{"id":4376,"date":"2017-01-28T14:31:59","date_gmt":"2017-01-28T14:31:59","guid":{"rendered":"http:\/\/staging.nsfocusglobal.com\/?page_id=4376"},"modified":"2026-04-20T07:20:27","modified_gmt":"2026-04-20T07:20:27","slug":"resources","status":"publish","type":"page","link":"https:\/\/nsfocusglobal.com\/pt-br\/resources\/","title":{"rendered":"Resources"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4376\" class=\"elementor elementor-4376\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-dce-background-image-url=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/01\/hybrid-ddos-defenses-hero.jpg\" class=\"has_ae_slider elementor-section elementor-top-section elementor-element elementor-element-191cbb80 elementor-section-height-min-height elementor-section-full_width elementor-section-height-default elementor-section-items-middle ae-bg-gallery-type-default\" data-id=\"191cbb80\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6b5effeb ae-bg-gallery-type-default\" data-id=\"6b5effeb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-72bbe447 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"72bbe447\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Resources<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e87e1d elementor-widget elementor-widget-text-editor\" data-id=\"1e87e1d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Choose datasheets for basic product information, or whitepapers for business and technical discussions around NSFOCUS solutions.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-dce-background-color=\"#F2F4FC\" class=\"has_ae_slider elementor-section elementor-top-section elementor-element elementor-element-648a284 elementor-section-boxed elementor-section-height-default elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"648a284\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-54a0698 ae-bg-gallery-type-default\" data-id=\"54a0698\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4c49225 elementor-widget elementor-widget-eael-adv-tabs\" data-id=\"4c49225\" data-element_type=\"widget\" data-widget_type=\"eael-adv-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div data-scroll-on-click=\"\" data-scroll-speed=\"300\" id=\"eael-advance-tabs-4c49225\" class=\"eael-advance-tabs eael-tabs-horizontal eael-tab-auto-active eael-tab-toggle\" data-tabid=\"4c49225\">\n            <div class=\"eael-tabs-nav \">\n                <ul class=\"eael-tab-inline-icon\" role=\"tablist\">\n                                            <li id=\"datasheet\" class=\" eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"datasheet-tab\" aria-expanded=\"false\">\n                            \n                                                                <svg class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >DATASHEETS<\/span>                            \n                                                    <\/li>\n                                            <li id=\"reports\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"reports-tab\" aria-expanded=\"false\">\n                            \n                                                                <svg class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >REPORTS<\/span>                            \n                                                    <\/li>\n                                            <li id=\"whitepapers\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"whitepapers-tab\" aria-expanded=\"false\">\n                            \n                                                                <svg class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >WHITEPAPERS<\/span>                            \n                                                    <\/li>\n                                            <li id=\"casestudies\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"casestudies-tab\" aria-expanded=\"false\">\n                            \n                                                                <svg class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >CASE STUDIES<\/span>                            \n                                                    <\/li>\n                                            <li id=\"info\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"info-tab\" aria-expanded=\"false\">\n                            \n                                                                <svg class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >INFOGRAPHICS<\/span>                            \n                                                    <\/li>\n                                            <li id=\"articles\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"articles-tab\" aria-expanded=\"false\">\n                            \n                                                                <svg class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >ARTICLES<\/span>                            \n                                                    <\/li>\n                    \n                                  <\/ul>\n            <\/div>\n            \n            <div class=\"eael-tabs-content\">\n\t\t        \n                    <div id=\"datasheet-tab\" class=\"clearfix eael-tab-content-item \" data-title-link=\"datasheet-tab\">\n\t\t\t\t        <div class=\"well\" style=\"text-align: center\"><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2026\/01\/On-Premises-DDoS-Defenses-Datasheet-260116.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img decoding=\"async\" class=\"aligncenter wp-image-4255 size-full\" src=\"\/wp-content\/uploads\/2021\/05\/NSFOCUS_OnPremises_DDoS-Datasheet_5.17.2021.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2026\/01\/On-Premises-DDoS-Defenses-Datasheet-260116.pdf\" target=\"_blank\" rel=\"noopener\"><strong>On-Premises DDoS Defenses<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/04\/NSFOCUS-Cloud-DPS-Datasheet_S_v0.9.