All resources sponsored by:

Akamai Technologies

1 - 25 of 60 Matches
Cost of Web Application & Denial of Service Attacks
sponsored by Akamai Technologies
ANALYST REPORT:Download this report from the Ponemon Institute that reveals a breakdown of specific costs that organizations could incur from web application and DoS attacks, including operational disruptions to technical support and user productivity issues.
Posted: 28 Dec 2018 | Published: 31 Oct 2018
Get This Now


The Complete Guide to Performance Testing Your Retail Websites and Apps
sponsored by Akamai Technologies
WHITE PAPER:Today retailers are pressured to balance a compelling online shopping experience, as well as a fast and reliable one. While it sounds difficult, it doesn't have to be. In this best practices guide, learn how you can get started with performance testing to help you maintain this balance.
Posted: 27 Dec 2018 | Published: 27 Dec 2018
Get This Now


The IT Digital Maturity Handbook
sponsored by Akamai Technologies
WHITE PAPER:Today, companies must find the balance between digital experience and cybersecurity. How? Download this white paper to learn more.
Posted: 27 Dec 2018 | Published: 27 Dec 2018
Get This Now


Protect Your Online Business From Credential Stuffing
sponsored by Akamai Technologies
WHITE PAPER:Understanding credential stuffing threats, their increasing sophistication, and the best approaches for stopping them can help you safeguard your business. In this white paper, explore a bot management system that can help you successfully manage and mitigate credential stuffing attacks today.
Posted: 27 Dec 2018 | Published: 27 Dec 2018
Get This Now


Competitive Edge in the Cloud
sponsored by Akamai Technologies
EBOOK:Businesses rely on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business aren't also introducing security risks, impacting customer experience (CX), or costing more than anticipated? This e-book explains how cloud delivery platforms are designed to make the cloud work for you.
Posted: 27 Dec 2018 | Published: 31 Aug 2018
Get This Now


Making a DDoS Protection Plan: 8 Best Practices
sponsored by Akamai Technologies
WHITE PAPER:Having a DDoS protection plan in place when an attack strikes will make the difference between organization-wide panic and an orderly and timely response that keeps business as usual. In this white paper, learn about 8 best practices for building and maintaining a DDoS protection plan.
Posted: 27 Dec 2018 | Published: 30 Sep 2017
Get This Now


Frost and Sullivan: Global Bot Risk Management Award
sponsored by Akamai Technologies
ANALYST REPORT:In this Frost & Sullivan award announcement, explore their research of automated bot attacks, the expected market growth of BRM products and vendors, and why Akamai Technologies was awarded Market Leader.
Posted: 26 Dec 2018 | Published: 26 Dec 2018
Get This Now


Web Application Firewalls: 2018 Executive Summary
sponsored by Akamai Technologies
RESEARCH CONTENT:Enterprise security teams considering WAFs should evaluate the pros and cons of stand-alone and cloud-based WAFs for their specific environments. Download this executive summary of the 2018 Gartner Magic Quadrant for Web Application Firewalls for guidance on vendors and specific products in the WAF arena.
Posted: 26 Dec 2018 | Published: 26 Dec 2018
Get This Now


Captivate your online user base in 3 simple steps
sponsored by Akamai Technologies
EBOOK:The few seconds online businesses have to captivate their audience are critical, and delivering the wrong material has proven to be just as harmful as delivering the right material too slow. In this PDF, discover how a simple 3-step plan can help businesses gain vital insight into what's slowing them down.
Posted: 24 Dec 2018 | Published: 24 Dec 2018
Get This Now


Case Study: CashFlows Further Raises the Bar with World-Class Security
sponsored by Akamai Technologies
CASE STUDY:Learn how a leading UK financial services organization was able to enhance security and protect its cloud-hosted payments platform using Akamai Technologies.
Posted: 24 Dec 2018 | Published: 24 Dec 2018
Get This Now


Web Application Firewalls Report
sponsored by Akamai Technologies
ANALYST REPORT:Today, applications are far too easily breached. In this Forrester Report, explore the 10 leading Web Application Firewall (WAF) vendors that matter most and how they stack up.
Posted: 21 Dec 2018 | Published: 25 Jun 2018
Get This Now


Enforce a Zero Trust Security Model in Today's Hostile Environment
sponsored by Akamai Technologies
WHITE PAPER:As infrastructure becomes more permeable to enable new business models, cyber criminals are becoming more sophisticated, and incentivized to find ways to circumvent security measures. Traditional perimeter security weren't designed for today's reality. This white paper describes a security paradigm for today's hostile environment: zero trust.
Posted: 21 Dec 2018 | Published: 28 Feb 2018
Get This Now


