2025-cybersecurity-trend-report\/\"><strong>2025 Cybersecurity Trend Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/resources\/2025-botnet-trend-report\/\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/05\/2025-Botnet-Trend-report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/resources\/2025-botnet-trend-report\/\"><strong>2025 Botnet Trend Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/resources\/2024-apt-annual-landscape-report\/\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/04\/2024-APT-Annual-Landscape-Report_cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/resources\/2024-apt-annual-landscape-report\/\"><strong>2024 APT Annual Landscape Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/resources\/2024-global-ddos-landscape-report\/\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/05\/2024-ddos-landscape-report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/resources\/2024-global-ddos-landscape-report\/\"><strong>2024 Global DDoS Landscape Report<\/strong><\/a><\/div><\/div><div class=\"row\" style=\"text-align: center\"><p><!-- 2024 --><\/p><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/resources\/10-cybersecurity-trends-for-2024\/\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2024\/04\/10-Cybersecurity-Trends-for-2024-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/resources\/10-cybersecurity-trends-for-2024\/\"><strong>10 Cybersecurity Trends for 2024<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/resources\/2023-global-ddos-landscape-report\/\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2024\/04\/2023-ddos-report-cover-1.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/resources\/2023-global-ddos-landscape-report\/\"><strong>2023 Global DDoS Landscape Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2025\/06\/2023-APT-Annual-Landscape-Report.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/06\/2023-APT-Annual-Landscape-Report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2025\/06\/2023-APT-Annual-Landscape-Report.pdf\"><strong>2023 APT Annual Landscape Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/resources\/botnet-trends-2023-review-and-2024-predictions\/\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2024\/04\/botnet-trends-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/resources\/botnet-trends-2023-review-and-2024-predictions\/\"><strong>Botnet Trends: 2023 Review and 2024 Predictions<\/strong><\/a><\/div><\/div><div class=\"row\" style=\"text-align: center\"><p><!-- 2023 --><\/p><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2024\/03\/2023-NSFOCUS-Annual-Security-Incident-Observation-Report.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2024\/03\/2023-NSFOCUS-Annual-Security-Incident-Observation-Report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2024\/03\/2023-NSFOCUS-Annual-Security-Incident-Observation-Report.pdf\"><strong>2023 Annual Security Incident Observation Report<\/strong><\/a><\/div><p><!-- 2022 --><\/p><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2025\/06\/2022-APT-Annual-Landscape-Report.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/06\/2022-APT-Annual-Landscape-Report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2025\/06\/2022-APT-Annual-Landscape-Report.pdf\"><strong>2022 APT Annual Landscape Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/resources\/2022-global-ddos-attack-landscape-report\/\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2023\/03\/report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/resources\/2022-global-ddos-attack-landscape-report\/\"><strong>2022 Global DDoS Attack Landscape Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/resources\/2022-cybersecurity-insights\/\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2023\/05\/2022-Cybersecurity-insights-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/resources\/2022-cybersecurity-insights\/\"><strong>2022 Cybersecurity Insights<\/strong><\/a><\/div><\/div><div class=\"row\" style=\"text-align: center\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/resources\/summary-of-dps-attacks-in-2022\/\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2023\/01\/dpsreport-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/resources\/summary-of-dps-attacks-in-2022\/\"><strong>Summary of Cloud DDoS Protection in 2022<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/resources\/h1-2022-global-ddos-attack-landscape\/\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/09\/H1-2022-Global-DDoS-Attack-Landscape_cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/resources\/h1-2022-global-ddos-attack-landscape\/\"><strong>H1 2022 Global DDoS Attack Landscape<\/strong><\/a><\/div><p><!-- 2021 --><\/p><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/01\/2021-Global-DDoS-Attack-Landscape.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/2021_Global_DDoS_Attack_Landscape_Cover_A4_Digital.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/01\/2021-Global-DDoS-Attack-Landscape.pdf\"><strong>2021 Global DDoS Attack Landscape Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2021\/09\/2021-Mid-Year-DDoS-Attack-Landscape-Report.