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img decoding=\"async\" class=\"aligncenter wp-image-4255 size-full\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/05\/NSFOCUS_CloudDPS-Datasheet_5.17.2021.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/04\/NSFOCUS-Cloud-DPS-Datasheet_S_v0.9.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Cloud DPS<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/05\/NSFOCUS_WAF-datasheet250520.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img decoding=\"async\" class=\"aligncenter wp-image-4255 size-full\" src=\"\/wp-content\/uploads\/2021\/05\/NSFOCUS_WAF-Datasheet_5.17.2021.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/05\/NSFOCUS_WAF-datasheet250520.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Web Application Firewall<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/09\/NTI-datasheet-220923.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4255 size-full\" src=\"\/wp-content\/uploads\/2021\/05\/NSFOCUS_NTI-Datasheet_5.17.2021.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/09\/NTI-datasheet-220923.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Threat Intelligence<\/strong><\/a><\/div><\/div><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/10\/Cloud-Security-Service-for-Enterprise_Datasheet_20220923.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/10\/Cloud-Security-Service-cover-1.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/10\/Cloud-Security-Service-for-Enterprise_Datasheet_20220923.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Cloud Security Service for Enterprise<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2018\/08\/NSFOCUS_CloudDPS_Hosting-datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/05\/CloudDPS_Hosting_Providers.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2018\/08\/NSFOCUS_CloudDPS_Hosting-datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Cloud DPS for Hosting Providers<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2020\/02\/NSFOCUS_CloudDPS-datasheet_2.2020.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/05\/CloudDPS_Enterprise.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2020\/02\/NSFOCUS_CloudDPS-datasheet_2.2020.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Cloud DPS for Enterprise<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Hybrid-DDoS-Defenses_solutionbrief_19Apr17.DJ_.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Hybrid-DDoS-Defenses_solutionbrief_19Apr17.DJ_.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Hybrid-DDoS-Defenses_solutionbrief_19Apr17.DJ_.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Hybrid DDoS Defenses Solution<\/strong><\/a><\/div><\/div><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2018\/08\/NSFOCUS-CiaB-Datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/08\/ciab.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2018\/08\/NSFOCUS-CiaB-Datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Cloud in a Box<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/NSFOCUS-NGIPS-Datasheet_220930.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/06\/NSFOCUS-NGIPS-Datasheet-cover-e1624871389293-116x150.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/09\/NSFOCUS-NGIPS-Datasheet_220930.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Next Generation Intrusion Prevention System <\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2018\/10\/TAS_datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/10\/tas.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2018\/10\/TAS_datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Threat Analysis System<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2018\/10\/NSFOCUS_EISA-datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/10\/eisa.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2018\/10\/NSFOCUS_EISA-datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Exposed Internet Surface Analysis<\/strong><\/a><\/div><\/div><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2019\/02\/NSFOCUS_ATM_datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2019\/02\/nsf-atm-ds.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2019\/02\/NSFOCUS_ATM_datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Attack Threat Monitoring<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/10\/NSFOCUS_ADBOS-datasheet-20231023-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2021\/06\/NSFOCUS_ADBOS-datasheet-cover-e1624871593393-116x150.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/10\/NSFOCUS_ADBOS-datasheet-20231023-1.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Active Defense Business Operating System<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2018\/08\/NSFOCUS-WVSS-Datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/08\/wvss.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2018\/08\/NSFOCUS-WVSS-Datasheet.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Web Vulnerability Scanning System<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/04\/RSAS-Datasheet-250415.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4255 size-full\" src=\"\/wp-content\/uploads\/2023\/01\/rsas-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/04\/RSAS-Datasheet-250415.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Remote Security Assessment System<\/strong><\/a><\/div><\/div><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/10\/NSFOCUS-Cloud-WAAP-Datasheet-20221009-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/10\/Cloud-WAAP-cover-1.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/10\/NSFOCUS-Cloud-WAAP-Datasheet-20221009-1.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Cloud WAAP<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/02\/NGFW-datasheet_20240229.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/09\/ngfwcover-e1664509297754.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/02\/NGFW-datasheet_20240229.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Next-Generation Firewall<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2023\/04\/NSFOCUS-PTaaS-Datasheet-230428.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2023\/04\/PTaaS-datasheet-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2023\/04\/NSFOCUS-PTaaS-Datasheet-230428.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Penetration Testing As A Service<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/04\/NSFOCUS-EASM-Datasheet0428.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4255 size-full\" src=\"\/wp-content\/uploads\/2023\/04\/EASM-datasheet-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/04\/NSFOCUS-EASM-Datasheet0428.pdf\" target=\"_blank\" rel=\"noopener\"><strong>External Attack Surface Management<\/strong><\/a><\/div><\/div><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2025\/03\/ISOP-Datasheet-20250304.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2023\/08\/isop-datasheet-cover-e1690960010433.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2025\/03\/ISOP-Datasheet-20250304.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Intelligent Security Operations Platform<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/12\/CTEM-Datasheet-20231222.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4255 size-full\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/ctemdatasheetcover-e1694768230642.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/12\/CTEM-Datasheet-20231222.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Continuous Threat Exposure Management<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/09\/NSFOCUS-DRPS-Datasheet_240912.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4255 size-full\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/09\/drps-datasheet-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/09\/NSFOCUS-DRPS-Datasheet_240912.pdf\" target=\"_blank\" rel=\"noopener\"><strong>Digital Risk Protection Service<\/strong><\/a><\/div><\/div><\/div>                    <\/div>\n\t\t        \n                    <div id=\"reports-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"reports-tab\">\n\t\t\t\t        <div class=\"row\" style=\"text-align: center;margin-bottom: 15px\">\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/resources\/2026-cybersecurity-trend-report\/\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2026\/03\/2026-CYBERSECURITY-TREND-REPORT-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/resources\/2026-cybersecurity-trend-report\/\"><strong>2026 Cybersecurity Trend Report<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/resources\/2025-cybersecurity-trend-report\/\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/04\/2025-Cybersecurity-Trend-report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/2025-cybersecurity-trend-report\/\"><strong>2025 Cybersecurity Trend Report<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/resources\/2025-botnet-trend-report\/\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/05\/2025-Botnet-Trend-report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/resources\/2025-botnet-trend-report\/\"><strong>2025 Botnet Trend Report<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/resources\/2024-apt-annual-landscape-report\/\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/04\/2024-APT-Annual-Landscape-Report_cover.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/resources\/2024-apt-annual-landscape-report\/\"><strong>2024 APT Annual Landscape Report<\/strong><\/a>\n    <\/div>\n<\/div>\n\n<div class=\"row\" style=\"text-align: center;margin-bottom: 15px\">\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/resources\/2024-global-ddos-landscape-report\/\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/05\/2024-ddos-landscape-report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/resources\/2024-global-ddos-landscape-report\/\"><strong>2024 Global DDoS Landscape Report<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/resources\/10-cybersecurity-trends-for-2024\/\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2024\/04\/10-Cybersecurity-Trends-for-2024-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/resources\/10-cybersecurity-trends-for-2024\/\"><strong>10 Cybersecurity Trends for 2024<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/resources\/2023-global-ddos-landscape-report\/\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2024\/04\/2023-ddos-report-cover-1.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/resources\/2023-global-ddos-landscape-report\/\"><strong>2023 Global DDoS Landscape Report<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2025\/06\/2023-APT-Annual-Landscape-Report.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/06\/2023-APT-Annual-Landscape-Report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2025\/06\/2023-APT-Annual-Landscape-Report.pdf\"><strong>2023 APT Annual Landscape Report<\/strong><\/a>\n    <\/div>\n<\/div>\n\n<div class=\"row\" style=\"text-align: center;margin-bottom: 15px\">\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/resources\/botnet-trends-2023-review-and-2024-predictions\/\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2024\/04\/botnet-trends-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/resources\/botnet-trends-2023-review-and-2024-predictions\/\"><strong>Botnet Trends: 2023 Review and 2024 Predictions<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2024\/03\/2023-NSFOCUS-Annual-Security-Incident-Observation-Report.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2024\/03\/2023-NSFOCUS-Annual-Security-Incident-Observation-Report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2024\/03\/2023-NSFOCUS-Annual-Security-Incident-Observation-Report.pdf\"><strong>2023 Annual Security Incident Observation Report<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2025\/06\/2022-APT-Annual-Landscape-Report.