Understanding Your Credential Stuffing Attack Surface
sponsored by Akamai Technologies
WHITE PAPER:Your ability to mitigate credential stuffing attacks will depend on more than the bot management vendor or solution you select. In fact, your website architecture plays a critical role in the effectiveness of any vendor's security solution. Learn more about how to prevent credential stuffing attacks in this white paper.
Posted: 20 Dec 2018 | Published: 28 Feb 2018
Get This Now


E-Book: Advancing Digital Maturity in Financial Services
sponsored by Akamai Technologies
BOOK:Download this e-book for guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience.
Posted: 20 Dec 2018 | Published: 20 Dec 2018
Get This Now


The IT Digital Maturity Handbook
sponsored by Akamai Technologies
BOOK:In this brief, explore what it takes to balance seamless digital experiences and security to survive in today's economy.
Posted: 20 Dec 2018 | Published: 20 Dec 2018
Get This Now


Trends in the Cost of Web Application & Denial of Service Attacks
sponsored by Akamai Technologies
RESOURCE:Ponemon Institute conducted a study to understand changes in the cost and consequences of web application and denial of service attacks. The report is divided into two sections. The first section addresses web application security and the second focuses on DoS attacks. Read this report to find key takeaways to help your organization.
Posted: 19 Dec 2018 | Published: 30 Jun 2018
Get This Now


The Cost of Credential Stuffing: Asia-Pacific
sponsored by Akamai Technologies
ANALYST REPORT:In this research report, discover the potential cost to prevent, detect and remediate credential stuffing attacks, as well as the financial consequences to companies if attackers are able to use stolen credentials to make fraudulent purchases or transactions.
Posted: 19 Dec 2018 | Published: 30 Jun 2018
Get This Now


2018 The State of the Internet / Security: A Year in Review
sponsored by Akamai Technologies
WHITE PAPER:This issue of the State of the Internet / Security report looks back at some of the events from 2018. 2018 was an interesting year for security professionals around the globe. In this white paper, review the major events that took place to help you plan for 2019.
Posted: 17 Dec 2018 | Published: 31 Dec 2018
Get This Now


Balancing Digital Experience and Security
sponsored by Akamai Technologies
RESOURCE:As organizations seek to improve customer experiences, they must enable increasingly fast, streamlined, simple and safe digital experiences. This executive summary aims to help readers understand how digital businesses across the globe align user experience and security with their strategic priorities.
Posted: 17 Dec 2018 | Published: 31 Mar 2018
Get This Now


Credential Stuffing Attacks: 2018 Security Report
sponsored by Akamai Technologies
RESEARCH CONTENT:In this quarterly report, discover how credential stuffing and advanced DDoS attacks have affected organizations this year.
Posted: 17 Dec 2018 | Published: 17 Dec 2018
Get This Now


Competitive Edge in the Cloud
sponsored by Akamai Technologies
WHITE PAPER:How do you ensure that the cloud technologies enabling your business aren't also introducing security risks, impacting customer experience, or accumulating more expenses than anticipated? In this e-book, learn how cloud delivery platforms are designed to extend and enable your cloud infrastructure to protect your business.
Posted: 17 Dec 2018 | Published: 31 Aug 2018
Get This Now


The 4 Benefits of VPN Elimination
sponsored by Akamai Technologies
WHITE PAPER:Virtual private network (VPN) vulnerabilities are pervasive, and outdated access solutions can allow for unprotected access to enterprise networks and applications. In this white paper, learn more about the vulnerabilities and inefficiencies of traditional remote access, 4 advantages of eliminating your VPN, and more.
Posted: 25 Oct 2018 | Published: 25 Oct 2018
Get This Now


The Cost of Credential Stuffing: A Poneman Institute Research Report
sponsored by Akamai Technologies
RESEARCH CONTENT:Uncover the survey results from this Ponemon Institute survey regarding, the costs of credential stuffing, volume of user attacks, the top 5 consequences of credential stuffing, and more.
Posted: 08 Nov 2018 | Published: 08 Nov 2018
Get This Now


2018 State of the Internet: Credential Stuffing Attacks Report
sponsored by Akamai Technologies
RESEARCH CONTENT:Discover how credential stuffing, the use of botnets to try to login to a site with stolen or randomly created login information, is continuing to affect companies worldwide.
Posted: 07 Nov 2018 | Published: 07 Nov 2018
Get This Now


Protect your Online Business from Credential Stuffing
sponsored by Akamai Technologies
WHITE PAPER:Explore what credential stuffing is and how it works. Understand this potential threat to your business. Find out how advanced bot management can help you stay ahead of credential stuffing so that you can protect your organization and its critical assets.
Posted: 15 Oct 2018 | Published: 31 Mar 2018
Get This Now


1 - 25 of 60 Matches
Page: 2 3 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement