RSS feed Get our RSS feed

News by Topic

web traffic

Results 1 - 25 of 96Sort Results By: Published Date | Title | Company Name
By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
Users are working off-hours, off-network, and off-VPN. Are you up on all the ways DNS can be used to secure them? If not, maybe it’s time to brush up. More than 91% of malware uses DNS to gain command and control, exfiltrate data, or redirect web traffic. Because DNS is a protocol used by all devices that connect to the internet, security at the DNS layer is critical for achieving the visibility and protection you need for any users accessing the internet. Learn how DNS-layer security can help you block threats before they reach your network or endpoints.
Tags : 
     Cisco Umbrella EMEA
By: AWS     Published Date: Oct 07, 2019
Imperva, an APN Security Competency Partner, can help protect your application workloads on AWS with the Imperva SaaS Web Application Security platform. The Imperva high-capacity network of globally distributed security services protects websites against all types of DDoS threats, including networklevel Layer 3 and Layer 4 volumetric attacks—such as synchronized (SYN) floods and User Datagram Protocol (UDP) floods—and Layer 7 application-level attacks (including the OWASP Top 10 threats) that attempt to compromise application resources. Harnessing real data about current threats from a global customer base, both the Web Application Firewall (WAF) and DDoS protection, incorporate an advanced client classification system that blocks malicious traffic without interfering with legitimate users. Enterprises can easily create custom security rules in the GUI to enforce their specific security policy. In addition, this versatile solution supports hybrid environments, allowing you to manage th
Tags : 
     AWS
By: AWS     Published Date: Oct 09, 2019
Poor visibility into cloud deployments makes it difficult for organizations to enforce security and compliance across their cloud environment. Check Point CloudGuard Dome9 on Amazon Web Services (AWS) can help you gain deeper visibility of your traffic and configurations with automated assessments that strengthen your security posture and help you fulfill your part of the Shared Responsibility Model. Join the upcoming webinar with Check Point, Veracode, and AWS. Learn how Veracode improved their security posture using Check Point CloudGuard Dome9 on AWS.
Tags : 
     AWS
By: Cantaloupe     Published Date: Mar 30, 2010
Social media is all around us and has fundamentally changed the way many of us communicate--both personally and professionally. Video can make your social media better, and ultimately get more leads to your website. But how best to post, measure, and use to drive traffic to your website?
Tags : cantaloupe, online video, social media, communication, facebook, twitter, seo, engagement
     Cantaloupe
By: Akamai Technologies     Published Date: May 24, 2017
Wir haben alle unsere persönlichen Lieblingsapps. Aber können Sie auch nur drei mobile Websites nennen, die Ihnen gefallen? Wohl nicht. Und das liegt daran, dass die Nutzererwartungen allzu häufig enttäuscht werden, wenn Webdesigns, die für Desktop-PCs konzipiert wurden, für Mobilgeräte nachgerüstet werden. Dennoch ist der Smartphone-Traffic höher denn je und steigt weiter an. Dieser Bericht von Forrester-Analysten zeigt, warum es höchste Zeit für einen radikalen Neuanfang ist und wie Ihre Website mit leuchtendem Beispiel vorangehen kann. Laden Sie den Bericht heute noch herunter.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: May 05, 2017
Everybody has their favorite apps…but can you name even three mobile websites you like? Probably not – and that’s because retrofitting desktop web designs fails to meet users’ mobile expectations. Yet in spite of that, smartphone traffic is at its highest point ever and will only continue to increase. This report, written by Forrester analysts, outlines why it’s time for a radical web reset and how you can make your mobile website a “first-class citizen.” Download it today.
Tags : mobile applications, ebusiness, web design, web traffic, mobile websites
     Akamai Technologies
By: Akamai Technologies Australia     Published Date: Feb 07, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
     Akamai Technologies Australia
By: Siteimprove     Published Date: Sep 03, 2019
Sind Sie bereit, zu erfahren, wie Siteimprove Ihnen helfen kann, Ihre grobten Website-Herausforderungen zu priorisieren und zu bewältigen? Bei einer kurzen kostenlosen Analyse wird Ihnen ein Mitglied des Siteimprove-Teams helfen, Probleme auf Ihrer Website zu identifizieren und Möglichkeiten zum Steigern des Traffics zu finden. Auch werden mit Ihnen die Preisoptionen durchgesprochen. Sie erhalten darüber hinaus einen kurzen Einblick in Ihren DCI™ Score, um zu sehen, wie Ihre Website im Vergleich zu anderen in Ihrer Branche abschneidet. Ganz gleich, was herauskommt – Sie werden ein paar mehr Informationen über die Performance Ihrer Website erhalten. Füllen Sie einfach das Formular aus!
Tags : 
     Siteimprove
By: Siteimprove     Published Date: Sep 04, 2019
Sind Sie bereit, zu erfahren, wie Siteimprove Ihnen helfen kann, Ihre grobten Website-Herausforderungen zu priorisieren und zu bewältigen? Bei einer kurzen kostenlosen Analyse wird Ihnen ein Mitglied des Siteimprove-Teams helfen, Probleme auf Ihrer Website zu identifizieren und Muglichkeiten zum Steigern des Traffics zu finden. Auch werden mit Ihnen die Preisoptionen durchgesprochen. Sie erhalten darüber hinaus einen kurzen Einblick in Ihren DCI™ Score, um zu sehen, wie Ihre Website im Vergleich zu anderen in Ihrer Branche abschneidet. Ganz gleich, was herauskommt – Sie werden ein paar mehr Informationen Uber die Performance Ihrer Website erhalten. Fullen Sie einfach das Formular aus!
Tags : 
     Siteimprove
By: CA Technologies     Published Date: Dec 27, 2011
In this executive Q&A, Cloud Luminary and DonorsChoose.org CTO Oliver Hurst-Hiller discusses the importance of being able to seamlessly and quickly switch to a cloud service, the benefits of having all aspects of your company moved to the cloud, and more.
Tags : cloud, technology, donors choose, cloud computing, cloud service, data management
     CA Technologies
By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 17, 2017