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/06\/2022-APT-Annual-Landscape-Report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2025\/06\/2022-APT-Annual-Landscape-Report.pdf\"><strong>2022 APT Annual Landscape Report<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/resources\/2022-global-ddos-attack-landscape-report\/\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2023\/03\/report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/resources\/2022-global-ddos-attack-landscape-report\/\"><strong>2022 Global DDoS Attack Landscape Report<\/strong><\/a>\n    <\/div>\n<\/div>\n\n<div class=\"row\" style=\"text-align: center;margin-bottom: 15px\">\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/resources\/2022-cybersecurity-insights\/\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2023\/05\/2022-Cybersecurity-insights-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/resources\/2022-cybersecurity-insights\/\"><strong>2022 Cybersecurity Insights<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/resources\/summary-of-dps-attacks-in-2022\/\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2023\/01\/dpsreport-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/resources\/summary-of-dps-attacks-in-2022\/\"><strong>Summary of Cloud DDoS Protection in 2022<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/resources\/h1-2022-global-ddos-attack-landscape\/\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/09\/H1-2022-Global-DDoS-Attack-Landscape_cover.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/resources\/h1-2022-global-ddos-attack-landscape\/\"><strong>H1 2022 Global DDoS Attack Landscape<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2022\/01\/2021-Global-DDoS-Attack-Landscape.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/2021_Global_DDoS_Attack_Landscape_Cover_A4_Digital.jpg\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2022\/01\/2021-Global-DDoS-Attack-Landscape.pdf\"><strong>2021 Global DDoS Attack Landscape Report<\/strong><\/a>\n    <\/div>\n<\/div>\n\n<div class=\"row\" style=\"text-align: center;margin-bottom: 15px\">\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2021\/09\/2021-Mid-Year-DDoS-Attack-Landscape-Report.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2021\/09\/2021-ddos-mid-year-report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2021\/09\/2021-Mid-Year-DDoS-Attack-Landscape-Report.pdf\"><strong>2021 Mid-Year DDoS Attack Landscape<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2021\/10\/Industrial-Internet-Security-Trend-Report-1.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2021\/10\/Industrial-Internet-Security-Trend-Report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2021\/10\/Industrial-Internet-Security-Trend-Report-1.pdf\"><strong>Industrial Internet Security Trend Report<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2021\/11\/Analysis-Report-on-Lorec53-Group.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2021\/11\/APT-report-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2021\/11\/Analysis-Report-on-Lorec53-Group.pdf\"><strong>Analysis Report on Lorec53 Group<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2021\/03\/2020-DDoS-Attack-Landscape.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2021\/03\/2020-ddos-attack-landscape-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2021\/03\/2020-DDoS-Attack-Landscape.pdf\"><strong>2020 DDoS Attack Landscape Report<\/strong><\/a>\n    <\/div>\n<\/div>\n\n<div class=\"row\" style=\"text-align: center;margin-bottom: 15px\">\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2021\/04\/2020-An-Observation-on-Cyber-Security-Incidents.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2021\/05\/Cover-image.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2021\/04\/2020-An-Observation-on-Cyber-Security-Incidents.pdf\"><strong>2020 An Observation on Cyber Security Incidents<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2021\/06\/2020-NSFOCUS-Cybersecurity-Insights.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2021\/06\/2020-Cybersecurity-Insights-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2021\/06\/2020-NSFOCUS-Cybersecurity-Insights.pdf\"><strong>2020 Cybersecurity Insights<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2020\/08\/2020-Mid-Year-DDoS-Attack-Landscape-Report-V4.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2020\/08\/2020-Mid-Year-DDoS-Attack-Landscape-Report-e1598535526693.jpg\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2020\/08\/2020-Mid-Year-DDoS-Attack-Landscape-Report-V4.pdf\"><strong>2020 Mid-Year DDoS Attack Landscape Report<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2020\/08\/2019-Annual-IoT-Security-Report-V6.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2020\/08\/2019-Annual-IoT-Security-Report-e1598535485207.jpg\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2020\/08\/2019-Annual-IoT-Security-Report-V6.pdf\"><strong>2019 Annual IoT Security Report<\/strong><\/a>\n    <\/div>\n<\/div>\n\n<div class=\"row\" style=\"text-align: center;margin-bottom: 15px\">\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2020\/10\/2019-Vulnerability-And-Threat-Trends-Research-Report-V5-1.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2020\/10\/Vulnerability-And-Threat-Trends-Research-Report-cover-e1603845768509.jpg\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2020\/10\/2019-Vulnerability-And-Threat-Trends-Research-Report-V5-1.pdf\"><strong>2019 Vulnerability And Threat Trends Research Report<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2020\/02\/2019DDoSAttackLandscpe-V13.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2020\/02\/2019DDoSAttackLandscpe-V10.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2020\/02\/2019DDoSAttackLandscpe-V13.pdf\"><strong>2019 DDoS Attack Landscape Report<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2020\/02\/2019Cybersecurity-Insights-V15.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2020\/02\/2019Cybersecurity-Insights-V8.