All resources sponsored by:

Akamai Technologies

1 - 25 of 30 Matches
Enforce a Zero Trust Security Model in Today's Hostile Environment
sponsored by Akamai Technologies
WHITE PAPER:Companies are pursuing digital transformation to improve customer value, operate with greater efficiency & agility, & increase innovation. As companies leverage new workflows, security has not kept pace, & cybercriminals are becoming more sophisticated. This white paper describes a security paradigm for today's environment: zero trust.
Posted: 22 Jun 2018 | Published: 22 Jun 2018
Get This Now


8 Steps to Zero Trust
sponsored by Akamai Technologies
RESOURCE:Use this step-by-step guide from Akamai's CTO, Charlie Gero, to build an inclusive & concrete zero trust architecture, to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time & reducing your migration risk profile.
Posted: 22 Jun 2018 | Published: 31 May 2018
Get This Now


Moving Beyond Perimeter Security: A Comprehensive and Achievable Guide to Less Risk
sponsored by Akamai Technologies
WHITE PAPER:A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper to learn how to transition to a perimeter-less world in an incredibly easy way.
Posted: 21 Jun 2018 | Published: 30 Mar 2018
Get This Now


Protecting Your Network from Malware
sponsored by Akamai Technologies
WHITE PAPER:67% of workers use their own devices at work, according to IDC, and it only takes one compromised device to unleash malware that cripples the network or facilitates data exfiltration. Secure your network from vicious malware and most importantly, your data.
Posted: 21 Jun 2018 | Published: 30 Apr 2018
Get This Now


Cybercrime by the Numbers
sponsored by Akamai Technologies
RESOURCE:It's likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today's hyperconnected world.
Posted: 20 Jun 2018 | Published: 20 Jun 2018
Get This Now


Adopt DNS Best Practices to Proactively Protect Against Malware
sponsored by Akamai Technologies
RESOURCE:The cyber threat landscape is dynamic and accelerating. The DNS is a vulnerability in many organizations' defenses that malicious actors are increasingly exploiting. Explore these DNS best practices that can aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Posted: 20 Jun 2018 | Published: 30 Sep 2017
Get This Now


5 Must-Ask DNS Questions
sponsored by Akamai Technologies
WHITE PAPER:Cybercriminals are evolving. They are capitalizing on the open and unprotected nature of the DNS to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are 5 things to ask yourself as you consider a DNS security solution for your company.
Posted: 19 Jun 2018 | Published: 19 Jun 2018
Get This Now


How Securing Recursive DNS Proactively Protects Your Network
sponsored by Akamai Technologies
WHITE PAPER:Security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy, most IT departments still fail to explicitly protect the Domain Name System (DNS). Discover why this Internet protocol doesn't have to be a vulnerability.
Posted: 19 Jun 2018 | Published: 19 Jun 2018
Get This Now


Remote Access Redefined: Managing the Rise of Third-Party Users
sponsored by Akamai Technologies
WHITE PAPER:The explosion of mobile workers and 3rd party users means that organizations may need a new strategy to guarantee secure and convenient access to enterprise applications, whether users are behind-the-firewall or in the cloud. Learn how to tame the problem with a content delivery network service.
Posted: 18 Jun 2018 | Published: 31 Dec 2017
Get This Now


Why Moats and Castles Belong in the Past
sponsored by Akamai Technologies
WHITE PAPER:The moats and castle approach to enterprise security no longer works. Once inside the walls, a person can pretty much do whatever they want. Discover a new way that is simpler, more secure, and a convenient way to protect your enterprise.
Posted: 18 Jun 2018 | Published: 31 May 2017
Get This Now


Remote Access and Security Challenges & Opportunities
sponsored by Akamai Technologies
RESEARCH CONTENT:Remote access is important and growing, but how secure is it? Access this IDC Research Report to find out and learn about the complexity faced in implementing remote access and what happens when companies don't have an access security platform.
Posted: 15 Jun 2018 | Published: 15 Jun 2018
Get This Now


Enabling Single Sign-On Across All Application Types
sponsored by Akamai Technologies
RESOURCE:Explore how businesses are embracing a zero trust security model, and learn what a "verify and never trust" outlook means.
Posted: 15 Jun 2018 | Published: 15 Jun 2018
Get This Now


Is DNS Your Security Achilles Heel?
sponsored by Akamai Technologies
WHITE PAPER:This white paper explains how many attackers take advantage of recursive DNS, which almost every action on the internet relies on. Uncover 6 best practices you can follow to mitigate the risks.
Posted: 19 Sep 2017 | Published: 31 Jul 2017
Get This Now


