akamai

Results 251 - 275 of 299Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Jun 27, 2017
Today, enterprises are providing employees and third parties with remote access to their applications in much the same way they did 20 years ago – through VPNs, proxies, and remote desktops. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
forrester, wave, web, application, firewalls, akamai
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 22, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: ? Customer trust is at an all-time low and it’s hurting growth ? Executives are aware that customer trust is becoming critical to success ? Companies struggle to balance security with digital experience ? Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : 
customer, trust, company, loyalty, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 14, 2018
You’ve created a great game, so why do players keep abandoning it? The answer is frictions— the obstacles and flaws that erode player satisfaction, disrupt immersion, and ultimately cause players to look elsewhere. This abandonment not only impacts your game and revenue but also your studio’s reputation for years to come. In “Understanding Frictions” Akamai’s Nelson Rodriguez, a gaming industry insider who’s helped launch successful titles like Halo 3, will explain how to minimize frictions so you can maximize player enjoyment, loyalty, and revenue. Read “Understanding Frictions” so you can analyze your game’s points of friction using our matrix and learn how to manage, reduce, or eliminate frictions at every development stage.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 14, 2018
Delivering a hit PC game isn’t easy. You’ve got to worry about frictions like slow downloads, unstable connections, and security flaws — any of which can cause players to abandon for good and doom your game to failure. Akamai’s Quick Start Guide: Global Game Launch, PC Edition can take some of the complexity— and anxiety— out of your next game launch. You’ll learn how Akamai can help you succeed at each of the four key steps of game release — Develop, Promote, Deliver, and Play — so you can keep your players engaged with a seamless, secure game experience.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: Customer trust is at an all-time low and it’s hurting growth Executives are aware that customer trust is becoming critical to success Companies struggle to balance security with digital experience Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : 
digital, experience, security, executives, customer
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai     Published Date: May 30, 2017
This report outlines the delivery tier technology options that application development and delivery (AD&D) professionals must embrace.
Tags : 
mobile, communication, mobile performance, application development, collaboration
    
Akamai
Published By: Akamai Technologies     Published Date: Jul 02, 2018
Which bot management solution is right for you? Bots are responsible for 30% to 70% of website traffic. They range from good to middling to bad, and from simple to sophisticated. Many bot management vendors say they can solve your bot problem. But can they really? This e-book provides guidance on how to evaluate bot management solutions and understand what the differences mean for you and your customers. We cover the top 10 things to consider when selecting a bot management solution, from accuracy and API protection to flexibility and resilience over time.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 02, 2018
What to expect and how to prepare your best defense DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend won’t continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : 
internet, security, cryptocurrency, data, breaches, botnet
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 07, 2018
We are pleased to present the Cost of Web Application and Denial of Service Attacks, sponsored by Akamai Technologies. The purpose of this research is to understand changes in the cost and consequences of web application and denial of service attacks since the study was first conducted in 2015. For this study, Ponemon Institute surveyed 621 individuals in IT operations, IT security, IT compliance or data center administration.
Tags : 
web, application, attacks, security, akamai, technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 07, 2018
Learn about Akamai Cloud Security Solutions Akamai’s web application firewall and DDoS solutions include easy-to-deploy, low-maintenance solutions for enterprises.
Tags : 
identity, theft, revenue, technical, support, data, confidential
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 17, 2018
xxx
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
xxx
Tags : 
    
Akamai Technologies
Published By: Akamai     Published Date: Sep 12, 2012
Did you know that most companies underutilize services that can improve the performance of Web and mobile architectures, focusing mistakenly on more costly and complex solutions?
Tags : 
akamai, mobile, web, ecommerce, online, digital, mobile solutions, online solutions, technology
    
Akamai
Published By: Cisco     Published Date: May 14, 2015
The shift to mobile and cloud computing is imperative for all company leaders because it facilitates the digitization of the business and advances new ways to enable employees and serve customers.
Tags : 
cisco, catalyst, networks, byod, mobile computing, wifi, cloud computing
    
Cisco
Published By: BitGravity     Published Date: Apr 22, 2008
This white paper outlines the limitations of proxy cache networks, presents the attributes and benefits of an ideal solution, and suggests that BitGravity has designed a content delivery system that addresses the needs in marketplace at an affordable price.
Tags : 
cdn, cdns, content delivery, content delivery network, content delivery networks, akamai, limelight, panther express, on demand video, vod, video on demand, stream, streaming, video streaming, video hosting, brightcove, bright cove, live broadcasting, move networks, streaming media
    
BitGravity
Published By: Cisco Systems     Published Date: Jan 09, 2014
With applications lifting to the cloud and Internet edge shifting to the branch, the WAN connecting the branch to HQ needs more capacity than ever before. Join experts from Cisco and Akamai to learn how you can accelerate your transition to Internet as WAN—and make your branch smarter today. View Now
Tags : 
wan, iwan, cisco, cloud, branch office, branch management, internet, networking, business technology
    
Cisco Systems
Published By: Akamai     Published Date: Sep 20, 2010
This white paper looks at a number of factors that can make you more successful with collaboration in your enterprise.
Tags : 
akamai, enterprise collaboration, collaborative application
    
Akamai
Published By: Akamai     Published Date: Jul 01, 2011
Learn Why Protecting Your Online Channels and Applications is Critical.
Tags : 
akamai, security capabilities, online channel protection, web applications, ddos, distributed denial of service, threat landscape, firewall, siteshield, gtm, dns, edns, edge tokenization
    
Akamai
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.