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2020\/02\/2019Cybersecurity-Insights-V15.pdf\"><strong>2019 Cybersecurity Insights Report<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2020\/03\/2019-ICS-Information-Security-Assurance-Framework-V4.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2020\/03\/NSF-ICS-Framework.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2020\/03\/2019-ICS-Information-Security-Assurance-Framework-V4.pdf\"><strong>2019 ICS Information Security Assurance Framework<\/strong><\/a>\n    <\/div>\n<\/div>\n\n<div class=\"row\" style=\"text-align: center;margin-bottom: 15px\">\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2020\/08\/2019-Botnet-Trend-Report-V4.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2020\/08\/2019-Botnet-Trend-Report-e1598535400636.jpg\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2020\/08\/2019-Botnet-Trend-Report-V4.pdf\"><strong>2019 Botnet Trend Report<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2020\/01\/2018-Annual-IoT-Security-Report-V2.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2020\/01\/NSFOCUS_Report_1-9-20.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2020\/01\/2018-Annual-IoT-Security-Report-V2.pdf\"><strong>2018 Annual IoT Security Report<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2019\/04\/2018DDoS-Attack-Landscape-V12.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2019\/04\/NSF-2018-attack-landscape.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2019\/04\/2018DDoS-Attack-Landscape-V12.pdf\"><strong>2018 DDoS Attack Landscape<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2019\/06\/2018-Botnet-Trend-Report.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2019\/06\/NSF-2018-botnet-trend-report.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2019\/06\/2018-Botnet-Trend-Report.pdf\"><strong>2018 Botnet Trend Report<\/strong><\/a>\n    <\/div>\n<\/div>\n\n<div class=\"row\" style=\"text-align: center;margin-bottom: 15px\">\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2019\/11\/An-Anatomy-of-WS-Discovery-Reflection-Attacks-V2-1.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2019\/11\/NSFOCUS_Report_11-14-19.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2019\/11\/An-Anatomy-of-WS-Discovery-Reflection-Attacks-V2-1.pdf\"><strong>An Anatomy of WS-Discovery Reflection<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2019\/01\/2018-H1-Cybersecurity-Insights.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/10\/2018-H1-Cybersecurity-Insights.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2019\/01\/2018-H1-Cybersecurity-Insights.pdf\"><strong>2018 H1 Cybersecurity Insights Report<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2019\/01\/Behavior-Analysis-of-IP-Chain-Gangs.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2019\/01\/NSF-behavior-analysis-report-thumb.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2019\/01\/Behavior-Analysis-of-IP-Chain-Gangs.pdf\"><strong>Behavior Analysis of IP Chain-Gangs<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2019\/02\/Containter-Security-Report-2018.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2019\/02\/NSF-container-security-report-thumb.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2019\/02\/Containter-Security-Report-2018.pdf\"><strong>2018 NSFOCUS Technical Report on Container Security<\/strong><\/a>\n    <\/div>\n<\/div>\n\n<div class=\"row\" style=\"text-align: center;margin-bottom: 15px\">\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2019\/01\/NSFOCUS-2017-Annual-IoT-Cybersecurity-Report-0726.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/08\/IoT_Cybersecurity_Report.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2019\/01\/NSFOCUS-2017-Annual-IoT-Cybersecurity-Report-0726.pdf\"><strong>2017 Annual IoT Cybersecurity Report<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2019\/01\/2017_DDoS_and_Web_Application_Attack_Landscape_4.15.18-2.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/04\/2017_DDoS_and_Web_Application_Attack_Landscape-1.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2019\/01\/2017_DDoS_and_Web_Application_Attack_Landscape_4.15.18-2.pdf\"><strong>2017 DDoS and Web Application Attack Landscape Report<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2019\/01\/2017_Annual_Cybersecurity_Insights_0412.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/04\/2017_Annual_Cybersecurity_Insights-2.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2019\/01\/2017_Annual_Cybersecurity_Insights_0412.pdf\"><strong>2017 Annual Cybersecurity Insights Report<\/strong><\/a>\n    <\/div>\n\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2019\/01\/2017_Fintech_Security_Analysis_Report_0412.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/04\/2017_Fintech_Security_Analysis_Report-1.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2019\/01\/2017_Fintech_Security_Analysis_Report_0412.pdf\"><strong>2017 Fintech Security Analysis Report<\/strong><\/a>\n    <\/div>\n<\/div>\n\n<div class=\"row\" style=\"text-align: center;margin-bottom: 15px\">\n    <div class=\"resource col-md-3 col-sm-6\">\n        <a href=\"\/wp-content\/uploads\/2019\/01\/2017-Botnet-Trend-Report.pdf\">\n            <img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4255 aligncenter\" src=\"\/wp-content\/uploads\/2018\/05\/2017_Botnet_Trend_Report.png\" alt=\"\" width=\"116\" height=\"146\" \/>\n        <\/a>\n        <a href=\"\/wp-content\/uploads\/2019\/01\/2017-Botnet-Trend-Report.pdf\"><strong>2017 Botnet Trend Report<\/strong><\/a>\n    <\/div>\n<\/div>                    <\/div>\n\t\t        \n                    <div id=\"whitepapers-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"whitepapers-tab\">\n\t\t\t\t        <div class=\"well\" style=\"text-align: center\"><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/01\/SANS_Whitepaper_Threat_Intelligence__What_It_Is__and_How_to_Use_It_Effectively.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2017\/01\/SANS_Whitepaper_Threat_Intelligence__What_It_Is__and_How_to_Use_It_Effectively.