web

Results 176 - 200 of 4017Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies
Published By: Dell     Published Date: Nov 03, 2015
This executive summary provides an overview of the webinar discussions, as well as a link for readers to view the TechBytes series in its entirety.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: Nov 09, 2015
The webinar is an excellent resource to provide attendees with the kind of comprehensive and collaborative perspective needed when exploring the implementation of big data solutions. The real-world examples provide information that can enable better decisions for designing best-of-breed big data solutions for organizations.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 13, 2015
Join us to learn how to radically reduce complexity, increase agility, and better prepare your business to meet tomorrow’s challenges with Dell converged, future-ready solution technology. Stay agile and move faster than the competition with Dell Datacenter solutions.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 10, 2015
No matter how advanced data centers may become, they remain in a perpetual state of change in order to meet the demands of virtualized environments. But with the advent of software-defined storage (SDS) architecture, capabilities associated with hyperconverged technologies (including compute, storage, and networking), help data centers meet virtualization requirements with less administrator intervention at webscale.
Tags : 
    
Dell EMC
Published By: Websense     Published Date: Jul 08, 2014
A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.
Tags : 
detecting unknown threats, websense, next-generation firewall
    
Websense
Published By: Websense     Published Date: Jul 08, 2014
This paper provides 5 essentials for protecting against advanced persistent threats (APTS)
Tags : 
apts, understanding apts, apt security strategy
    
Websense
Published By: Websense     Published Date: Jul 08, 2014
A white paper on the shortest path to prevention and risk production.
Tags : 
protecting ip data, dlp implementation, websense data security suite
    
Websense
Published By: Websense     Published Date: Jul 08, 2014
This paper reports on a independent third party test of Websense Triton Web Security Gateway Anywhere against four competing products.
Tags : 
websense, wsga, web security, testing of web security, web security products compared, phising, malicious redirects
    
Websense
Published By: Cisco     Published Date: Jun 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video.
Tags : 
    
Cisco
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: CA Technologies     Published Date: Jan 09, 2015
This paper investigates the threat of session hijacking and the solution developed by CA to address the security threat.
Tags : 
web application delivery, session hijacking, security, ca single sign-on
    
CA Technologies
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
Enabling business value through the Mobile Web requires new thinking as well as a shift in technology. Putting “mobile first” and implementing services-based architectures are among the critical steps. The options are limited only to the imaginations of the designers but must be driven by the user’s context.
Tags : 
collaborative consulting, business value, user expectations, mobile web, service architecture, technology challenges, information technology, program management, software solutions, context and services, wireless
    
Collaborative Consulting
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
Social, Mobile, Analytics and Cloud (SMAC), have broad potential to provide huge business value, while simultaneously presenting potentially overwhelming challenges. The rapid technology changes supporting SMAC and the overall complexity involved demand a systematic approach to building out your SMAC capability.
Tags : 
collaborative consulting, creating opportunities, driving disruption, social, mobile, analytics, cloud, infrastructure, elastic computing capacity, cloud computing, social network, mobile web, wireless data networks, drive change, wireless
    
Collaborative Consulting
Published By: webmechanix     Published Date: Mar 19, 2014
Introducing ETO Cloud for Government Agencies. Interoperable case management software designed to deliver better results by connecting people, programs, and services. Learn how it can put you in control of your organization’s data and help you produce measurable change in the communities you serve.
Tags : 
interoperability, case management software, eto software, human services software, workforce reporting, workforce development software, workforce development, wia reporting software, wia reporting
    
webmechanix
Published By: Akamai Technologies     Published Date: Aug 17, 2017
APIs are the unseen language of the Internet. They power digital transformation across industries by allowing applications to talk to one another and operate as crucial backend services to websites and mobile apps. As a dynamic and somewhat hidden technology, it can be challenging to find detailed information about the API space. We combined findings from our recent API survey of business leaders from over 400 leading technology companies with industry data to compile four need to know facts about APIs.
Tags : 
api, mobile app, technology, backend service
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Everybody has their favorite apps. But can you name even three mobile websites you like? We can’t. it’s because responsive retrofits to 20-year-old desktop web designs fail to serve us in our mobile moments of need. That’s a shame because even with lousy sites, web traffic around the world will be majority-mobile by 2019. eBusiness pros have a choice: hand your mobile moments over to a bunch of apps you don’t own, or do a radical reset of your mobile web strategy. This report carries the evidence to convince your company to make your mobile website a firstclass citizen.
Tags : 
mobile, app, web design, media
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
More often than not, performance and security are thought of as two separate issues that require two separate solutions. This is mainly due to the implications posed behind various performance and security products. We typically have either security solutions or performance solutions, but rarely solutions that offer both. As technology has advanced, so have our attackers, finding newer and better ways to impact both the performance and security of a site. With this in mind, it has become even more critical to come up with solutions that bridge the gap between security and performance. But how do we do that? We need to shift the focus to what we can do at the browser by leveraging various frontend techniques, such as web linking and obfuscation, versus solely relying upon the capabilities of a content delivery network (CDN) or the origin. We can take advantage of all the new and emerging frontend technologies to help provide a secure and optimal experience for users—all starting at the
Tags : 
frontend performance, security, technology, content delivery, web linking
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
As mobile device usage has skyrocketed in recent years, mobile applications have emerged as the key engagement channel for businesses to connect with their most loyal and most valuable customers. Mobile app usage represents more than 85% of total mobile device time, and users now spend more time with apps than they do with television. But while app usage has increased more than 60% over the last two years, the number of apps each user actively engages with has remained fairly steady, at around 27 per month. This means users have a limited appetite for additional apps – but are heavily engaged with the ones they use. So while the mobile web gives businesses broad reach, mobile apps offer a robust link to their best customers. Users who value the company enough to go through the trouble of downloading and installing the app are a brand’s most engaged audience and loyal fan base.
Tags : 
mobile performance, mobile app, customer engagement, channeling
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
APIs sind die verborgene Sprache des Internets. Sie bilden die Grundlage für die digitale Transformation vieler Branchen, indem sie es Anwendungen ermöglichen, miteinander zu kommunizieren und als Backend-Services für Websites und Apps zu fungieren. Da es sich um eine dynamische Technologie handelt, die im Hintergrund arbeitet, ist es schwierig, detaillierte Informationen zur API-Landschaft zu finden. Auf Basis von Erkenntnissen unserer neuesten API-Umfrage unter 400 führenden Technologieunternehmen sowie umfassenden Branchendaten haben wir vier essenzielle Fakten zu APIs herausgearbeitet.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
DANK DER RASANTEN ANPASSUNG DES INTERNETS AN MOBILE ANFORDERUNGEN erhalten Mobilnutzer heutzutage jederzeit und überall nahezu uneingeschränkten Zugriff auf Daten und Informationen. Nutzer, die permanent mit dem Internet verbunden sind, bieten Unternehmen eine hervorragende Möglichkeit, ihre Umsätze sowie die Kundeninteraktion und Kundenbindung zu steigern. Gleichzeitig ergeben sich dadurch jedoch völlig neue Herausforderungen bei der Bereitstellung mobiler Inhalte. In diesem E-Book werden wir diese Herausforderungen näher beleuchten und Wege aufzeigen, wie Sie diese durch Optimierungen für schnelle APIs, mobile Anwendungen und mobile Websites meistern. Hätten Sie das gedacht?
Tags : 
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee