Corporate Partners

Security Whitepapers


Sort by: Date | Company | Title


Time to rethink your traditional endpoint protection
By Webroot | 23/1/2015
In a recent survey, 300 IT professionals were asked about their security practices, solutions and challanges. This infographic presents what was learned about their choices, and why they're probably not effective against today's advanced, zero-day security threats.
Download this now


Webroot SecureAnywhere Business -- Endpoint Protection eGuide
By Webroot | 23/1/2015
As modern malware gets trickier and harder to catch, you’d think slow, heavy endpoint solutions would be a thing of the past. But many businesses still suffer under the weight of long security scan times, massive downloads, and resource-hogging software clients that can’t keep up with today’s threats. Isn’t it time to put the old model out to pasture?
Download this now


Under siege from web threats: APAC countries respond in patchwork and tardy fashion
By Akamai Technologies | 19/1/2015
Internet security challenges are asking some tough questions of organisations in APAC countries, finding that the region is facing a tough fight, which is in line with the situation in the rest of the world. Find out: •The wide variety of routes to respond to security threats used in APAC countries •The business technology trends seen across many organisations that have made security weaknesses more likely •Why and end-to-end, ‘always-on’ approach needs to be taken for the future
Download this now


Why a multi-layered security strategy is not ideal for DDoS mitigation
By Akamai Technologies | 19/1/2015
This white paper presents a best-practice case for creating a proactive security strategy against DDoS attacks – a more effective approach that does not involve a multiple layers. Find out: • Why going against the industry norm of multi-layer security may be the best choice • The most common of the more than 150 multi-dimensional DDoS attacks • How to find and address the weak links in your security
Download this now


Sharing the blame
By Akamai Technologies | 16/1/2015
This report, prepared by the Economist Intelligence Unit (EIU) details how today companies are collaborating more on data security breaches. • As data collected by companies increases, organisations face significant security challenges • This research explores the ways in which organisations are co-operating with governments, other companies and third parties • Despite failure to protect data, firms are not blaming their IT systems. Rather, the high level of reported trust in IT) illustrates acceptance that data breaches are going to occur
Download this now


Threats and mitigations: A guide to multi-layered web security
By Akamai Technologies | 16/1/2015
This guide details the threats common to websites and web applications and what you can do to mitigate them. • The data centre perimeter is dead. But its memory lives on in the way many IT departments continue to secure their infrastructure. • Businesses must determine which of their assets are most at risk and determine their tolerance for risk. • Managing that risk means extending security controls to the cloud
Download this now


The importance of improving and adapting web security
By Akamai Technologies | 15/1/2015
This white paper explores how, with so much depending on web site availability, CSOs are considering new ways to be cost-effectively proactive and vigilant •Websites have become an incalculably valuable part of doing business and have redefined how enterprises are being run •Thanks to these news business models, organisations have a much broader awareness of how critical web services are •IDG research shows the majority of today's technology and security executives are concerned about web security
Download this now


Quarterly Global DDoS Attack Report
By Akamai Technologies | 15/1/2015
This paper follows the monitoring and analysis of malicious cyber threats using research, digital forensics and post event analysis to build a global view of the threats, vulnerabilities and trends. •Malicious actors are now switching tactics to build, deploy and conceal powerful botnets •DDoS attack activity and sizes have remained elevated throughout the first half of 2014 •Malicious actors were able to generate large attack sizes by employing reflection and amplification techniques
Download this now


DDoS attacks against global markets
By Akamai Technologies | 15/1/2015
Distributed denial of service (DDoS) attacks can degrade an organisation's online presence and restrict the availability of its services. This white paper addresses the use of DDoS attacks as a mechanism for damaging the financial industry and interfering with financial markets. •A rising number of attacks have been targeting the financial industry, and governments are considering the national security implications •The public image of a financial service firm is intricately associated with its cyber presence •This paper demonstrates a widespread pattern of DDoS attacks and identifies the effects on valuations and financial exchanges
Download this now


Considering a cloud based security solution?
By Akamai Technologies | 15/1/2015
This paper is based on conversations had at an IDC roundtable with key IT decision makers from various industries and the issues they are facing with security to their business infrastructure and how cloud-based security solutions fit into this picture. •This paper also touches upon some best practices when it comes to securing an organisations IT infrastructure •Fewer and fewer attacks are straightforward in nature; a silver bullet to this problem unfortunately has yet to be developed •Signature-based solutions are no longer solely effective against these sophisticated attacks
Download this now

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place