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2017\/01\/SANS_Whitepaper_Threat_Intelligence__What_It_Is__and_How_to_Use_It_Effectively.pdf\"><strong>Threat Intelligence: What It Is, and How to Use It Effectively<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/01\/Distributed_Denial_of_Service_Attacks__An_Economic_Perspective__Whitepaper.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/07\/Distributed_Denial_of_Service_Attacks__An_Economic_Perspective__Whitepaper.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2017\/01\/Distributed_Denial_of_Service_Attacks__An_Economic_Perspective__Whitepaper.pdf\"><strong>Distributed Denial-of-Service (DDoS) Attacks: An Economic Perspective<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Managed_Services_Play_Book_White_Paper.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/04\/service-provider-ddos-playbook.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Managed_Services_Play_Book_White_Paper.pdf\"><strong>Service Provider DDoS Playbook: &#8220;Building a Case&#8221; for Managed DDoS Services<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/01\/Understanding_the_Threat_Intelligence_Ecosystem___eBook.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/07\/Understanding_the_Threat_Intelligence_Ecosystem___eBook.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2017\/01\/Understanding_the_Threat_Intelligence_Ecosystem___eBook.pdf\"><strong>Understanding the Threat Intelligence Ecosystem<\/strong><\/a><\/div><\/div><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/01\/G20_transcript_Final.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/07\/G20_transcript_Final.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2017\/01\/G20_transcript_Final.pdf\"><strong>How NSFOCUS Protected the G20 Summit<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/05\/NSFOCUS_Hosting_Provider_Revenue_Model_10May17.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2017\/05\/hosting-provider.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><a href=\"\/wp-content\/uploads\/2017\/05\/NSFOCUS_Hosting_Provider_Revenue_Model_10May17.pdf\"><strong>Hosting Providers DDoS Playbook \u2013 \u201cBuilding a Case\u201d for Managed DDoS Services<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/05\/NSFOCUS_Internet_Service_Provider_Revenue_Model_10May17.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2017\/05\/internet-service-provider.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2017\/05\/NSFOCUS_Internet_Service_Provider_Revenue_Model_10May17.pdf\"><strong>ISPs DDoS Playbook \u2013 \u201cBuilding a Case\u201d for Managed DDoS Services<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2020\/11\/Enterprise-Blockchain-Security-Whitepaper-V3.pdf\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2020\/11\/Enterprise-Blockchain-Security-Whitepaper-cover.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2020\/11\/Enterprise-Blockchain-Security-Whitepaper-V3.pdf\"><strong>Enterprise Blockchain Security<\/strong><\/a><\/div><\/div><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/resources\/aisecops-whitepaper\/\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2023\/11\/AISecops-whitepaper-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/resources\/aisecops-whitepaper\/\"><strong>NSFOCUS AISecOps Whitepaper<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/resources\/secxops-technical-whitepaper\/\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2023\/11\/SecXops-whitepaper-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/resources\/secxops-technical-whitepaper\/\"><strong>NSFOCUS SecXops Technical Whitepaper<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/resources\/secllm-technical-whitepaper\/\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2024\/01\/SecLLM-Technical-Whitepaper-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/resources\/secllm-technical-whitepaper\/\"><strong>Enhancing Network Security with SecLLM<\/strong><\/a><\/div><\/div><\/div>                    <\/div>\n\t\t        \n                    <div id=\"casestudies-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"casestudies-tab\">\n\t\t\t\t        <div class=\"well\" style=\"text-align: center\"><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/01\/2-Cloud-DPS-\u2013-Optimization-for-a-Managed-Security-Service-Customer.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/2-Cloud-DPS.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/01\/2-Cloud-DPS-\u2013-Optimization-for-a-Managed-Security-Service-Customer.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>Cloud DPS \u2013 Optimization for a Managed Security Service Customer<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/01\/3-Cloud-DPS_400G-DDoS-Attack-Event-Captured-by-NSFOCUS-in-Hong-Kong-S.A.R.-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/3-Cloud-DPS.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/01\/3-Cloud-DPS_400G-DDoS-Attack-Event-Captured-by-NSFOCUS-in-Hong-Kong-S.A.R.-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>A 400G DDoS Attack Event Captured by NSFOCUS in Hong Kong S.A.R.<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/01\/4-Global-TOP-10-IT-Corporation-Partners-with-NSFOCUS-on-Cloud-DPS-Holistic-Solution-and-Advanced-MSS-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/4-Global.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/01\/4-Global-TOP-10-IT-Corporation-Partners-with-NSFOCUS-on-Cloud-DPS-Holistic-Solution-and-Advanced-MSS-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>Global TOP 10 IT Corporation Partners with NSFOCUS on Cloud DPS Holistic Solution and Advanced MSS<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/01\/5-Fortune-Global-500-Energy-Corporation-Partners-with-NSFOCUS-on-Cloud-DPS-Holistic-Solution-and-Advanced-MSS-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/5-Fortune.