Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

Viewpoint | Presented by QTS

7 Considerations When Selecting a Data Center Provider in Chicago

This white paper provides an in-depth look at key considerations to keep in mind when selecting a data center provider in Chicago. It looks at how a data center provider with a global footprint can offer you access to comprehensive data solutions, and help you meet your data needs today and in the future. This can be used as a checklist for evaluating a data center provider against competitors.

A Data Culture with Embedded Analytics in Action

Join our webinar Thursday, Oct. 20th to learn how our customer, Casper, an online mattress retailer, made the switch from a transactional database to Looker's data analytics program on Amazon Redshift. Looker on Amazon Redshift can help you greatly reduce your analytics lifecycle with a simplified infrastructure and rapid cloud scaling.

Akamai Cloud Security Solutions

Akamai makes online business fast, reliable and secure. We earned our global reputation by building the world's fastest and largest cloud-enabled delivery platform, which is backed by the most scalable, distributed security solution available. Learn about the security solutions that help protect companies in every industry be secure online.

Akamai Enterprise Web Security Solution Center

Users expect the online experience to be always available and always secure - and for their personal and business assets to be safe. As more data and business processes move online, organizations are challenged to protect websites and infrastructure without sacrificing performance for security. Akamai brings content close to users by extending the security perimeter to the cloud to help protect against web and data center attacks.

Big Data on The Move: IoT and Connected Vehicles

Using big data to gain insights about your business and your customers is becoming more common these days. But using big data to create actionable insights from how trucks perform under a variety of weather conditions, to spotting engine troubles well before the vehicles break down?

Bot Management Across Your Business

Before you can apply a bot management solution, you have to understand the security and performance problems they cause in different areas of your organization. This video explains the crucial first step to bot management: discovering the differing solution requirements of the varied stakeholders affected by bot traffic.

Case Study: 362 Gbps DDoS Attack

On June 20, Akamai Technologies mitigated one the largest confirmed Distributed Denial-of-Service (DDoS) attacks of the year. Read the case study to learn more about the attack, including payload samples and sources.

Case Study: xss Exploitation through Remote Resource Injection

Akamai's Threat Research team analyzed a week of cross-site scripting (xss) alert triggers to gain clarity on the nature of xss attacks. Read this case study to learn which vectors are vulnerable and specific techniques that were employed during remote resource injection exploitation attempts versus simple probing requests.

Compare Approaches for Web, DNS, and Infrastructure Security

How do you choose the best cloud security solution? Denial of service, data breaches, and SQL injection attacks are growing faster than on-premises firewalls can scale-you need a cloud-based security solution to meet the threat. Learn about the various solutions and techniques for web, DNS, and infrastructure security.

Critical Steps and Best Practices for Making DDoS Mitigation Part of Your Incident Response Plan

When a DDoS attack cripples or brings down a site or other application, knowing whom to call first and how to marshal the required resources for mitigation can make the difference between organization-wide panic and a calm, orderly response. Read this paper to learn best practices for making DDoS Mitigation part of your incident response plan.

Load More