Your Search returned 121 results from our White Paper Library

Security

Security Starts at the Edge: The 2019 Security Buyer's Guide

Security is the foundation of success to any digital business. But security-related interruptions do happen, and can have far-reaching consequences such as losing...

Security

Application Access Redefined: Managing the Modern Workforce

Many businesses across the globe are experiencing a sudden increase in remote users. But traditional VPN setups simply weren’t scoped for so many off-site workers....

Security

Intelligent Security Starts at the Edge: Akamai Recognized in the Gartner 2019 Magic Quadrant for Web Application Firewalls

It’s an invaluable resource for enterprise security professionals who need to improve security while maintaining application performance. According to Gartner, “by...

Security

State of the Internet/Security: 2019 - A Year in Review

2019 was a big year in security. While major media made headlines out of Facebook breaches and ransomware attacks, security professionals worked behind the scenes...

Security

The Forrester New WaveTM: Bot Management, Q1 2020

After evaluating 13 vendors on 10 criteria, The Forrester New Wave™: Bot Management, Q1 2020 report names Akamai a Leader.

Security

Forrester: Build A Data Privacy Organization That Balances Marketing Innovation And Customer Expectations

How companies handle and protect consumer data privacy is more than a compliance issue: It’s a competitive differentiator. as a result, firms need to develop a cohesive...

Newakamai 125x100 150x150

Security

Everything You Always Wanted to Know About Security at the Edge, But Were Afraid to Ask

Whether your organization is adapting to the shifting nature of the perimeter or endeavoring to protect evolving public-facing applications, the solution lies at...

Newakamai 125x100 150x150

Security

Understanding Your Credential Stuffing Attack Surface

Your ability to mitigate credential stuffing attacks will depend on more than the bot management vendor or solution you select. In fact, your website architecture...

Newakamai 125x100 150x150

Security

Competitive Edge in the Cloud

Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business aren’t also...

Newakamai 125x100 150x150

Security

Everything You Always Wanted to Know About Security at the Edge, But Were Afraid to Ask.

Whether your organization is adapting to the shifting nature of the perimeter or endeavoring to protect evolving public-facing applications, the solution lies at...

Previous12451213

Recommended for You

New report: Lockdown and the IT department

Kathryn Cave looks at the big trends in global tech

How CIOs manage cloud lock-in

Mark Chillingworth on IT leadership

How assistive technologies are transforming the lives of disabled people

Nic Fearn on the technology that aims to drive positive change in the world

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generation needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Research

Our in-house analyst and editorial team create a range of insights for the global B2B technology community. These look at the latest IT trends and other zeitgeist topics.

images

Poll

Do you think your smartphone is making you a workaholic?