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2021\/09\/2021-ddos-mid-year-report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2021\/09\/2021-Mid-Year-DDoS-Attack-Landscape-Report.pdf\"><strong>2021 Mid-Year DDoS Attack Landscape<\/strong><\/a><\/div><\/div><div class=\"row\" style=\"text-align: center\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2021\/10\/Industrial-Internet-Security-Trend-Report-1.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2021\/10\/Industrial-Internet-Security-Trend-Report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2021\/10\/Industrial-Internet-Security-Trend-Report-1.pdf\"><strong>Industrial Internet Security Trend Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2021\/11\/Analysis-Report-on-Lorec53-Group.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2021\/11\/APT-report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2021\/11\/Analysis-Report-on-Lorec53-Group.pdf\"><strong>Analysis Report on Lorec53 Group<\/strong><\/a><\/div><p><!-- 2020 --><\/p><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2021\/03\/2020-DDoS-Attack-Landscape.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2021\/03\/2020-ddos-attack-landscape-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2021\/03\/2020-DDoS-Attack-Landscape.pdf\"><strong>2020 DDoS Attack Landscape Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2021\/04\/2020-An-Observation-on-Cyber-Security-Incidents.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2021\/05\/Cover-image.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2021\/04\/2020-An-Observation-on-Cyber-Security-Incidents.pdf\"><strong>2020 An Observation on Cyber Security Incidents<\/strong><\/a><\/div><\/div><div class=\"row\" style=\"text-align: center\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2021\/06\/2020-NSFOCUS-Cybersecurity-Insights.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2021\/06\/2020-Cybersecurity-Insights-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2021\/06\/2020-NSFOCUS-Cybersecurity-Insights.pdf\"><strong>2020 Cybersecurity Insights<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2020\/08\/2020-Mid-Year-DDoS-Attack-Landscape-Report-V4.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2020\/08\/2020-Mid-Year-DDoS-Attack-Landscape-Report-e1598535526693.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2020\/08\/2020-Mid-Year-DDoS-Attack-Landscape-Report-V4.pdf\"><strong>2020 Mid-Year DDoS Attack Landscape Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2020\/08\/2019-Annual-IoT-Security-Report-V6.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2020\/08\/2019-Annual-IoT-Security-Report-e1598535485207.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2020\/08\/2019-Annual-IoT-Security-Report-V6.pdf\"><strong>2019 Annual IoT Security Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2020\/10\/2019-Vulnerability-And-Threat-Trends-Research-Report-V5-1.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2020\/10\/Vulnerability-And-Threat-Trends-Research-Report-cover-e1603845768509.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2020\/10\/2019-Vulnerability-And-Threat-Trends-Research-Report-V5-1.pdf\"><strong>2019 Vulnerability And Threat Trends Research Report<\/strong><\/a><\/div><\/div><div class=\"row\" style=\"text-align: center\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2020\/02\/2019DDoSAttackLandscpe-V13.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2020\/02\/2019DDoSAttackLandscpe-V10.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2020\/02\/2019DDoSAttackLandscpe-V13.pdf\"><strong>2019 DDoS Attack Landscape Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2020\/02\/2019Cybersecurity-Insights-V15.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2020\/02\/2019Cybersecurity-Insights-V8.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2020\/02\/2019Cybersecurity-Insights-V15.pdf\"><strong>2019 Cybersecurity Insights Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2020\/03\/2019-ICS-Information-Security-Assurance-Framework-V4.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2020\/03\/NSF-ICS-Framework.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2020\/03\/2019-ICS-Information-Security-Assurance-Framework-V4.pdf\"><strong>2019 ICS Information Security Assurance Framework<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2020\/08\/2019-Botnet-Trend-Report-V4.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2020\/08\/2019-Botnet-Trend-Report-e1598535400636.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2020\/08\/2019-Botnet-Trend-Report-V4.pdf\"><strong>2019 Botnet Trend Report<\/strong><\/a><\/div><\/div><div class=\"row\" style=\"text-align: center\"><p><!-- 2018 --><\/p><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2020\/01\/2018-Annual-IoT-Security-Report-V2.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2020\/01\/NSFOCUS_Report_1-9-20.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2020\/01\/2018-Annual-IoT-Security-Report-V2.pdf\"><strong>2018 Annual IoT Security Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2019\/04\/2018DDoS-Attack-Landscape-V12.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2019\/04\/NSF-2018-attack-landscape.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2019\/04\/2018DDoS-Attack-Landscape-V12.pdf\"><strong>2018 DDoS Attack Landscape<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2019\/06\/2018-Botnet-Trend-Report.