Your Search returned 95 results from our White Paper Library

Newakamai 125x100 150x150

Security

Ponemon Institute: The Cost of Credential Stuffing

Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet...

Newakamai 125x100 150x150

Security

8 Steps To Making A DDoS Protection Plan

DDoS attackers launch hundreds of DDoS attacks every day. And when a DDoS attack strikes an organization, panic is common. No one knows why systems and applications...

Newakamai 125x100 150x150

Security

Gartner Magic Quadrant for Web Application Firewalls

Akamai was named a Leader in Gartner’s 2018 Magic Quadrant for Web Application Firewalls (WAFs) for the second year in a row. Gartner estimates that "by 2023, more...

Newakamai 125x100 150x150

Security

Top 10 Considerations for Bot Management

Bots are responsible for 30% to 70% of website traffic. They have many purposes, range from good to middling to bad, and from simple to sophisticated. Bot management...

Newakamai 125x100 150x150

Security

An End to End Solution for Small Business Security

This white paper explains how CSPs are well positioned to deliver cloud-based security solutions that are inherently biased toward their deployment and operating...

Newakamai 125x100 150x150

Security

Unlock revenue opportunities with new security and personalization services

This white paper offers the latest perspective on threats consumers and small business face and discusses new network-based security and personalization solutions....

Newakamai 125x100 150x150

Security

Security-as-a-Service in the Carrier Cloud: How CSPs Can Capture the SMB Opportunity

This white paper examines the potential business opportunities associated with cloud-based SECaaS for SMB customers, as well as the technical and architectural considerations...

Newakamai 125x100 150x150

Security

Competitive Edge in the Cloud

Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business aren’t also...

Newakamai 125x100 150x150

Security

The Cost of Credential Stuffing: Asia-Pacific

Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet...

Newakamai 125x100 150x150

Security

Understanding Your Credential Stuffing Attack Surface

Your ability to mitigate credential stuffing attacks will depend on more than the bot management vendor or solution you select. In fact, your website architecture...

Previous 1 3 4 5 9 10

Recommended for You

International Women's Day: We've come a long way, but there's still an awfully long way to go

Charlotte Trueman takes a diverse look at today’s tech landscape.

Trump's trade war and the FANG bubble: Good news for Latin America?

Lewis Page gets down to business across global tech

20 Red-Hot, Pre-IPO companies to watch in 2019 B2B tech - Part 1

Martin Veitch's inside track on today’s tech trends

Poll

Do you think your smartphone is making you a workaholic?