net

Results 201 - 225 of 7688Sort Results By: Published Date | Title | Company Name

Erfüllen Sie die heutigen Anforderungen im Mobilbereich?

Published By: Akamai Technologies     Published Date: May 24, 2017
Nutzer von Mobilgeräten sind heutzutage verwöhnt. Sie erwarten, dass ihnen ansprechende Inhalte blitzschnell und optimiert auf ihrem Mobilgerät bereitgestellt werden – und das noch in der gleichen Qualität wie auf dem Desktop-PC. Einerseits stellen diese permanent mit dem Internet verbundenen Nutzer eine hervorragende Geschäftschance dar. Andererseits müssen Unternehmen komplexe Herausforderungen meistern, um solch hohen Nutzererwartungen bei der mobilen Bereitstellung gerecht zu werden. In diesem E-Book werden wir drei dieser Herausforderungen näher beleuchten und Wege aufzeigen, wie Sie diese durch Optimierungen für schnelle APIs, Apps und mobile Websites meistern. So lassen sich Umsätze sowie die Kundeninteraktion und Kundenbindung steigern. Laden Sie das E-Book heute noch herunter, um zu erfahren, wie Ihr Unternehmen die heutigen Anforderungen im Mobilbereich erfüllen kann.
Tags : 
    
Akamai Technologies

Ein überzeugendes App-Erlebnis

Published By: Akamai Technologies     Published Date: May 24, 2017
Apps sind auf dem Vormarsch: Bei der Nutzung mobiler Geräte entfallen 85 % der Zeit auf Apps. Der App-Markt ist jedoch extrem umkämpft und 20 % der heruntergeladenen Apps werden nur ein einziges Mal geöffnet. Wie können Sie Ihre App von der massenhaften Konkurrenz abheben? Der Schlüssel zum Erfolg ist die Performance. Laden Sie diese Infografik herunter. Darin erfahren Sie, worauf es ankommt, um sich in den komplexen App-Umgebungen behaupten zu können, und wie Sie Nutzer mit schnellen, interaktiven Apps überzeugen.
Tags : 
    
Akamai Technologies

Remote Access Redefined: Managing the Rise of Third-Party Users

Published By: Akamai Technologies     Published Date: Jun 27, 2017
Read this white paper to learn how the rapid rise of remote and third-party users has created increased complexities for IT around network security and user expectations.
Tags : 
    
Akamai Technologies

5 Must-Ask DNS Questions

Published By: Akamai Technologies     Published Date: Aug 11, 2017
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies

4 Facts About APIs: The Hidden Technology Powering the Internet

Published By: Akamai Technologies     Published Date: Aug 17, 2017
APIs are the unseen language of the Internet. They power digital transformation across industries by allowing applications to talk to one another and operate as crucial backend services to websites and mobile apps. As a dynamic and somewhat hidden technology, it can be challenging to find detailed information about the API space. We combined findings from our recent API survey of business leaders from over 400 leading technology companies with industry data to compile four need to know facts about APIs.
Tags : 
api, mobile app, technology, backend service
    
Akamai Technologies

Security and Frontend Performance: Breaking the Conundrum

Published By: Akamai Technologies     Published Date: Aug 17, 2017
More often than not, performance and security are thought of as two separate issues that require two separate solutions. This is mainly due to the implications posed behind various performance and security products. We typically have either security solutions or performance solutions, but rarely solutions that offer both. As technology has advanced, so have our attackers, finding newer and better ways to impact both the performance and security of a site. With this in mind, it has become even more critical to come up with solutions that bridge the gap between security and performance. But how do we do that? We need to shift the focus to what we can do at the browser by leveraging various frontend techniques, such as web linking and obfuscation, versus solely relying upon the capabilities of a content delivery network (CDN) or the origin. We can take advantage of all the new and emerging frontend technologies to help provide a secure and optimal experience for users—all starting at the
Tags : 
frontend performance, security, technology, content delivery, web linking
    
Akamai Technologies

4 VIER FAKTEN ZU APIs

Published By: Akamai Technologies     Published Date: Aug 17, 2017
APIs sind die verborgene Sprache des Internets. Sie bilden die Grundlage für die digitale Transformation vieler Branchen, indem sie es Anwendungen ermöglichen, miteinander zu kommunizieren und als Backend-Services für Websites und Apps zu fungieren. Da es sich um eine dynamische Technologie handelt, die im Hintergrund arbeitet, ist es schwierig, detaillierte Informationen zur API-Landschaft zu finden. Auf Basis von Erkenntnissen unserer neuesten API-Umfrage unter 400 führenden Technologieunternehmen sowie umfassenden Branchendaten haben wir vier essenzielle Fakten zu APIs herausgearbeitet.
Tags : 
    
Akamai Technologies

Die volle App-Performance nutzen

Published By: Akamai Technologies     Published Date: Aug 17, 2017
Dem sprunghaften Anstieg von Mobilgeräten in den letzten Jahren ist es zu verdanken, dass Apps für Unternehmen zu einem der wichtigsten Kanäle geworden sind, über den sie mit ihren treuesten und wertvollsten Kunden kommunizieren. Wenn Konsumenten mobile Geräte nutzen, verbringen sie 85% der Zeit mit Apps1, und mittlerweile ziehen moderne Nutzer Apps sogar dem Fernsehen vor.2 Obwohl die Verwendung von Apps in den vergangenen zwei Jahren um über 60% zugenommen hat, ist die Anzahl der Apps, mit denen jeder Nutzer interagiert, mit ungefähr 27 pro Monat vergleichsweise stabil geblieben.3 Nutzer wünschen sich also kaum neue Apps, interagieren aber stark mit den bereits genutzten. Das mobile Internet vergrößert also die Reichweite von Unternehmen, und Apps sind eine leistungsstarke Verbindung zu ihren besten Kunden.4 Nutzer, denen das Unternehmen wichtig genug ist, um dessen App herunterzuladen und zu installieren, sind die motivierteste Zielgruppe und die treuesten Fans.
Tags : 
    
Akamai Technologies

ERFÜLLEN SIE DIE HEUTIGEN ANFORDERUNGEN IM MOBILBEREICH?

Published By: Akamai Technologies     Published Date: Aug 17, 2017
DANK DER RASANTEN ANPASSUNG DES INTERNETS AN MOBILE ANFORDERUNGEN erhalten Mobilnutzer heutzutage jederzeit und überall nahezu uneingeschränkten Zugriff auf Daten und Informationen. Nutzer, die permanent mit dem Internet verbunden sind, bieten Unternehmen eine hervorragende Möglichkeit, ihre Umsätze sowie die Kundeninteraktion und Kundenbindung zu steigern. Gleichzeitig ergeben sich dadurch jedoch völlig neue Herausforderungen bei der Bereitstellung mobiler Inhalte. In diesem E-Book werden wir diese Herausforderungen näher beleuchten und Wege aufzeigen, wie Sie diese durch Optimierungen für schnelle APIs, mobile Anwendungen und mobile Websites meistern. Hätten Sie das gedacht?
Tags : 
    
Akamai Technologies

7 Critical Considerations for Choosing a Cloud Security Provider

Published By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : 
cloud security, scale, data center, ddos
    
Akamai Technologies

How the Mirai Botnet is Fueling Today's Largest and Most Crippling Attacks

Published By: Akamai Technologies     Published Date: Aug 17, 2017
The largest DDoS attacks have increased greatly in strength, doubling in attack size during 2016. They are bigger, more complex, and require more expertise to defend against than past Distributed Denial-of-Service (DDoS) attacks. They are not limited to a specific industry.
Tags : 
mira botnet, cyber attack, ddos, security
    
Akamai Technologies

7 Sieben wichtige Überlegungen bei der Wahl eines Cloudsicherheitsanbieters

Published By: Akamai Technologies     Published Date: Aug 17, 2017
Die Cloud ist ein Servernetzwerk, das Daten, Software und Services umfasst. Auf Clouddienste wird für gewöhnlich über das Internet, und nicht lokal in einem Rechenzentrum, zugegriffen. Wenn es um Cybersicherheit geht, verlassen sich immer mehr Unternehmen auf die Cloud. Die zwei Hauptgründe: 1. Aufgrund der sich ständig ändernden Bedrohungslandschaft wird immer mehr Umfang, Genauigkeit, Erfahrung und kollektive Intelligenz benötigt. Diese Anforderungen können die meisten Unternehmen intern nicht erfüllen. 2. Lokale Appliances und Unternehmensrechenzentren haben prinzipiell ihre Grenzen, wenn es um Abwehrmechanismen gegen DDoS- (Distributed Denial of Service) und Webangriffe geht.
Tags : 
    
Akamai Technologies

DDOS-ANGRIFFE STATISTIKEN UND TRENDS

Published By: Akamai Technologies     Published Date: Aug 17, 2017
Hier können Sie sich den vollständigen „State of the Internet“-Sicherheitsbericht für das 1. Quartal 2017 ansehen: www.akamai.com/StateOfTheInternet-security Die Statistiken basieren auf von Akamai abgewehrten Angriffskampagnen.
Tags : 
    
Akamai Technologies

WIE DAS MIRAI-BOTNET DIE AKTUELL GRÖßTEN UND SCHÄDLICHSTEN DDOSANGRIFFE ERMÖGLICHT

Published By: Akamai Technologies     Published Date: Aug 17, 2017
Das Mirai-Botnet nutzt Hunderttausende von internetfähigen Geräten, die nur über ein schwaches standardmäßiges Kennwort verfügen. Durch Installation von Malware übernimmt Mirai die Kontrolle über die Geräte und errichtet auf diese Weise eine weltumspannende Armee von infizierten Bots. Bis zum Zeitpunkt der Attacke durchsucht jedes betroffene Gerät das Internet nach weiteren angreifbaren Geräten und infiziert diese. Das Internet der Dinge besteht aus Milliarden von Geräten, die Daten senden und empfangen können und heutzutage fast überall anzutreffen sind. Private Sicherheits- und Unterhaltungsgeräte wie Internetkameras, digitale Videorecorder (DVR) und Router werden häufig mit der Mirai-Malware infiziert.
Tags : 
    
Akamai Technologies

Frost & Sullivan Report – Credential Stuffing Becomes Top Concern

Published By: Akamai Technologies     Published Date: Sep 11, 2017
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
web analytics, frost & sullivan, bot management, botnet
    
Akamai Technologies

Simplifying Operations to Deliver Modern Web Experiences

Published By: Akamai Technologies     Published Date: Sep 12, 2017
The ways in which the Internet supports our everyday lives have become richer, more engaging, and more mobile. This innovation is driven by the visionaries, designers, developers, and managers of the web experiences that users consume every day. By exploring new ways to solve challenges and improve products and services that enrich our lives, developers and business owners have stretched the Internet to support use cases for which it was never designed. In order to succeed, modern web experiences must seem simple to end-users, even though most ultimately require complex design and technology to deliver.
Tags : 
web experience, web design, mobile, internet supporters
    
Akamai Technologies

8 Top Considerations for Cloud Image Management

Published By: Akamai Technologies     Published Date: Sep 12, 2017
Online images used to be simple. In the past, they weren’t the focal point of a page — there were only a handful of images on a given page and all users were viewing online images on a desktop with dial-up. That has all changed. Today’s web pages are dynamic, filled with images and viewed by end users on different devices with varying connectivity. As audience expectations for rich web experiences have grown, so has the requirement to deliver increasingly image-heavy web applications. The problem? The cost and complexity of creating, storing, and delivering web images tailored for every device poses a significant challenge for businesses, but failing to address the increasing diversity across devices and networks will lead to a poor and inconsistent user experience. Current solutions don’t solve this problem completely.
Tags : 
cloud image management, online images, web applications, devices, web experience
    
Akamai Technologies

Why You Need a Dynamic Imaging Solution

Published By: Akamai Technologies     Published Date: Sep 12, 2017
The modern digital experience is very much a visual experience. It's through images that we tell our stories, market our products, impart news, and entertain — and forge an emotional connection with our customers. However, delivering today's increasingly image-rich experiences is fraught with complexity. It requires dozens of renditions to optimize an image for all the devices that customers are using, not to mention their current network connection. Without an automated system, it's a daunting task. Dynamic imaging technology is the solution.
Tags : 
digital experience, imaging, imaging solution, system automation, customer experience
    
Akamai Technologies

The Cost of Credential Stuffing: A Poneman Institute Research Report

Published By: Akamai Technologies     Published Date: Nov 10, 2017
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. According to respondents, these attacks cause costly application downtime, loss of customers, and involvement of IT security that can result in a cost of millions of dollars. The survey highlights the challenges in identifying who is accessing their websites using stolen credentials, as well as the difficulty in preventing and remediating these attacks.
Tags : 
poneman, credential stuffing, it security, damage mitigation, research report
    
Akamai Technologies

State of The Internet/Security

Published By: Akamai Technologies     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend won’t continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : 
internet, security, cryptocurrency, data, breaches, botnet
    
Akamai Technologies

State of the Internet / Security Report: Q4 2017 Findings

Published By: Akamai Technologies     Published Date: May 17, 2018
xxx
Tags : 
    
Akamai Technologies

Why Moats And Castles Belong In The Past

Published By: Akamai Technologies     Published Date: Jun 14, 2018
The moats and castle approach is an antiquated, yet a common way, of protecting the enterprise network. This paper describes a new way to protect the enterprise which hides applications from the Internet, outside of the firewall, with zero open ports and a minimal attack surface.
Tags : 
security, enterprise security, eaa
    
Akamai Technologies

Remote Access Redefined: Managing the Rise of Third-Party Users

Published By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
security, multi-factor authentication, network security risks
    
Akamai Technologies

How Securing Recursive DNS Proactively Protects Your Network

Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies

5 Must-Ask DNS Questions

Published By: Akamai Technologies     Published Date: Jun 14, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
dns, phishing, malware, ransomware, security
    
Akamai Technologies
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.