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2019\/06\/NSF-2018-botnet-trend-report.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2019\/06\/2018-Botnet-Trend-Report.pdf\"><strong>2018 Botnet Trend Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2019\/11\/An-Anatomy-of-WS-Discovery-Reflection-Attacks-V2-1.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2019\/11\/NSFOCUS_Report_11-14-19.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2019\/11\/An-Anatomy-of-WS-Discovery-Reflection-Attacks-V2-1.pdf\"><strong>An Anatomy of WS-Discovery Reflection<\/strong><\/a><\/div><\/div><div class=\"row\" style=\"text-align: center\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2019\/01\/2018-H1-Cybersecurity-Insights.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/10\/2018-H1-Cybersecurity-Insights.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2019\/01\/2018-H1-Cybersecurity-Insights.pdf\"><strong>2018 H1 Cybersecurity Insights Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2019\/01\/Behavior-Analysis-of-IP-Chain-Gangs.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2019\/01\/NSF-behavior-analysis-report-thumb.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2019\/01\/Behavior-Analysis-of-IP-Chain-Gangs.pdf\"><strong>Behavior Analysis of IP Chain-Gangs<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2019\/02\/Containter-Security-Report-2018.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2019\/02\/NSF-container-security-report-thumb.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2019\/02\/Containter-Security-Report-2018.pdf\"><strong>2018 NSFOCUS Technical Report on Container Security<\/strong><\/a><\/div><p><!-- 2017 --><\/p><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2019\/01\/NSFOCUS-2017-Annual-IoT-Cybersecurity-Report-0726.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/08\/IoT_Cybersecurity_Report.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2019\/01\/NSFOCUS-2017-Annual-IoT-Cybersecurity-Report-0726.pdf\"><strong>2017 Annual IoT Cybersecurity Report<\/strong><\/a><\/div><\/div><div class=\"row\" style=\"text-align: center\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2019\/01\/2017_DDoS_and_Web_Application_Attack_Landscape_4.15.18-2.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/04\/2017_DDoS_and_Web_Application_Attack_Landscape-1.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2019\/01\/2017_DDoS_and_Web_Application_Attack_Landscape_4.15.18-2.pdf\"><strong>2017 DDoS and Web Application Attack Landscape Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2019\/01\/2017_Annual_Cybersecurity_Insights_0412.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/04\/2017_Annual_Cybersecurity_Insights-2.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2019\/01\/2017_Annual_Cybersecurity_Insights_0412.pdf\"><strong>2017 Annual Cybersecurity Insights Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2019\/01\/2017_Fintech_Security_Analysis_Report_0412.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/04\/2017_Fintech_Security_Analysis_Report-1.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2019\/01\/2017_Fintech_Security_Analysis_Report_0412.pdf\"><strong>2017 Fintech Security Analysis Report<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2019\/01\/2017-Botnet-Trend-Report.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4255 aligncenter\" src=\"\/wp-content\/uploads\/2018\/05\/2017_Botnet_Trend_Report.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2019\/01\/2017-Botnet-Trend-Report.pdf\"><strong>2017 Botnet Trend Report<\/strong><\/a><\/div><\/div>                    <\/div>\n\t\t        \n                    <div id=\"whitepapers-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"whitepapers-tab\">\n\t\t\t\t        <div class=\"well\" style=\"text-align: center\"><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/01\/SANS_Whitepaper_Threat_Intelligence__What_It_Is__and_How_to_Use_It_Effectively.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2017\/01\/SANS_Whitepaper_Threat_Intelligence__What_It_Is__and_How_to_Use_It_Effectively.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2017\/01\/SANS_Whitepaper_Threat_Intelligence__What_It_Is__and_How_to_Use_It_Effectively.pdf\"><strong>Threat Intelligence: What It Is, and How to Use It Effectively<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/01\/Distributed_Denial_of_Service_Attacks__An_Economic_Perspective__Whitepaper.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/07\/Distributed_Denial_of_Service_Attacks__An_Economic_Perspective__Whitepaper.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2017\/01\/Distributed_Denial_of_Service_Attacks__An_Economic_Perspective__Whitepaper.pdf\"><strong>Distributed Denial-of-Service (DDoS) Attacks: An Economic Perspective<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Managed_Services_Play_Book_White_Paper.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/04\/service-provider-ddos-playbook.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Managed_Services_Play_Book_White_Paper.pdf\"><strong>Service Provider DDoS Playbook: &#8220;Building a Case&#8221; for Managed DDoS Services<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/01\/Understanding_the_Threat_Intelligence_Ecosystem___eBook.