Akamai Technologies Whitepapers


Sort by: Date | Company | Title


Airbnb: Changing the Hospitality Landscape
By Akamai Technologies | 28/4/2015

Airbnb chose Akamai as the partner to help them build the capabilities they needed to grow and scale their business, without sacrificing the customer experience that was key to their success.

According to CTO Nathan Blecharzyk, Airbnb chose Akamai to support their rapidly-growing business because of Akamai’s ability to deliver large media files safely and securely across the globe, allowing them to scale the business as demand increased.

Download this now


Web Application Security for the Enterprise Infographic
By Akamai Technologies | 28/4/2015

With employees and customers increasingly depending on corporate websites, reliability and security have become more critical than ever.

Download this now


10 Best practices for a great mobile web experience
By Akamai Technologies | 28/4/2015

We’ve tapped into our experience serving 30% of the world’s Web traffic to present some key factors to consider as you develop you mobile Web strategy. Download the top best practices

Download this now


State of the Internet Security Report Q4 2014
By Akamai Technologies | 28/4/2015

This quarter’s report is the last time the State of the Internet Report will include a Security section covering attack traffic, reported DDoS attacks, and other security observations. Download today

Download this now


Under siege from web threats: APAC countries respond in patchwork and tardy fashion
By Akamai Technologies | 19/1/2015

Internet security challenges are asking some tough questions of organisations in APAC countries, finding that the region is facing a tough fight, which is in line with the situation in the rest of the world. Find out: •The wide variety of routes to respond to security threats used in APAC countries •The business technology trends seen across many organisations that have made security weaknesses more likely •Why and end-to-end, ‘always-on’ approach needs to be taken for the future

Download this now


Why a multi-layered security strategy is not ideal for DDoS mitigation
By Akamai Technologies | 19/1/2015

This white paper presents a best-practice case for creating a proactive security strategy against DDoS attacks – a more effective approach that does not involve a multiple layers. Find out: • Why going against the industry norm of multi-layer security may be the best choice • The most common of the more than 150 multi-dimensional DDoS attacks • How to find and address the weak links in your security

Download this now


Twelve questions to ask a DDoS mitigation provider
By Akamai Technologies | 19/1/2015

Nearly all companies depend on their technological infrastructure for core business functions, an outage - whatever its cause - effectively means that the organization is shut down until the problem is handled. This whitepaper looks at: • What questions you should be asking of your DDoS mitigation measures • How to properly gauge the level of protection vendors provide • How to better differentiate between DDoS vendors who “all look the same”

Download this now


Sharing the blame
By Akamai Technologies | 16/1/2015

This report, prepared by the Economist Intelligence Unit (EIU) details how today companies are collaborating more on data security breaches. • As data collected by companies increases, organisations face significant security challenges • This research explores the ways in which organisations are co-operating with governments, other companies and third parties • Despite failure to protect data, firms are not blaming their IT systems. Rather, the high level of reported trust in IT) illustrates acceptance that data breaches are going to occur

Download this now


Threats and mitigations: A guide to multi-layered web security
By Akamai Technologies | 16/1/2015

This guide details the threats common to websites and web applications and what you can do to mitigate them. • The data centre perimeter is dead. But its memory lives on in the way many IT departments continue to secure their infrastructure. • Businesses must determine which of their assets are most at risk and determine their tolerance for risk. • Managing that risk means extending security controls to the cloud

Download this now


Akamai's 2014 State of the internet report
By Akamai Technologies | 16/1/2015

This quarter’s report includes data gathered from across the Akamai Intelligent Platform during the third quarter of 2014. This report covers: •Attack traffic and Internet connection speeds/broadband adoption across both fixed and mobile networks •Insight into several high-profile security vulnerabilities, attacks, and toolkits, the state of IPv4 exhaustion and IPv6 adoption, Internet disruptions that occurred during the quarter •And, observations from Akamai partner Ericsson regarding data and voice traffic growth on mobile networks

Download this now