Your Search returned 113 results from our White Paper Library

Newakamai 125x100 150x150

Security

Enforce a Zero Trust Security Model in Today's Hostile Environment

Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as...

Newakamai 125x100 150x150

Security

Remote Access and Security Challenges & Opportunities

Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and...

Newakamai 125x100 150x150

Security

8 Steps to Zero Trust

Use this step-by-step guide from Akamai’s CTO, Charlie Gero, to build an inclusive and concrete zero trust architecture, intended to help enable safe application...

Newakamai 125x100 150x150

Security

Adopt DNS Best Practices to Proactively Protect Against Malware

The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are...

Newakamai 125x100 150x150

Security

How Securing Recursive DNS Proactively Protects Your Network

Security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder...

Newakamai 125x100 150x150

Security

5 Reasons Enterprises Need a New Access Model

Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing...

Default image

Unlock revenue opportunities with new security and personalization services

This white paper offers the latest perspective on threats consumers and small business face and discusses new network-based security and personalization solutions....

Default image

Security-as-a-Service in the Carrier Cloud: How CSPs Can Capture the SMB Opportunity

This white paper examines the potential business opportunities associated with cloud-based SECaaS for SMB customers, as well as the technical and architectural considerations...

Default image

An End to End Solution for Small Business Security

This white paper explains how CSPs are well positioned to deliver cloud-based security solutions that are inherently biased toward their deployment and operating...

Newakamai 125x100 150x150

Cloud Computing

Akamai Cloud Security Solutions

Protect your organization, customers, and employees from ever evolving cyber threats with Akamai’s cloud security solutions. Via 24/7 monitoring, we collect and...

123571112

Recommended for You

New research: Global IT feels the strain of lockdown

Kathryn Cave looks at the big trends in global tech

A look at how COVID-19 is impacting web traffic

Patrick Martlew’s in-depth breakdown of the B2B tech sphere

How technology can help mental health in the workplace

Nic Fearn on the technology that aims to drive positive change in the world

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generation needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Research

Our in-house analyst and editorial team create a range of insights for the global B2B technology community. These look at the latest IT trends and other zeitgeist topics.

images

Poll

Do you think your smartphone is making you a workaholic?