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/07\/Understanding_the_Threat_Intelligence_Ecosystem___eBook.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2017\/01\/Understanding_the_Threat_Intelligence_Ecosystem___eBook.pdf\"><strong>Understanding the Threat Intelligence Ecosystem<\/strong><\/a><\/div><\/div><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/01\/G20_transcript_Final.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/07\/G20_transcript_Final.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2017\/01\/G20_transcript_Final.pdf\"><strong>How NSFOCUS Protected the G20 Summit<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/05\/NSFOCUS_Hosting_Provider_Revenue_Model_10May17.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2017\/05\/hosting-provider.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><a href=\"\/wp-content\/uploads\/2017\/05\/NSFOCUS_Hosting_Provider_Revenue_Model_10May17.pdf\"><strong>Hosting Providers DDoS Playbook \u2013 \u201cBuilding a Case\u201d for Managed DDoS Services<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/05\/NSFOCUS_Internet_Service_Provider_Revenue_Model_10May17.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2017\/05\/internet-service-provider.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2017\/05\/NSFOCUS_Internet_Service_Provider_Revenue_Model_10May17.pdf\"><strong>ISPs DDoS Playbook \u2013 \u201cBuilding a Case\u201d for Managed DDoS Services<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2020\/11\/Enterprise-Blockchain-Security-Whitepaper-V3.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2020\/11\/Enterprise-Blockchain-Security-Whitepaper-cover.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2020\/11\/Enterprise-Blockchain-Security-Whitepaper-V3.pdf\"><strong>Enterprise Blockchain Security<\/strong><\/a><\/div><\/div><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/resources\/aisecops-whitepaper\/\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2023\/11\/AISecops-whitepaper-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/resources\/aisecops-whitepaper\/\"><strong>NSFOCUS AISecOps Whitepaper<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/resources\/secxops-technical-whitepaper\/\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2023\/11\/SecXops-whitepaper-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/resources\/secxops-technical-whitepaper\/\"><strong>NSFOCUS SecXops Technical Whitepaper<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/resources\/secllm-technical-whitepaper\/\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2024\/01\/SecLLM-Technical-Whitepaper-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/resources\/secllm-technical-whitepaper\/\"><strong>Enhancing Network Security with SecLLM<\/strong><\/a><\/div><\/div><\/div>                    <\/div>\n\t\t        \n                    <div id=\"casestudies-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"casestudies-tab\">\n\t\t\t\t        <div class=\"well\" style=\"text-align: center\"><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/01\/2-Cloud-DPS-\u2013-Optimization-for-a-Managed-Security-Service-Customer.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/2-Cloud-DPS.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/01\/2-Cloud-DPS-\u2013-Optimization-for-a-Managed-Security-Service-Customer.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>Cloud DPS \u2013 Optimization for a Managed Security Service Customer<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/01\/3-Cloud-DPS_400G-DDoS-Attack-Event-Captured-by-NSFOCUS-in-Hong-Kong-S.A.R.-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/3-Cloud-DPS.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/01\/3-Cloud-DPS_400G-DDoS-Attack-Event-Captured-by-NSFOCUS-in-Hong-Kong-S.A.R.-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>A 400G DDoS Attack Event Captured by NSFOCUS in Hong Kong S.A.R.<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/01\/4-Global-TOP-10-IT-Corporation-Partners-with-NSFOCUS-on-Cloud-DPS-Holistic-Solution-and-Advanced-MSS-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/4-Global.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/01\/4-Global-TOP-10-IT-Corporation-Partners-with-NSFOCUS-on-Cloud-DPS-Holistic-Solution-and-Advanced-MSS-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>Global TOP 10 IT Corporation Partners with NSFOCUS on Cloud DPS Holistic Solution and Advanced MSS<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/01\/5-Fortune-Global-500-Energy-Corporation-Partners-with-NSFOCUS-on-Cloud-DPS-Holistic-Solution-and-Advanced-MSS-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/5-Fortune.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/01\/5-Fortune-Global-500-Energy-Corporation-Partners-with-NSFOCUS-on-Cloud-DPS-Holistic-Solution-and-Advanced-MSS-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>Fortune Global 500 Energy Corporation Partners with NSFOCUS on Cloud DPS Holistic Solution and Advanced MSS <\/strong><\/a><\/div><\/div><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/01\/6-Global-TOP-10-Public-Cloud-Corporation-Partners-with-NSFOCUS-on-Cloud-DPS-Solution-and-API-Integration-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/6-Global.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/01\/6-Global-TOP-10-Public-Cloud-Corporation-Partners-with-NSFOCUS-on-Cloud-DPS-Solution-and-API-Integration-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>Global TOP 10 Public Cloud Corporation Partners with NSFOCUS on Cloud DPS Solution and API Integration<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/01\/7-Excellent-Technical-and-Service-Support-Partner-of-Global-500-Telecommunication-2.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/7-Excellent.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/01\/7-Excellent-Technical-and-Service-Support-Partner-of-Global-500-Telecommunication-2.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>Excellent Technical and Service Support Partner of Global 500 Telecommunication<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/01\/8-Cloud-DPS_Guaranteed-Mitigation-Effect-by-Tailored-Policy-Tuning-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/8-Cloud.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/01\/8-Cloud-DPS_Guaranteed-Mitigation-Effect-by-Tailored-Policy-Tuning-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>Cloud DPS_Guaranteed Mitigation Effect by Tailored Policy Tuning<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/01\/G_20_CaseStudy_Final_11_16.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2017\/01\/G_20_CaseStudy_Final_11_16.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2017\/01\/G_20_CaseStudy_Final_11_16.pdf\" target=\"_blank\" rel=\"noopener\"><strong>NSFOCUS Protects 2016 G20 Summit from 100,000+ Cyber Attacks<\/strong><\/a><\/div><\/div><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Case_Study_Micron21.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Case_Study_Micron21.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Case_Study_Micron21.pdf\" target=\"_blank\" rel=\"noopener\"><strong>MICRON21 depends on NSFOCUS for protection against DDoS attacks<\/strong><\/a><\/div><\/div><\/div>                    <\/div>\n\t\t        \n                    <div id=\"info-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"info-tab\">\n\t\t\t\t        <div class=\"well\" style=\"text-align: center\"><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/01\/Cloud-DPS-overview.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/Cloud-DPS-overview-scaled-1.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/01\/Cloud-DPS-overview.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>Cloud DPS overview<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/01\/Apache-Log4j-vulnerability-monitoring-analysis.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/Apache-Log4j.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/01\/Apache-Log4j-vulnerability-monitoring-analysis.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>Apache Log4j Vulnerability Monitoring Analysis<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2018\/08\/Infographic-NSFOCUS-APT-Solution.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/08\/Infographic_NSFOCUS_APT_Solution.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><a href=\"\/wp-content\/uploads\/2018\/08\/Infographic-NSFOCUS-APT-Solution.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>The NSFOCUS Next Generation Advanced Threat Protection (APT) Solution<\/strong><\/a><\/div><\/div><\/div>                    <\/div>\n\t\t        \n                    <div id=\"articles-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"articles-tab\">\n\t\t\t\t        <div class=\"well\" style=\"text-align: center\"><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Article_CIO_Review.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Article_CIO_Review-1.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><a href=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Article_CIO_Review.pdf\" target=\"_blank\" rel=\"noopener\"><strong>NSFOCUS recognized as a top DDoS Solution Provider of 2016<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/nsfocus-2024-competitive-strategy-leader-in-the-chinese-managed-detection-and-response-industry\/\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2024\/06\/NSFOCUS-2024-Competitive-Strategy-Leader-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><a href=\"\/nsfocus-2024-competitive-strategy-leader-in-the-chinese-managed-detection-and-response-industry\/\" target=\"_blank\" rel=\"noopener\"><br \/><strong>2024 Competitive Strategy Leader in the Chinese Managed Detection and Response Industry<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/nsfocus-2025-competitive-strategy-leader-in-the-apac-anti-ddos-industry\/\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/05\/2025-Competitive-Strategy-Leader-Best-Practices-in-the-APAC-Anti-DDoS-Industry-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><a href=\"\/nsfocus-2025-competitive-strategy-leader-in-the-apac-anti-ddos-industry\/\" target=\"_blank\" rel=\"noopener\"><br \/><strong>2025 Competitive Strategy Leader in the Asia-Pacific Anti-DDoS Industry<\/strong><\/a><\/div><\/div><\/div>                    <\/div>\n\t\t                    <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Recursos Saiba mais sobre o NSFOCUS nos recursos listados abaixo. Escolha fichas t&Atilde;&copy;cnicas para informa&Atilde;&sect;&Atilde;&micro;es b&Atilde;&iexcl;sicas de produtos ou whitepapers para discuss&Atilde;&micro;es t&Atilde;&copy;cnicas e de neg&Atilde;&sup3;cios sobre as solu&Atilde;&sect;&Atilde;&micro;es NSFOCUS. FICHAS T&Atilde;&permil;CNICAS REPORTS WHITEPAPERS Estudos de Caso Infogr&Atilde;&iexcl;ficos Artigos On-Premises DDoS DefensesCloud DPSWeb Application FirewallThreat IntelligenceCloud Security Service for EnterpriseCloud DPS for Hosting ProvidersCloud DPS [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4099,"parent":0,"menu_order":118,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"class_list":["post-13521","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Recursos | NSFOCUS<\/title>\n<meta name=\"description\" content=\"Learn more on NSFOCUS International Business Division from these whitepapers, data sheets and case studies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/pt-br\/recursos\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Recursos | NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Learn more on NSFOCUS International Business Division from these whitepapers, data sheets and case studies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/pt-br\/recursos\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/12\/Thumbnail-Q3Report.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Recursos | NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Learn more on NSFOCUS International Business Division from these whitepapers, data sheets and case studies.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/12\/Thumbnail-Q3Report.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"21 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/recursos\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/recursos\\\/\",\"name\":\"Recursos | NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/recursos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/recursos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Thumbnail-Q3Report.jpg\",\"datePublished\":\"2021-06-28T06:00:54+00:00\",\"dateModified\":\"2026-04-17T18:07:46+00:00\",\"description\":\"Learn more on NSFOCUS International Business Division from these whitepapers, data sheets and case studies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/recursos\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/recursos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/recursos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Thumbnail-Q3Report.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Thumbnail-Q3Report.jpg\",\"width\":156,\"height\":206,\"caption\":\"2016 Q3 DDoS Report Cover Image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/recursos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Recursos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Recursos | NSFOCUS","description":"Learn more on NSFOCUS International Business Division from these whitepapers, data sheets and case studies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/pt-br\/recursos\/","og_locale":"pt_BR","og_type":"article","og_title":"Recursos | NSFOCUS","og_description":"Learn more on NSFOCUS International Business Division from these whitepapers, data sheets and case studies.","og_url":"https:\/\/nsfocusglobal.com\/pt-br\/recursos\/","og_site_name":"NSFOCUS","article_modified_time":"2026-04-17T18:07:46+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/12\/Thumbnail-Q3Report.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_title":"Recursos | NSFOCUS","twitter_description":"Learn more on NSFOCUS International Business Division from these whitepapers, data sheets and case studies.","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/12\/Thumbnail-Q3Report.jpg","twitter_misc":{"Est. tempo de leitura":"21 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/pt-br\/recursos\/","url":"https:\/\/nsfocusglobal.com\/pt-br\/recursos\/","name":"Recursos | NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/recursos\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/recursos\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/12\/Thumbnail-Q3Report.jpg","datePublished":"2021-06-28T06:00:54+00:00","dateModified":"2026-04-17T18:07:46+00:00","description":"Learn more on NSFOCUS International Business Division from these whitepapers, data sheets and case studies.","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/recursos\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/pt-br\/recursos\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/recursos\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/12\/Thumbnail-Q3Report.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/12\/Thumbnail-Q3Report.jpg","width":156,"height":206,"caption":"2016 Q3 DDoS Report Cover Image"},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/pt-br\/recursos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Recursos"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/pages\/13521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=13521"}],"version-history":[{"count":9,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/pages\/13521\/revisions"}],"predecessor-version":[{"id":34729,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/pages\/13521\/revisions\/34729"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/4099"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=13521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}