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/01\/5-Fortune-Global-500-Energy-Corporation-Partners-with-NSFOCUS-on-Cloud-DPS-Holistic-Solution-and-Advanced-MSS-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>Fortune Global 500 Energy Corporation Partners with NSFOCUS on Cloud DPS Holistic Solution and Advanced MSS <\/strong><\/a><\/div><\/div><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/01\/6-Global-TOP-10-Public-Cloud-Corporation-Partners-with-NSFOCUS-on-Cloud-DPS-Solution-and-API-Integration-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/6-Global.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/01\/6-Global-TOP-10-Public-Cloud-Corporation-Partners-with-NSFOCUS-on-Cloud-DPS-Solution-and-API-Integration-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>Global TOP 10 Public Cloud Corporation Partners with NSFOCUS on Cloud DPS Solution and API Integration<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/01\/7-Excellent-Technical-and-Service-Support-Partner-of-Global-500-Telecommunication-2.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/7-Excellent.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/01\/7-Excellent-Technical-and-Service-Support-Partner-of-Global-500-Telecommunication-2.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>Excellent Technical and Service Support Partner of Global 500 Telecommunication<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/01\/8-Cloud-DPS_Guaranteed-Mitigation-Effect-by-Tailored-Policy-Tuning-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/8-Cloud.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/01\/8-Cloud-DPS_Guaranteed-Mitigation-Effect-by-Tailored-Policy-Tuning-1.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>Cloud DPS_Guaranteed Mitigation Effect by Tailored Policy Tuning<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/01\/G_20_CaseStudy_Final_11_16.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2017\/01\/G_20_CaseStudy_Final_11_16.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2017\/01\/G_20_CaseStudy_Final_11_16.pdf\" target=\"_blank\" rel=\"noopener\"><strong>NSFOCUS Protects 2016 G20 Summit from 100,000+ Cyber Attacks<\/strong><\/a><\/div><\/div><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Case_Study_Micron21.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Case_Study_Micron21.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Case_Study_Micron21.pdf\" target=\"_blank\" rel=\"noopener\"><strong>MICRON21 depends on NSFOCUS for protection against DDoS attacks<\/strong><\/a><\/div><\/div><\/div>                    <\/div>\n\t\t        \n                    <div id=\"info-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"info-tab\">\n\t\t\t\t        <div class=\"well\" style=\"text-align: center\"><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/01\/Cloud-DPS-overview.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/Cloud-DPS-overview-scaled-1.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/01\/Cloud-DPS-overview.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>Cloud DPS overview<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2022\/01\/Apache-Log4j-vulnerability-monitoring-analysis.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2022\/01\/Apache-Log4j.jpg\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><br \/><a href=\"\/wp-content\/uploads\/2022\/01\/Apache-Log4j-vulnerability-monitoring-analysis.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>Apache Log4j Vulnerability Monitoring Analysis<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2018\/08\/Infographic-NSFOCUS-APT-Solution.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2018\/08\/Infographic_NSFOCUS_APT_Solution.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><a href=\"\/wp-content\/uploads\/2018\/08\/Infographic-NSFOCUS-APT-Solution.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><strong>The NSFOCUS Next Generation Advanced Threat Protection (APT) Solution<\/strong><\/a><\/div><\/div><\/div>                    <\/div>\n\t\t        \n                    <div id=\"articles-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"articles-tab\">\n\t\t\t\t        <div class=\"well\" style=\"text-align: center\"><div class=\"row\"><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Article_CIO_Review.pdf\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Article_CIO_Review-1.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><a href=\"\/wp-content\/uploads\/2017\/01\/NSFOCUS_Article_CIO_Review.pdf\" target=\"_blank\" rel=\"noopener\"><strong>NSFOCUS recognized as a top DDoS Solution Provider of 2016<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/nsfocus-2024-competitive-strategy-leader-in-the-chinese-managed-detection-and-response-industry\/\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2024\/06\/NSFOCUS-2024-Competitive-Strategy-Leader-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><a href=\"\/nsfocus-2024-competitive-strategy-leader-in-the-chinese-managed-detection-and-response-industry\/\" target=\"_blank\" rel=\"noopener\"><br \/><strong>2024 Competitive Strategy Leader in the Chinese Managed Detection and Response Industry<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/nsfocus-2025-competitive-strategy-leader-in-the-apac-anti-ddos-industry\/\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/05\/2025-Competitive-Strategy-Leader-Best-Practices-in-the-APAC-Anti-DDoS-Industry-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><\/a><a href=\"\/nsfocus-2025-competitive-strategy-leader-in-the-apac-anti-ddos-industry\/\" target=\"_blank\" rel=\"noopener\"><br \/><strong>2025 Competitive Strategy Leader in the Asia-Pacific Anti-DDoS Industry<\/strong><\/a><\/div><div class=\"resource col-md-3 col-sm-6\"><a href=\"\/nsfocus-2025-competitive-strategy-leader-for-ai-driven-security-operations\/\" target=\"_blank\" rel=\"noopener\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4255\" src=\"\/wp-content\/uploads\/2025\/12\/2025-Global-Competitive-Strategy-Leadership-for-AI-Driven-Security-Operations-cover.png\" alt=\"\" width=\"116\" height=\"146\" \/><br \/><\/a><br \/><a href=\"\/nsfocus-2025-competitive-strategy-leader-for-ai-driven-security-operations\/\" target=\"_blank\" rel=\"noopener\"><br \/><strong>2025 Competitive Strategy Leader for AI-Driven Security Operations<\/strong><\/a><\/div><\/div><\/div>                    <\/div>\n\t\t                    <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Resources Choose datasheets for basic product information, or whitepapers for business and technical discussions around NSFOCUS solutions. DATASHEETS REPORTS WHITEPAPERS CASE STUDIES INFOGRAPHICS ARTICLES On-Premises DDoS DefensesCloud DPSWeb Application FirewallThreat IntelligenceCloud Security Service for EnterpriseCloud DPS for Hosting ProvidersCloud DPS for EnterpriseHybrid DDoS Defenses SolutionCloud in a BoxNext Generation Intrusion Prevention System Threat Analysis SystemExposed [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":30648,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"class_list":["post-4376","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Resources<\/title>\n<meta name=\"description\" content=\"Choose datasheets for basic product information, or whitepapers for business and technical discussions around NSFOCUS solutions.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Distributed Denial-of-Service Protection | Resources\" \/>\n<meta property=\"og:description\" content=\"Discover NSFOCUS&#039;s expertise in Distributed Denial-of-Service Protection. Enhance your security strategy with trusted solutions. Explore our resources.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/resources\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-20T07:20:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/09\/cropped-1-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Distributed Denial-of-Service Protection | Resources\" \/>\n<meta name=\"twitter:description\" content=\"Discover NSFOCUS&#039;s expertise in Distributed Denial-of-Service Protection. Enhance your security strategy with trusted solutions. Explore our resources.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/09\/cropped-1-1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"21 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/resources\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/resources\\\/\",\"name\":\"Resources\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/resources\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/resources\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/cropped-1-1.png\",\"datePublished\":\"2017-01-28T14:31:59+00:00\",\"dateModified\":\"2026-04-20T07:20:27+00:00\",\"description\":\"Choose datasheets for basic product information, or whitepapers for business and technical discussions around NSFOCUS solutions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/resources\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/resources\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/resources\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/cropped-1-1.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/cropped-1-1.png\",\"width\":512,\"height\":512,\"caption\":\"Black and white photo of a woman with a large afro and a tattoo on her shoulder.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/resources\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Resources","description":"Choose datasheets for basic product information, or whitepapers for business and technical discussions around NSFOCUS solutions.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Distributed Denial-of-Service Protection | Resources","og_description":"Discover NSFOCUS's expertise in Distributed Denial-of-Service Protection. Enhance your security strategy with trusted solutions. Explore our resources.","og_url":"https:\/\/nsfocusglobal.com\/resources\/","og_site_name":"NSFOCUS","article_modified_time":"2026-04-20T07:20:27+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/09\/cropped-1-1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_title":"Distributed Denial-of-Service Protection | Resources","twitter_description":"Discover NSFOCUS's expertise in Distributed Denial-of-Service Protection. Enhance your security strategy with trusted solutions. Explore our resources.","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/09\/cropped-1-1.png","twitter_misc":{"Est. tempo de leitura":"21 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/resources\/","url":"https:\/\/nsfocusglobal.com\/resources\/","name":"Resources","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/resources\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/resources\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/09\/cropped-1-1.png","datePublished":"2017-01-28T14:31:59+00:00","dateModified":"2026-04-20T07:20:27+00:00","description":"Choose datasheets for basic product information, or whitepapers for business and technical discussions around NSFOCUS solutions.","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/resources\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/resources\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/resources\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/09\/cropped-1-1.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/09\/cropped-1-1.png","width":512,"height":512,"caption":"Black and white photo of a woman with a large afro and a tattoo on her shoulder."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/resources\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Resources"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/pages\/4376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=4376"}],"version-history":[{"count":240,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/pages\/4376\/revisions"}],"predecessor-version":[{"id":35933,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/pages\/4376\/revisions\/35933"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/30648"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=4376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}