hit

Results 251 - 275 of 8062Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Nov 02, 2018
What to expect and how to prepare your best defense DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 13, 2018
Recent high-profile data breaches and numerous waves of widely publicised internet attacks have made everyone nervous about security. Families, small businesses and other organisations are struggling to figure out how to protect themselves.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 13, 2018
Competitive pressures from peers are forcing CSPs to evolve beyond connectivity and offer incremental valueadded services to sustain revenue growth. Security services are an obvious candidate for consideration since awareness of the need for security protections is extremely high due to regular media coverage highlighting Internet exploits. Threat trends and strong alignment with large customer segments are creating opportunity for CSPs to offer a foundational layer of web protection for every Internet access connection. They can provide a previously unavailable level of web security that reduces the risk their customers face, without imposing a configuration or management burden.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 14, 2018
Delivering a hit PC game isn’t easy. You’ve got to worry about frictions like slow downloads, unstable connections, and security flaws — any of which can cause players to abandon for good and doom your game to failure. Akamai’s Quick Start Guide: Global Game Launch, PC Edition can take some of the complexity— and anxiety— out of your next game launch. You’ll learn how Akamai can help you succeed at each of the four key steps of game release — Develop, Promote, Deliver, and Play — so you can keep your players engaged with a seamless, secure game experience.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Use this step-by-step guide from Akamai’s CTO, Charlie Gero, to build an inclusive and concrete zero trust architecture, intended to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time and reducing your migration risk profile.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 07, 2019
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 02, 2019
Customer identity and access management (CIAM) is increasingly important for brands to deliver the seamless, secure digital experiences demanded by empowered consumers. As part of its Identity and Access Management Playbook, Forrester Research provides guidance to build a customer-obsessed IAM team that has the technical skills, business influence, and interpersonal attributes to architect a CIAM strategy and roll it out across functional groups. Read the full report to learn critical considerations to make your CIAM team effective. Report highlights: ? Four essential roles for your CIAM team ? Why sharing and integrating customer data across organization barriers is critical for success ? The most important technical, business, and interpersonal skills to look for in CIAM candidates
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 25, 2019
Treue- und Prämienprogramme sind effektive Mittel, mit denen Marken die Interaktion, Akquise und Treue von Mitgliedern steigern können. Erfahren Sie, warum führende Marken auf moderne CIAM-Lösungen (Customer Identity and Access Management) setzen und damit ihre Treueprogramme skalieren, das Nutzererlebnis verbessern und den ROI maximieren. In diesem Whitepaper erfahren Sie, welche Herausforderungen Sie bei der Transformation, Erweiterung und Skalierung von Kundenbindungs- und Prämienprogrammen und damit verbundenen Mitgliedschaftsinitiativen meistern müssen. Darüber hinaus stellen wir Ihnen Lösungen vor, die auf tiefgehenden Einblicken in vier praxisnahe Fallstudien basieren. Wir untersuchen die Anforderungen an eine unternehmensweite CIAM-Lösung und sprechen verwandte Themen wie „Entwicklung oder Kauf“ und „CIAM vs. IAM“ an. Anhand von vier verschiedenen Fallstudien – und den daraus resultierenden Identitätsmanagement-Lösungen, die durch das jeweilige Unternehmen implementiert wurde
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 25, 2019
Heutzutage zählen die Identität der Kunden und die damit verbundenen persönlichen Daten zu den wichtigsten und wertvollsten Ressourcen jedes Unternehmens. Die Verwaltung dieser digitalen Identitäten (von der ersten Registrierung und Anmeldung bis zu den späteren Phasen der Kundenbeziehung) und die Verwertung der dazugehörigen Daten sind komplexe Aufgaben, die häufig als CIAM (Customer Identity and Access Management) bezeichnet werden. Wenn Unternehmen ein System zur Erfassung, Verwaltung und Nutzung von Daten zu digitalen Identitäten und Kunden implementieren, haben sie grundsätzlich zwei Möglichkeiten: Sie können ein eigenes Produkt entwickeln oder eine dedizierte Lösung von einem auf CIAM spezialisierten Anbieter kaufen. In diesem Whitepaper finden Sie eine detaillierte Analyse der CIAM-Implementierungsoptionen, darunter Folgendes: ? die wichtigsten Voraussetzungen für ein erfolgreiches CIAM-System für Unternehmen ? Vor- und Nachteile verschiedener Varianten der CIAM-Implementierun
Tags : 
    
Akamai Technologies
Published By: AKS-Labs     Published Date: Mar 20, 2007
Business professionals lack essential information about real-life metrics and information on how to build a Balanced Scorecard, which supports weights and scores, which allows calculating the performance values. This whitepaper is a Balanced Scorecard design toolkit, which contains some "how-to" ideas.
Tags : 
balanced scorecard, business analytics, business metrics, business intelligence, business integration, customer satisfaction, enterprise resource planning, scorecard, aks-labs, aks labs
    
AKS-Labs
Published By: Alacritech     Published Date: Aug 21, 2009
IP storage using Internet SCSI (iSCSI) provides opportunity for many organizations looking to extend existing Fibre Channel SANs to stranded servers, or looking to deploy Ethernet-based SANs. It can reduce costs by allowing IT managers to take advantage of existing, familiar Ethernet networks. Often the biggest complaint white new technology like iSCSI is its ability to provide more than simple functionality and connectivity.
Tags : 
internet scsi, ip storage, ip networks, fiber channel, fibre channel, san, storage area networks, iscsi, alacritech
    
Alacritech
Published By: Aladdin     Published Date: Aug 21, 2009
This in-depth 14-page white paper explains all available anti-spam techniques and how they are used by eSafe. It also includes a "Dare to Compare" competitive matrix for easy vendor/solution selection.
Tags : 
spam, anti-spam, anti spam, comparison guide, comparison chart, comparison table, email security, anti-spam software, aladdin
    
Aladdin
Published By: Aladdin     Published Date: Aug 21, 2009
In this Aladdin white paper you will discover an overview of spyware, security threats seen with spyware, the technical underpinnings to spyware, the technology challenges inherent in trying to block spyware, and spyware's legal issues.
Tags : 
spyware, malware, antispyware, anti-spyware, anti spyware, email security, aladdin
    
Aladdin
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
In the same way, the WLAN seems to be demanding more of our attention these days. IT teams are spending an increasing amount of time managing, configuring and troubleshooting to accommodate a growing number of devices and apps, and to meet user demands for ever-faster speeds and better coverage.
Tags : 
it teams, wlan, intelligent architecture, unified network, security management, iot onboarding
    
Alcatel Lucent Enterprise
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
More agile and mobile ways of working need more agile and flexible networks. Wave 2 Wi-Fi, powered by ALE, delivers the capabilities needed to create future-ready organizations. Alcatel-Lucent OmniAccess® Stellar WLAN is optimized for Wave 2 infrastructures, with a distributed intelligence architecture, simplified management and support.
Tags : 
performance, iot readiness, simplicity, user centricity, analytics capability, unified management
    
Alcatel Lucent Enterprise
Published By: Alcatel-Lucent     Published Date: Sep 29, 2015
Read more to learn how a Virtualized Residential Gateway is driving the delivery of enhanced residential services. This paper reviews the market drivers, evolved architecture model, benefits and capabilities (for each building block) of the vRGW solution.
Tags : 
alcatel lucent, vrgw, broadband, broadband access network, service delivery, service delivery architecture, residential gateway
    
Alcatel-Lucent
Published By: Alcatel-Lucent     Published Date: Oct 22, 2015
A business rationale paper for multiple system operators (MSOs)
Tags : 
alcatel lucent, vrgw, broadband, broadband access network, service delivery, service delivery architecture, residential gateway
    
Alcatel-Lucent
Published By: Alcatel-Lucent     Published Date: Dec 02, 2013
The question that businesses need to ask themselves is, “Is my data center designed for yesterday’s technology, or tomorrow’s?”. This whitepaper will help you find the answer.
Tags : 
data center, data centre, data center optimization, alcatel lucent, alcatel, lucent, qos, server farm, qos, smart network, smarter network, servers, blades, cloud
    
Alcatel-Lucent
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.