Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

Akamai Executive Summary: 2020 Gartner Magic Quadrant for Web Application Firewalls

For the fourth year in a row, Gartner has named Akamai a Leader in the 2020 Magic Quadrant Leader for web application firewalls (WAFs). This important report cites several strengths that we believe are a direct result of our differentiated offerings: Akamai WAFs are built on the Akamai Intelligent Edge Platform. This gives us the unmatched visibility and scale to enable accurate, predictive WAF protection for websites, apps, and APIs — whether they’re in the data center or the cloud — anywhere in the world. The full report features evaluations of 10 WAF vendors. Read it now with our compliments.

Getting Started with SASE On-demand Webinar: A Conversation About SASE and Network Security Frameworks

In this on-demand webinar, Akamai CTO Patrick Sullivan and former Gartner Analyst, now Akamai Director of Security Strategy, Siddharth Deshpande discuss secure access service edge (SASE). This cybersecurity model merges the functions of network and security point solutions into a unified, global cloud-native service.

Making a DDoS Protection Plan: 8 Best Practices

DDoS attackers launch hundreds of DDoS attacks every day. And when a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, whom to call or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared are your best defense against DDoS attacks.

State of the Internet / Security: 2020 – A Year in Review

Internet traffic surged in 2020 and criminals took advantage, using their time at home to change the threat landscape forever. There were huge jumps in credential stuffing, web application, DDoS, phishing — just about every type of attack Akamai tracks. DDoS extortion came of age, with its potential to cripple businesses that refused to pay up. Also, playing on people’s boredom, an age-old phishing tactic snagged 5 million victims. Review the security stories that shaped a year like no other, and how they’re likely to change the security landscape for years to come. Download our new report now.

The Forrester Total Economic Impact™ of Akamai Security Products

How can you meet the challenge to quantify the cost savings and business benefits of Akamai security products? To answer this question, Akamai commissioned Forrester Consulting to conduct a study in which they interviewed or surveyed 35 Akamai customers to develop both a study and a tool. The study uses the data to show how a composite, global, enterprise-sized organization — with $1.5 billion in revenue — will see almost $6 million in economic benefits over three years. The tool lets you simulate the same study, but with your own inputs. You receive a Total Economic Impact™ report customized for your organization.

8 Steps to Zero Trust

Use this step-by-step guide from Akamai’s CTO, Charlie Gero, to build an inclusive and concrete zero trust architecture, intended to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time and reducing your migration risk profile.

5 Must-Ask DNS Questions

Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.

5 Reasons Enterprises Need a New Access Model

Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.

8 Steps to Zero Trust

Use this step-by-step guide from Akamai’s CTO, Charlie Gero, to build an inclusive and concrete zero trust architecture, intended to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time and reducing your migration risk profile.

Adopt DNS Best Practices to Proactively Protect Against Malware

The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.

Load More
Popular Resources