Everybody has their favorite apps. But can you name even three mobile websites you like? We can’t. it’s because responsive retrofits to 20-year-old desktop web designs fail to serve us in our mobile moments of need. That’s a shame because even with lousy sites, web traffic around the world will be majority-mobile by 2019. eBusiness pros have a choice: hand your mobile moments over to a bunch of apps you don’t own, or do a radical reset of your mobile web strategy. This report carries the evidence to convince your company to make your mobile website a firstclass citizen.
Tags : mobile, app, web design, media
     Akamai Technologies
By: Websense     Published Date: Apr 09, 2013
Most security effectiveness tests take a sample of known malicious content, and see how many threats each solution can catch. Unfortunately, stopping known threats — those with a known signature, reputation or destination — isn't enough to protect real-world networks. So we designed a new test, along with leading independent test laboratory Miercom*, that simulates a typical day on a network like yours. We put a large sample of web traffic of unknown nature through our TRITON-powered Websense® Web Security Gateway solution, along with competing web gateways and firewalls. Each solution had a fair and equal chance to analyze, classify and block threats as it would on your network.
Tags : miercom, security, effectiveness, report, protect, network, threats, solutions
     Websense
By: Akamai Technologies     Published Date: Sep 11, 2017
Bots are responsible for 30% to 70% of website traffic. They have many purposes, range from good to middling to bad, and from simple to sophisticated. Bot management solutions vary a lot too. Vendors say they can solve your bot problems. Can they? The bot management market is evolving, with many vendors of different sizes, experiences and capabilities. It’s important to solve your bot problems without getting in the way of business. In this ebook, you’ll get insight into how to evaluate bot management solutions and understand what the differences mean for you.
Tags : credential abuse, bots, marketing, bot management, bot solutions
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : api, performance, security, developing, applications, data
     Akamai Technologies
By: Akamai Technologies     Published Date: Mar 09, 2017
For many financial institutions, traffic from bots (aggregators, scrapers, crawlers) can account for up to 40-60% of their overall website traffic — from good bots engaged in essential business tasks to bad bots performing harmful activities. Banks, traders, asset managers, and insurers might know how much of their traffic is from bots, but what they may not know is the impact those bots may be having on their business. Read the report to learn more about: • Managing Financial Data Aggregators • How Bots Affect the Digital Experience • What a good bot looks like?
Tags : financial services, financial data, bots, bot management, website traffic, the digital experience
     Akamai Technologies
By: Akamai Technologies     Published Date: Mar 19, 2019
If you have a website, you most likely have an infestation of bots. While some bots are beneficial, bots can make up a significant portion of your daily website traffic. Malicious bots bombard websites with direct and specific attack goals, such as stealing customer information, scraping content, and even initiating DDoS attacks. Our latest eBook explores the differences between good bots and bad bots, and explains the best way to manage harmful bots.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 13, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : api, performance, security, developing, applications, data
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : api, performance, security, developing, applications, data
     Akamai Technologies
By: Blue Coat Systems     Published Date: Aug 12, 2013
The use of SSL encryption for all enterprise Internet traffic is growing steadily. Applications that make use of SSL – such as SharePoint, Exchange, WebEx, Salesforce.com and Google Apps – are commonplace. Even email applications like Gmail, Yahoo, and Zimbra are being used in workplace environments as hosted email or BYOD apps. It’s clear that organizations now need complete visibility into the SSL traffic coming across the WAN. They need the ability to preserve complete network and web histories from encrypted network and web traffic for compliance, regulatory and logging requirements. Blue Coat has solutions today to address the SSL dilemma.
Tags : blue coat, ssl, ssl visibility
     Blue Coat Systems
By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : api, performance, security, developing, applications, data
     Akamai Technologies
By: Butler Technologies     Published Date: Jul 02, 2018
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network.
Tags : 
     Butler Technologies
By: IBM APAC     Published Date: Aug 22, 2017
Sometimes the best clues to a security breach aren’t found in the contents of the files that are traversing your network. Instead, they’re found in the details of the network metadata. An unusually large data transfer associated with simple web-browsing traffic can indicate the injection of malware. Also, an examination of any changes in an attached file’s entropy can reveal encryption or compression activities that can indicate the addition of embedded malware.
Tags : ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
     IBM APAC
By: Akamai Technologies     Published Date: Sep 27, 2016
In this Akamai brief, we reveal the hidden burden bots and scrapers place on your website. You will know what bots and site scrapers are used for, and why blocking bot traffic is not the best solution.
Tags : akamai, bots, scrapers, bot traffic, security, cybersecurity
     Akamai Technologies
By: Dyn     Published Date: Mar 30, 2016
IPM offers unparalleled visibility across the Internet allowing you the ability to optimize infrastructure costs, mitigate risk, and protect your revenue. Unlike APM and NPM which only provide visibility into your applications or internal network respectively, IPM provides a complete end-to-end view of the public Internet so you can: - Decide where to host content and applications for top performance - Determine the impact website partners, such as cloud providers and ISPs, have on web responsiveness - Identify optimal cloud hosts, NSPs, CDNs, and SaaS providers for Internet traffic, by region - Monitor and measure service provider performance and SLA compliance
Tags : dyn, internet performance management, online performance, ipm, apm, npm
     Dyn
Start   Previous   1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics