ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Akamai Technologies

  • Bot Management Vendors, 2020

    After evaluating 13 vendors on 10 criteria, The Forrester New Wave: Bot Management, Q1 2020 report names Akamai a Leader. The Akamai Intelligent Edge Platform provides unmatched visibility into the ever-changing bot landscape. Download this new report to review and select the right partner for your bot management needs.

  • Customer Identity and Access Management - Deciding Between Build vs Buy

    This webinar explores the pros and cons of in-house CIAM solutions versus commercial CIAM solutions - taking into account changing requirements dictated by resource, technology, innovation, customer experience, security compliance and regulations.

  • [ 2019 ] State of the Internet / Media Under Assault

    In this State of the Internet / Security report, take a look at the sources, techniques, and trends in this growing threat. You’ll see what 98% of web attacks against media and technology sectors have in common. And why video media attracts more credential stuffing attacks than any other vertical.

  • [ 2019 ] State of the Internet / Web Attacks & Gaming Abuse

    Criminals go where the money is. And these days, there’s real money to be stolen in the virtual world of gaming. Download Akamai’s latest State of the Internet / Security report that delves into the growing popularity of credential stuffing attacks against the gaming industry.

  • Business Continuity - What have we learned

    The rapid changes of remote work have unfortunately expanded the attack surface and unforeseen complexity. To adapt to this new normal, organizations must move beyond inherent and static digital trust to adaptive access and threat protection. View this webinar to learn how to get started.

  • Latest Credential Stuffing Attack Campaigns in Asia Pacific

    The wide availability of compromised credentials combined with new sophisticated automated attack techniques have made credential stuffing a risk to many businesses. In this webinar, learn about recent attack patterns and how to defend against them.

  • Phishing Factories and Economies - The Real Persistent Threat

    Sadly, criminals will always leverage current events. Akamai's expert Security Research team has noted dozens of new Coronavirus domains are being deployed each day and we expect this trend to continue. In this presentation, take a deep dive into zero-day phishing detection and how it helps to fight back and reduce the impact of these scams.

  • Customer Story: Priceline Provides Secure Remote Access to Business-Critical Resources and Reduces Access Control Costs

    After a successful proof of concept, Priceline, an online travel agency deployed Akamai Enterprise Application Access to secure their remote users’ access and simplify access management. See what their Principal Server Engineer has to say about their success with Akamai.

  • E-book: Competitive Edge in the Cloud

    Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business aren’t also introducing risks? This e-book explains how Akamai’s cloud delivery platform is designed to make the cloud work for you by extending and enabling your cloud infrastructure.

  • The Forrester Wave™: Web Application Firewalls, Q1 2020

    With web apps and APIs becoming more complex and threats becoming more sophisticated, enterprises are demanding more from web application firewalls (WAFs). Forrester Research evaluated the 10 most significant WAF vendors based on current offering, strategy, and market presence, and named Akamai a WAF Leader.

  • State of the Internet / Security: Financial Services — Hostile Takeover Attempts

    Learn about spikes in credential stuffing attacks against APIs, LFI passing SQLi as a leading web attack vector, and a DDoS attack against one bank that reached an astounding 160 Gbps.

  • Case study: Leading Payments Platforms Leverages Akamai’s World-Class Security

    Learn how Akamai has been able to improve API performance and reduce traffic noise for CashFlows, a fast-growing, innovative provider of merchant payment solutions.

  • Analyst Report of Bot Management Providers, Q1 2020

    After evaluating 13 vendors on 10 criteria, The Forrester New Wave: Bot Management, Q1 2020 has named Akamai as a leader. Download the report to see how the other bot management providers stack up.

  • How to Guide: Zero Trust Security Transformation

    The notion of a network perimeter can’t be relied on in today’s business landscape. A strategic security framework is needed, but Zero Trust cannot be adopted overnight. Download this guide to zero trust security for an understanding of what it is and why it’s important for organizations to implement today.

  • Application Access Redefined: Managing the Modern Workforce Application

    Many businesses across the globe are experiencing a sudden increase in remote users. But traditional VPN setups simply weren't scoped for so many off-site workers. Read this paper to understand the modern workforce's access requirements, the limits of traditional access technologies, and zero-trust access best practices.

  • The Eight Business And Security Benefits Of Zero Trust

    Zero Trust networks accomplish the dual tasks of deep, continuous data inspection across the network and lean operation and oversight - tasks that seem mutually exclusive in traditional networks. This report highlights the eight most significant ways Zero Trust boosts security and your business.

  • Analyst Report of Bot Management Providers, Q1 2020

    After evaluating 13 vendors on 10 criteria, The Forrester New Wave: Bot Management, Q1 2020 has named the leaders, strong performers, contenders, and challengers. Download the report to see how the bot management providers stack up.

  • Beyond SD-WAN: Zero Trust Security and the Internet as Corporate WAN

    Read this white paper to learn why Internet is the corporate WAN of the near future, and how enabling safe traffic to go straight to the Internet, blocking bad traffic, and only proxying risky traffic, delivers simplified security, lower latency and better performance, fewer broken web pages and applications.

  • Digital Identity Security Assurance: How to Keep Your Customer Data Secure

    Customer identities are among the most critical and valuable assets of any organization. Failing to provide adequate security can result in financial, reputational, and even legal consequences. This paper highlights industry best practices for building customer trust through comprehensive security programs. Read on to learn more.

  • Intelligent Security Starts at the Edge

    In Gartner’s most recent Magic Quadrant installment for Web Application Firewalls (WAF), they named Akamai a Leader for the third year in a row. This white paper provides an overview of the benefits of WAF, and highlights Akamai’s approach to WAF. Read on to get started.

  • State of the Internet Security: A Year in Review

    As the end of 2019 draws near, you can look back and examine the research Akamai has done over the last 12 months. Download the State of the Internet Security report to see the impact various attacks had on organizations in 2019 and how you can prep for 2020.

  • Build a Data Privacy Organization That Balances Marketing Innovation And Customer Expectations

    How companies handle and protect consumer data privacy is more than a compliance issue: It’s a competitive differentiator. Download this Forrester report to explore the capabilities you need to build a comprehensive consumer data privacy program, with an emphasis on the roles that marketing and business strategy leaders must play.

  • Security Starts at the Edge

    Whether you’re a leader of a large enterprise or a smaller business, part of your ongoing security, risk management, and compliance strategy will be sourcing the most effective security solution for your business. In this guide, for learn how you can find the right solution for your business to scale resilience, build trust, and drive revenue.

  • How to Guide: Zero Trust Security Transformation

    The notion of a network perimeter can't be relied on in today's business landscape. A strategic security framework is needed. Download this guide to zero trust security for an understanding of what it is and why it's important for organizations to implement today.

  • Everything You Always Wanted to Know About Security at the Edge, But Were Afraid to Ask

    There used to be a constant immovable security perimeter but, the perimeter as we know it is dissolving. Now, organizations need to protect everything inside their data center by deploying security at the edge. In this white paper, learn everything you need to know about employing an edge security strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.