Your Search returned 113 results from our White Paper Library

Newakamai 125x100 150x150

Security

8 Steps To Making A DDoS Protection Plan

DDoS attackers launch hundreds of DDoS attacks every day. And when a DDoS attack strikes an organization, panic is common. No one knows why systems and applications...

Newakamai 125x100 150x150

Security

Gartner Magic Quadrant for Web Application Firewalls

Akamai was named a Leader in Gartner’s 2018 Magic Quadrant for Web Application Firewalls (WAFs) for the second year in a row. Gartner estimates that "by 2023, more...

Newakamai 125x100 150x150

Security

Top 10 Considerations for Bot Management

Bots are responsible for 30% to 70% of website traffic. They have many purposes, range from good to middling to bad, and from simple to sophisticated. Bot management...

Newakamai 125x100 150x150

Security

An End to End Solution for Small Business Security

This white paper explains how CSPs are well positioned to deliver cloud-based security solutions that are inherently biased toward their deployment and operating...

Newakamai 125x100 150x150

Security

Unlock revenue opportunities with new security and personalization services

This white paper offers the latest perspective on threats consumers and small business face and discusses new network-based security and personalization solutions....

Newakamai 125x100 150x150

Security

Security-as-a-Service in the Carrier Cloud: How CSPs Can Capture the SMB Opportunity

This white paper examines the potential business opportunities associated with cloud-based SECaaS for SMB customers, as well as the technical and architectural considerations...

Newakamai 125x100 150x150

Security

Competitive Edge in the Cloud

Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business aren’t also...

Newakamai 125x100 150x150

Security

The IT Digital Maturity Handbook

According to Forrester, the right engagement model can help companies achieve double-digit growth. Simply put, establishing trust through differentiated and secure...

Newakamai 125x100 150x150

Security

The Cost of Credential Stuffing: Asia-Pacific

Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet...

Newakamai 125x100 150x150

Security

Understanding Your Credential Stuffing Attack Surface

Your ability to mitigate credential stuffing attacks will depend on more than the bot management vendor or solution you select. In fact, your website architecture...

1351112

Recommended for You

New research: Global IT feels the strain of lockdown

Kathryn Cave looks at the big trends in global tech

A look at how COVID-19 is impacting web traffic

Patrick Martlew’s in-depth breakdown of the B2B tech sphere

How technology can help mental health in the workplace

Nic Fearn on the technology that aims to drive positive change in the world

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generation needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Research

Our in-house analyst and editorial team create a range of insights for the global B2B technology community. These look at the latest IT trends and other zeitgeist topics.

images

Poll

Do you think your smartphone is making you a workaholic?