5 Reasons Enterprises Need a New Access Model
sponsored by Akamai Technologies
WHITE PAPER:As VPNs, proxies, and remote desktops proliferate, businesses need a new way to manage network access to keep this perimeter safe. Learn the top 5 reasons you should consider a new access management model.
Posted: 30 Mar 2017 | Published: 30 Mar 2017
Get This Now


Website & API Security: DDoS & Web Application Threats & Protection
sponsored by Akamai Technologies
VIDEO:Cyberattackers are constantly looking for vulnerable websites and applications. Watch this webcast to discover how to protect your company's mobile devices and applications from DDoS and Web attacks.
Posted: 06 Sep 2017 | Premiered: 28 Jun 2017
Get This Now

TOPICS: 

Leveraging Cloud Security to Weather Threatening Storms: How to Defend Your Perimeter from Today's Outsized Threats
sponsored by Akamai Technologies
WHITE PAPER:With rapid growth and complexity of today’s threats, traditional perimeter defenses are no longer enough to keep pace. This resource explores the current threat environment and how leveraging cloud-based security services can be a proactive and effective means to protecting against ever-evolving, modern day threats.
Posted: 04 Apr 2012 | Published: 04 Apr 2012
Get This Now


Akamai Shields Leading Retailer from Ddos Attacks During Critical Holiday Shopping Period - and Protects $10 Million in Revenues
sponsored by Akamai Technologies
CASE STUDY:In this case study, learn how one online retailer was able to maintain online operations and protect $10 million in revenue by implementing Akamai’s DDoS Defender Security Solution and utilizing Akamai Intelligent Platform to deflect and reflect malicious attacks.
Posted: 04 Apr 2012 | Published: 04 Apr 2012
Get This Now


IDC ROI Paper: Determining the Return on Investment of Web Application Acceleration Managed Services
sponsored by Akamai Technologies
ANALYST REPORT:To assess and quantify the business benefits of Akamai's Web Application Accelerator (WAA), IDC conducted in-depth interviews with IT staff members of eight organizations using WAA. This paper presents the results of that study.
Posted: 02 Apr 2009 | Published: 02 Apr 2009
Get This Now


Akamai's Application Acceleration Services: Transform the Internet into a Business-Ready Application Delivery Platform
sponsored by Akamai Technologies
WHITE PAPER:The Akamai EdgePlatform addresses the root-causes of Internet performance and scale bottlenecks by intelligently placing itself between the end-user and origin data-center as an overlay network to the Internet.
Posted: 13 Feb 2009 | Published: 30 Dec 2008
Get This Now


Avoiding Data Center Costs through Managed Application Delivery Services: Getting the Computing Resources You Need with Minimal Investment
sponsored by Akamai Technologies
WHITE PAPER:In this white paper, Stratecast identifies operating and capital expenses associated with traditional data center options, including private data centers, co-located options, and managed hosting. The cost data will provide a valuable baseline for enterprises to compare against alternatives such as Akamai's dynamic Web acceleration services.
Posted: 09 Feb 2009 | Published: 09 Feb 2009
Get This Now


Think You Have an Application Delivery Strategy?: The Role of Application Delivery Services Within the Enterprise
sponsored by Akamai Technologies
WHITE PAPER:Read this white paper to learn about the importance of network performance in optimizing all IP-based applications as well as web-based applications. Optimizing application traffic flows can only be achieved by subscribing to an Application Delivery Service (ADS) offered by a managed service provider.
Posted: 09 Feb 2009 | Published: 09 Feb 2009
Get This Now


Online Video: The New Merchandising
sponsored by Akamai Technologies
WHITE PAPER:This white paper examines the trends in eCommerce video applications, current customer and eRetailer attitudes, and the challenges to successfully delivering high quality online video into their online merchandising strategy.
Posted: 29 Sep 2008 | Published: 27 Sep 2008
Get This Now


Akamai Insight: Time to Market Matters for Online Video Media
sponsored by Akamai Technologies
WHITE PAPER:Akamai, with Stream OS, provides a streamlined video distribution workflow and a scalable, global distribution platform to get more media to market, faster than ever.
Posted: 20 May 2008 | Published: 01 May 2008
Get This Now


Highly Distributed Computing Is Key to Quality on the HD Web
sponsored by Akamai Technologies
WHITE PAPER:This paper outlines the basic requirements for delivering high-definition (HD) video via broadband and describes how Akamai, through highly distributed computing, is uniquely able to extend the Internet's capacity.
Posted: 07 Mar 2008 | Published: 01 Jan 2007
Get This Now


Retail Website Performance- Consumer Reaction to a Poor Online Shopping Experience
sponsored by Akamai Technologies
WHITE PAPER:Retailers must understand that the online shopper segment is continually maturing and be mindful of how this evolution influences consumers' expectations.
Posted: 07 Mar 2008 | Published: 01 Jun 2006
Get This Now


1 - 25 of 30 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement