All resources sponsored by:

Akamai Technologies

1 - 25 of 36 Matches
Protect your Online Business from Credential Stuffing
sponsored by Akamai Technologies
WHITE PAPER:Explore what credential stuffing is and how it works. Understand this potential threat to your business. Find out how advanced bot management can help you stay ahead of credential stuffing so that you can protect your organization and its critical assets.
Posted: 15 Oct 2018 | Published: 31 Mar 2018
Get This Now


Trends in the Cost of Web Application & Denial of Service Attacks
sponsored by Akamai Technologies
ANALYST REPORT:Based on research from the Ponemon Institute, organizations can face millions of dollars in revenue loss from web application and denial-of-service (DoS) attacks. Read on to learn some of the key findings and trends of these attacks.
Posted: 15 Oct 2018 | Published: 30 Sep 2017
Get This Now


Akamai Cloud Security
sponsored by Akamai Technologies
WHITE PAPER:Learn about Akamai's cloud-based approach to security that leverages 24/7 monitoring to collect and analyze terabytes of attack data, bot requests, and IP addresses to solidify your defenses. Plus, discover 7 keys to reducing your attack surface.
Posted: 12 Oct 2018 | Published: 31 Mar 2018
Get This Now


The 6 Business and Security Benefits of Zero Trust
sponsored by Akamai Technologies
WHITE PAPER:Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Find out how your enterprise can benefit from zero trust, today.
Posted: 06 Aug 2018 | Published: 30 Jun 2018
Get This Now


The Hole in Your Layered Enterprise Security and How to Fix It
sponsored by Akamai Technologies
WHITE PAPER:Even with a layered security strategy, companies are failing to protect their domain name system (DNS) infrastructure. Download this white paper to discover the benefits of integrating a DNS-based platform with layered enterprise and zero-trust security strategies and more.
Posted: 03 Aug 2018 | Published: 18 Jun 2018
Get This Now


Report: Securing the Enterprise Against Cyberattacks
sponsored by Akamai Technologies
ANALYST REPORT:71% of IT and security professionals say they struggle to prevent targeted threats from negatively impacting their enterprise. Read this full Ponemon Institute report to discover top obstacles and security practices as identified by IT and IT security professionals.
Posted: 03 Aug 2018 | Published: 30 Jun 2018
Get This Now


Enforce a Zero Trust Security Model in Today's Hostile Environment
sponsored by Akamai Technologies
WHITE PAPER:Companies are pursuing digital transformation to improve customer value, operate with greater efficiency & agility, & increase innovation. As companies leverage new workflows, security has not kept pace, & cybercriminals are becoming more sophisticated. This white paper describes a security paradigm for today's environment: zero trust.
Posted: 22 Jun 2018 | Published: 22 Jun 2018
Get This Now


8 Steps to Zero Trust
sponsored by Akamai Technologies
RESOURCE:Use this step-by-step guide from Akamai's CTO, Charlie Gero, to build an inclusive & concrete zero trust architecture, to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time & reducing your migration risk profile.
Posted: 22 Jun 2018 | Published: 31 May 2018
Get This Now


Moving Beyond Perimeter Security: A Comprehensive and Achievable Guide to Less Risk
sponsored by Akamai Technologies
WHITE PAPER:A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper to learn how to transition to a perimeter-less world in an incredibly easy way.
Posted: 21 Jun 2018 | Published: 30 Mar 2018
Get This Now


Protecting Your Network from Malware
sponsored by Akamai Technologies
WHITE PAPER:67% of workers use their own devices at work, according to IDC, and it only takes one compromised device to unleash malware that cripples the network or facilitates data exfiltration. Secure your network from vicious malware and most importantly, your data.
Posted: 21 Jun 2018 | Published: 30 Apr 2018
Get This Now


Cybercrime by the Numbers
sponsored by Akamai Technologies
RESOURCE:It's likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today's hyperconnected world.
Posted: 20 Jun 2018 | Published: 20 Jun 2018
Get This Now


Adopt DNS Best Practices to Proactively Protect Against Malware
sponsored by Akamai Technologies
RESOURCE:The cyber threat landscape is dynamic and accelerating. The DNS is a vulnerability in many organizations' defenses that malicious actors are increasingly exploiting. Explore these DNS best practices that can aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Posted: 20 Jun 2018 | Published: 30 Sep 2017
Get This Now


5 Must-Ask DNS Questions
sponsored by Akamai Technologies
WHITE PAPER:Cybercriminals are evolving. They are capitalizing on the open and unprotected nature of the DNS to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are 5 things to ask yourself as you consider a DNS security solution for your company.
Posted: 19 Jun 2018 | Published: 19 Jun 2018
Get This Now


