Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like physical security and data protection.

Filter the library by ...
CLEAR

From The Core to The Edge: 7 Reasons you Need Security at the Edge

Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered to us on our connected devices - wherever we are, whenever we want them. For InfoSec professionals, this interconnected ecosystem is wreaking havoc with the idea of "the perimeter”, which no longer exists.

Security Starts at the Edge: The 2019 Security Buyer’s Guide

Security is the foundation of success to any digital business. But security-related interruptions do happen, and can have far-reaching consequences such as losing customer trust and injuring your reputation. As a security or IT leader, part of your ongoing security, risk-management, and compliance strategy is sourcing the best solutions for your business. When looking for your next security platform, take advantage of our 2019 Security Buyer’s Guide Checklist.

State of the Internet/Security: DDoS and Application Attacks

Sometimes a DDoS or web application attack isn’t. We saw 875,000 POST requests per second targeting a customer in Asia and uncovered the real cause — so you can avoid it. The State of the Internet / Security DDoS and Application Attacks report provides insightful security research and intelligence. Read now to Increase your knowledge of DDoS and application attacks, with insight from Akamai’s Security Research and Intelligence experts. You will also learn about the evasion tactics attackers use to circumvent bot management defenses and we mined job postings to identify the skill sets they seek to help you understand your threat environment. Take time out for mental health with information on how mitigate the risk of stress and burnout in your security team.

The State of Media Security

Media companies have a tremendous opportunity ahead of them: the chance to revolutionize an industry by replacing traditional broadcast TV with personalized, higher-quality online experiences. But before this potential can be realized, OTT providers must deliver flawless and uninterrupted viewing experiences to every one of their viewers. An essential ingredient to delivering this is securing not only your content, but also your applications, sites, and data.

IDC MarketScape: World Wide Commercial CDN 2019 Vendor Assessment

Download the IDC MarketScape: Worldwide Commercial CDN 2019 Vendor Assessment to see why Akamai is named a leader in the market among 8 key CDN vendors.

Player Centric Innovation for Game Delivery

Are your game downloads fast enough? Download speeds can either drive or drown your gamers. One publisher found that a 30% improvement in download speeds resulted in a 10% increase in day-one activation. We also studied player sentiment, and found that 69% complained about long loading times impacting their enjoyment of the game. Read our latest research on online game delivery innovations to find out how you can ensure your players are getting the best experiences.

User Centric Innovation for Software Delivery

The global software industry has experienced tremendous growth over the past several years and end user expectations have risen with it. When it comes to software downloads, software providers are expected to deliver consistent, secure, and optimized experiences to every user, across every device. When the download experience isn’t predictable and reliable, user engagement is likely to decrease and can ultimately impact the bottom line. Simply put, an effective software download distribution strategy is a major factor in keeping users satisfied and engaged. Download this report to read about the latest research and data around the software industry and to learn about the “must have” capabilities for successful software delivery.

What Does “Good” Look Like?: Toward an Industry Standard for Measuring OTT Video Quality

We all accept that the quality of video streaming can impact the enjoyment of watching a great story. Buffering can damage the viewing experience, but research also shows that visual fidelity can affect how we emotionally engage with a story line and remain hooked.

Cybersecurity for Small and Midsize Businesses: A New Opportunity for Service Providers

Small and midsize businesses (SMBs) need – and want – cybersecurity. However, with limited resources, they often have to look for outsourced solutions. ISPs are well positioned to address SMBs’ security needs with their ongoing IT relationships, established contacts, and billing connections. Security offerings can help providers improve subscriber engagement, drive incremental revenues, and increase service provider affinity.

Data Science is the Foundation for Contemporary Threat Intelligence

Contemporary internet threats are sophisticated and adaptable, they continuously change their complexion to evade security defenses. Traditional rigid, deterministic, rule-based security research are becoming less effective. Security research approaches employing data science methods to implement anomalies-based analysis across very large volumes of anonymized data are now essential.

Load More