Whitepapers


Sort by: Date | Company | Title


DDoS Web Security Statistics Infographic
By Akamai Technologies | 14/11/2014

Akamai Technologies' Security Intelligence Team monitors various news sources, data feeds, and the communications channels of various chaotic actors on the Internet to find issues that affect organisations, such as outages, data breaches, defacements, and Distributed Denial of Service attacks.

Download the latest infographic from Akamai Technologies, which highlights the results of DDoS Web Security survey conducted by CSO Custom Publishing group.

For more information, please visit www.akamai.com 

Download this now


Government agency fends of DDoS attacks and future proofs operations
By Akamai Technologies | 14/1/2015

This whitepaper looks at how a high profile government agency website came under attack, their response and how they put in place more proactive measures to recognise and counter to the wide variety of online attacks. •DDoS attack on site reached levels of 1,262 requests per second and 257 Mbps of traffic •Agency needed to meet two requirements: prevent large scale attacks and protect agency online operations beyond the website •With security implementation, agency can now remain operational and credibility was preserved

Download this now


Financial services firms defend against DDoS attacks and data breaches while maintaining high performance and availability
By Akamai Technologies | 14/1/2015

DDoS attacks against financial firms have continued to grow in size and frequency. This whitepaper looks at how they have been able to defend against large scale volumetric denial of service and data breach attacks in order to: •Maintain 100% availability for web properties including new account sales, online transactions, customer service portals, mobile sites, and product and service information •Maintain or improve fast page loads and responsive performance •Prevent data breaches and protect personal and corporate information •Enable staff to focus on priority projects versus diversion to attack-related efforts

Download this now


Cathay Pacific Airways increases online booking and extranet adoption, and saves over $1M annually
By Akamai Technologies | 14/1/2015

This case study looks at Cathay Pacific’s challenge to increase site performance and how they achieved three definite goals by enlisting a content delivery service provider.

•Company found that website performance dwindled outside of Hong Kong •Wanted to achieve: high performing at all times, boost adoption rates and support peak traffic •Looked for ways to avoid building out infrastructure and instead opted for content service provider

Download this now


Rabobank plows through New Zealand banking market in high speed
By Akamai Technologies | 15/1/2015

This case study looks at the changes that financial services leader, Rabobank, needed to implement to their IT infrastructure as they expanded into the New Zealand marketplace. •Their current system couldn’t guarantee consistent performance to the New Zealand market •Looked for a solution that would not involve time consuming and cost intensive set-up of local server park •Implementation of solution created acceleration of 4-step transaction from 14.3 seconds to 7.3 seconds

Download this now


DDoS attacks against global markets
By Akamai Technologies | 15/1/2015

Distributed denial of service (DDoS) attacks can degrade an organisation's online presence and restrict the availability of its services. This white paper addresses the use of DDoS attacks as a mechanism for damaging the financial industry and interfering with financial markets. •A rising number of attacks have been targeting the financial industry, and governments are considering the national security implications •The public image of a financial service firm is intricately associated with its cyber presence •This paper demonstrates a widespread pattern of DDoS attacks and identifies the effects on valuations and financial exchanges

Download this now


Quarterly Global DDoS Attack Report
By Akamai Technologies | 15/1/2015

This paper follows the monitoring and analysis of malicious cyber threats using research, digital forensics and post event analysis to build a global view of the threats, vulnerabilities and trends. •Malicious actors are now switching tactics to build, deploy and conceal powerful botnets •DDoS attack activity and sizes have remained elevated throughout the first half of 2014 •Malicious actors were able to generate large attack sizes by employing reflection and amplification techniques

Download this now


The importance of improving and adapting web security
By Akamai Technologies | 15/1/2015

This white paper explores how, with so much depending on web site availability, CSOs are considering new ways to be cost-effectively proactive and vigilant •Websites have become an incalculably valuable part of doing business and have redefined how enterprises are being run •Thanks to these news business models, organisations have a much broader awareness of how critical web services are •IDG research shows the majority of today's technology and security executives are concerned about web security

Download this now


Considering a cloud based security solution?
By Akamai Technologies | 15/1/2015

This paper is based on conversations had at an IDC roundtable with key IT decision makers from various industries and the issues they are facing with security to their business infrastructure and how cloud-based security solutions fit into this picture. •This paper also touches upon some best practices when it comes to securing an organisations IT infrastructure •Fewer and fewer attacks are straightforward in nature; a silver bullet to this problem unfortunately has yet to be developed •Signature-based solutions are no longer solely effective against these sophisticated attacks

Download this now


Akamai's 2014 State of the internet report
By Akamai Technologies | 16/1/2015

This quarter’s report includes data gathered from across the Akamai Intelligent Platform during the third quarter of 2014. This report covers: •Attack traffic and Internet connection speeds/broadband adoption across both fixed and mobile networks •Insight into several high-profile security vulnerabilities, attacks, and toolkits, the state of IPv4 exhaustion and IPv6 adoption, Internet disruptions that occurred during the quarter •And, observations from Akamai partner Ericsson regarding data and voice traffic growth on mobile networks

Download this now