How Securing Recursive DNS Proactively Protects Your Network
sponsored by Akamai Technologies
WHITE PAPER:Security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy, most IT departments still fail to explicitly protect the Domain Name System (DNS). Discover why this Internet protocol doesn't have to be a vulnerability.
Posted: 19 Jun 2018 | Published: 19 Jun 2018
Get This Now


Remote Access Redefined: Managing the Rise of Third-Party Users
sponsored by Akamai Technologies
WHITE PAPER:The explosion of mobile workers and 3rd party users means that organizations may need a new strategy to guarantee secure and convenient access to enterprise applications, whether users are behind-the-firewall or in the cloud. Learn how to tame the problem with a content delivery network service.
Posted: 18 Jun 2018 | Published: 31 Dec 2017
Get This Now


Why Moats and Castles Belong in the Past
sponsored by Akamai Technologies
WHITE PAPER:The moats and castle approach to enterprise security no longer works. Once inside the walls, a person can pretty much do whatever they want. Discover a new way that is simpler, more secure, and a convenient way to protect your enterprise.
Posted: 18 Jun 2018 | Published: 31 May 2017
Get This Now


Remote Access and Security Challenges & Opportunities
sponsored by Akamai Technologies
RESEARCH CONTENT:Remote access is important and growing, but how secure is it? Access this IDC Research Report to find out and learn about the complexity faced in implementing remote access and what happens when companies don't have an access security platform.
Posted: 15 Jun 2018 | Published: 15 Jun 2018
Get This Now


Enabling Single Sign-On Across All Application Types
sponsored by Akamai Technologies
RESOURCE:Explore how businesses are embracing a zero trust security model, and learn what a "verify and never trust" outlook means.
Posted: 15 Jun 2018 | Published: 15 Jun 2018
Get This Now


Is DNS Your Security Achilles Heel?
sponsored by Akamai Technologies
WHITE PAPER:This white paper explains how many attackers take advantage of recursive DNS, which almost every action on the internet relies on. Uncover 6 best practices you can follow to mitigate the risks.
Posted: 19 Sep 2017 | Published: 31 Jul 2017
Get This Now


5 Reasons Enterprises Need a New Access Model
sponsored by Akamai Technologies
WHITE PAPER:As VPNs, proxies, and remote desktops proliferate, businesses need a new way to manage network access to keep this perimeter safe. Learn the top 5 reasons you should consider a new access management model.
Posted: 30 Mar 2017 | Published: 30 Mar 2017
Get This Now


Website & API Security: DDoS & Web Application Threats & Protection
sponsored by Akamai Technologies
VIDEO:Cyberattackers are constantly looking for vulnerable websites and applications. Watch this webcast to discover how to protect your company's mobile devices and applications from DDoS and Web attacks.
Posted: 06 Sep 2017 | Premiered: 28 Jun 2017
Get This Now

TOPICS: 

Leveraging Cloud Security to Weather Threatening Storms: How to Defend Your Perimeter from Today's Outsized Threats
sponsored by Akamai Technologies
WHITE PAPER:With rapid growth and complexity of today’s threats, traditional perimeter defenses are no longer enough to keep pace. This resource explores the current threat environment and how leveraging cloud-based security services can be a proactive and effective means to protecting against ever-evolving, modern day threats.
Posted: 04 Apr 2012 | Published: 04 Apr 2012
Get This Now


Akamai Shields Leading Retailer from Ddos Attacks During Critical Holiday Shopping Period - and Protects $10 Million in Revenues
sponsored by Akamai Technologies
CASE STUDY:In this case study, learn how one online retailer was able to maintain online operations and protect $10 million in revenue by implementing Akamai’s DDoS Defender Security Solution and utilizing Akamai Intelligent Platform to deflect and reflect malicious attacks.
Posted: 04 Apr 2012 | Published: 04 Apr 2012
Get This Now


IDC ROI Paper: Determining the Return on Investment of Web Application Acceleration Managed Services
sponsored by Akamai Technologies
ANALYST REPORT:To assess and quantify the business benefits of Akamai's Web Application Accelerator (WAA), IDC conducted in-depth interviews with IT staff members of eight organizations using WAA. This paper presents the results of that study.
Posted: 02 Apr 2009 | Published: 02 Apr 2009
Get This Now


Akamai's Application Acceleration Services: Transform the Internet into a Business-Ready Application Delivery Platform
sponsored by Akamai Technologies
WHITE PAPER:The Akamai EdgePlatform addresses the root-causes of Internet performance and scale bottlenecks by intelligently placing itself between the end-user and origin data-center as an overlay network to the Internet.
Posted: 13 Feb 2009 | Published: 30 Dec 2008
Get This Now


1 - 25 of 36 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement