att

Results 326 - 350 of 4083Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: May 08, 2017
Quality matters, but despite advances made in video streaming technology, delivering great quality live video over the Internet is still not easy. There are challenges with predicting the scale and potential audience location; challenges with managing complex encoder and origin technology; challenges of delivering video securely and reliably over the Internet; and challenges of protecting live streams. Add to that the range of devices, the complexity of live event production, and the demand for HD and 4K image quality and you get a scenario that is more complicated than ever before.
Tags : video quality, playback, video reliability, high quality viewing, online video success
     Akamai Technologies
By: Akamai Technologies     Published Date: May 08, 2017
Video quality can be measured in multiple ways, but the primary metrics – playback reliability and image quality – are the most critical. Get these right, and content providers are on their way to winning the loyalty of online audiences and driving monetization. Get them wrong, and viewers will defect in a heartbeat. For live-streaming events, such as sports, where there’s can’t-miss fast action, the ante is raised even higher. In this white paper, we’ll explore why online video quality matters and the specifics of how it should be measured. Get a peek “under the hood” to understand the core elements of video delivery that contribute to high-quality viewing experiences. Most importantly, see why the choice of a content delivery partner is essential to your online video success.
Tags : video quality, playback, video reliability, high quality viewing, online video success
     Akamai Technologies
By: Akamai Technologies     Published Date: May 08, 2017
This paper, which has been jointly developed by Akamai and Wuaki.tv — an OTT service provider — covers the importance of satisfying viewer expectations for a broadcast-quality experience by quickly and reliably streaming video online. It explains why it is challenging to do so and outlines best practices for online video delivery. It also explores the option of splitting traffic across multiple content delivery networks (CDNs) versus tightly integrating video player technology with a single CDN in order to improve online video delivery in a strategic manner. Finally, the paper shows how Wuaki.tv chose the latter option and boosted customer retention, customer referrals, and revenues as a result.
Tags : content delivery, online video delivery, broadcast quality, viewer expectations, video streaming
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 17, 2017
Inforgraphic Includes fast facts such as: Average Attack Size
Tags : ddos, stats, trends, attacks
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 17, 2017
Web application and DDoS attacks hit enterprises without warning or reason. The attacks can expose confidential data and website resources to malicious uses, reduce performance, and render sites unavailable. Responsible organizations proactively block web attacks to protect their reputations, site availability, site performance, and confidential data.
Tags : application, security, performance, web attacks, data security
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 17, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : cloud security, cloud solutions, data analysis, cyberattacks
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 11, 2017
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : web analytics, frost & sullivan, bot management, botnet
     Akamai Technologies
By: Entrust Datacard     Published Date: Nov 24, 2015
This guide explores how EV certificates reduce phishing and man-in-the-middle attacks, bring trust, reduce shopping cart abandonment, protect brand and provide support saving.
Tags : verification, ev certificates, identification, extended validation ssl certificates, security, access control, application security, authentication, identity management, intrusion detection, intrusion prevention, security management
     Entrust Datacard
By: Amazon Web Services     Published Date: Jul 25, 2018
IDC’s research has shown the movement of most IT workloads to the cloud in the coming years. Yet, with all the talk about enterprises moving to the cloud, some of them still wonder if such a move is really cost effective and what business benefits may result. While the answers to such questions vary from workload to workload, one area attracting particular attention is that of the data warehouse. Many enterprises have substantial investments in data warehousing, with an ongoing cost to managing that resource in terms of software licensing, maintenance fees, operational costs, and hardware. Can it make sense to move to a cloud-based alternative? What are the costs and benefits? How soon can such a move pay itself off? Download now to find out more.
Tags : 
     Amazon Web Services
By: Cisco     Published Date: Oct 08, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming ever-weaker links in the security chain.
Tags : security, cisco, hacking, malware, attackers, security report, enterprise applications, wireless security
     Cisco
By: Akamai Technologies     Published Date: Apr 25, 2018
96% of users see app performance as important. A fast mobile app helps your app stand out from the rest to attain for the coveted title of “go-to” app. Download this guide to learn: The new benchmark: User expectation of an app’s response time The five key barriers to mobile app performance How to accelerate APIs and optimize image performance without expensive infrastructure or complex development work How advancements in CDN technology beyond basic caching can help improve performance
Tags : mobile, app, performance, barriers
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : cloud, security, cyber, cloud, web, ddos
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : ddos, protection, practices, systems, attackers, applications, systems
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
96% of users see app performance as important. A fast mobile app helps your app stand out from the rest to attain for the coveted title of “go-to” app. Download this guide to learn: The new benchmark: User expectation of an app’s response time The five key barriers to mobile app performance How to accelerate APIs and optimize image performance without expensive infrastructure or complex development work How advancements in CDN technology beyond basic caching can help improve performance
Tags : mobile, app, performance, barriers
     Akamai Technologies
By: Akamai Technologies     Published Date: Nov 02, 2018
What to expect and how to prepare your best defense DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
     Akamai Technologies
By: LiveAction     Published Date: Apr 26, 2019
In March of 2019, Sirkin Research was commissioned by LiveAction to identify the driving forces of network transformation and how the rapidly evolving network environment is impacting network professionals. It is well recognized that network transformations, such as SD-WAN, WiFi, and multi-cloud, edge computing among other trends, are creating a host of new challenges and opportunities for network operations. This research is based on responses from over 163 network and IT professionals in predominantly in enterprise organizations with at least $1 billion in revenue Attached is also the target account list.
Tags : 
     LiveAction
By: Sage People     Published Date: Jan 04, 2019
Do you know your people as well as you know your customers? Your people’s expectations and the way they work is changing. Employees are more diverse, mobile and technologically-savvy than ever before. HR processes are changing from focusing on transactions to knowing and engaging people. Just as sales and marketing teams use data to develop actionable and informed insights about their customers, you need to do the same in HR to know your people. Everything, from attracting and keeping the best talent, to creating better workplace experiences and increasing employee engagement and productivity, depends on smarter decisions. These in turn rely on more actionable insights. These are only possible through accurate HR data and analytics. They are vital to address the people challenges you face, so you can make smarter decisions. Discover in this guide how to improve visibility of your workforce with data-driven and actionable insights. Ultimately, it will help you know your people
Tags : 
     Sage People
By: Sage EMEA     Published Date: Dec 19, 2018
Do you know your people as well as you know your customers? Your people’s expectations and the way they work is changing. Employees are more diverse, mobile and technologically-savvy than ever before. HR processes are changing from focusing on transactions to knowing and engaging people. Just as sales and marketing teams use data to develop actionable and informed insights about their customers, you need to do the same in HR to know your people. Everything, from attracting and keeping the best talent, to creating better workplace experiences and increasing employee engagement and productivity, depends on smarter decisions. These in turn rely on more actionable insights. These are only possible through accurate HR data and analytics. They are vital to address the people challenges you face, so you can make smarter decisions. Discover in this guide how to improve visibility of your workforce with data-driven and actionable insights. Ultimately, it will help you know your people better an
Tags : 
     Sage EMEA
By: Venafi     Published Date: Aug 07, 2015
It was recently found that most Global 2000 organisations have failed to completely remediate Heartbleed. This leaves these organisations vulnerable to cyberattacks, future brand damage, and intellectual property loss.
Tags : cyberattacks, security, cybercriminals, security application, access control, anti spam, anti spyware, anti virus, application security, firewalls, internet security, security management, security policies
     Venafi
By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls, authentication, protect digital certificates, reduce risks, access control, anti spam, anti spyware, anti virus, application security, disaster recovery, security management, security policies
     Venafi
By: Venafi     Published Date: Aug 10, 2015
This whitepaper reveals why enterprises are vulnerable to trust-based attacks.
Tags : cyberattacks, security, data security, cryptographic keys, digital certificates, authenticity, anti spam, anti spyware, anti virus, application security, authentication, internet security
     Venafi
By: Venafi     Published Date: Aug 10, 2015
This paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches.
Tags : attacks, cyberattacks, protect certificates, how to remediate breaches, security, security applications, access control, anti spam, anti spyware, anti virus, security management, security policies
     Venafi
By: DellEMC and Intel®     Published Date: Sep 16, 2016
Dieser ESG Lab Validation-Bericht dokumentiert die Ergebnisse kürzlich durchgeführter Tests mit der hyperkonvergenten VxRail-Appliance von EMC. Der Schwerpunkt der Tests lag auf Anwenderfreundlichkeit, Verwaltbarkeit, einfacher Scale-out-Funktionalität, Performance und Zuverlässigkeit.
Tags : study, converged infrastructure, vx rail, virtualisation, emc, infrastructure
     DellEMC and  Intel®
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.