Your Search returned 124 results from our White Paper Library

Newakamai 125x100 150x150

Security

Understanding Your Credential Stuffing Attack Surface

Your ability to mitigate credential stuffing attacks will depend on more than the bot management vendor or solution you select. In fact, your website architecture...

Newakamai 125x100 150x150

Security

The Forrester New Wave™: Bot Management, Q3 2018

The Forrester New Wave™: Bot Management, Q3 2018 Forrester has released the results of its research evaluating bot management vendors on a number of important criteria,...

Newakamai 125x100 150x150

Security

Competitive Edge in the Cloud

Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business aren’t also...

Newakamai 125x100 150x150

Security

Everything You Always Wanted to Know About Security at the Edge, But Were Afraid to Ask.

Whether your organization is adapting to the shifting nature of the perimeter or endeavoring to protect evolving public-facing applications, the solution lies at...

Newakamai 125x100 150x150

Security

7 Reasons You Need Security at the Edge

In today’s complex and constantly changing digital ecosystem, you need an adaptive, intelligent security-at-the-edge strategy designed to reduce your attack surface...

Newakamai 125x100 150x150

Security

State of the Internet / Security | Retail Attacks and API Traffic

Security teams are increasingly becoming an integral part of business, and more vital than ever to success. One of the more important factors for a security team...

Newakamai 125x100 150x150

Security

Mitigating DDoS Attacks in Zero Seconds with Proactive Mitigation Controls

Akamai has been detecting and successfully mitigating DDoS attacks in an industry-leading SLA for 15 years. We will illustrate how Akamai continues to lead the industry...

Newakamai 125x100 150x150

Security

Advancing Digital Maturity in Financial Services

Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect...

Newakamai 125x100 150x150

Cloud Computing

Protect Your Online Business From Credential Stuffing

This eBook explains the threat of credential stuffing, how bots vary in sophistication, and how that affects bot detection and management technology required to...

Newakamai 125x100 150x150

Security

Competitive Edge in the Cloud

Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business aren’t also...

Previous 1 3 4 5 12 13

Recommended for You

Future-proofing the Middle East

Keri Allan looks at the latest trends and technologies

FinancialForce profits from PSA investment

Martin Veitch's inside track on today’s tech trends

Amazon Cloud looms over China: Bezos enters Alibaba home ground

Lewis Page gets down to business across global tech

Poll

Do you think your smartphone is making you a workaholic?