Whitepapers


Sort by: Date | Company | Title


Airbnb: Changing the Hospitality Landscape
By Akamai Technologies | 28/4/2015
Airbnb chose Akamai as the partner to help them build the capabilities they needed to grow and scale their business, without sacrificing the customer experience that was key to their success. According to CTO Nathan Blecharzyk, Airbnb chose Akamai to support their rapidly-growing business because of Akamai’s ability to deliver large media files safely and securely across the globe, allowing them to scale the business as demand increased.
Download this now


Web Application Security for the Enterprise Infographic
By Akamai Technologies | 28/4/2015
With employees and customers increasingly depending on corporate websites, reliability and security have become more critical than ever.
Download this now


The plastic breach - Protecting the retail sector
By Check Point Software Technologies | 28/4/2015
Who would have thought that a small piece of plastic measuring a mere 2.125 inches by 3.370 inches could open a window to so much mayhem? Find out to safe guard your PoS terminals from cyber criminals hacking retail networks.
Download this now


10 Best practices for a great mobile web experience
By Akamai Technologies | 28/4/2015
We’ve tapped into our experience serving 30% of the world’s Web traffic to present some key factors to consider as you develop you mobile Web strategy. Download the top best practices
Download this now


The myths of mobile security
By Check Point Software Technologies | 28/4/2015
Mobility has transformed the workplace. Laptops, smartphones and tablets not only enable an organization’s road warriors, but also create freedoms for all employees to stay connected whether at a conference, working from home, or even sitting in an airport terminal.
Download this now


State of the Internet Security Report Q4 2014
By Akamai Technologies | 28/4/2015
This quarter’s report is the last time the State of the Internet Report will include a Security section covering attack traffic, reported DDoS attacks, and other security observations. Download today
Download this now


Check Point: A Gartner Magic Quadrant Leader in Enterprise Network Firewalls Since 1997
By Check Point Software Technologies | 28/4/2015
For the eighteenth consecutive year, Check Point has been positioned in the "Leaders" quadrant in the Magic Quadrant for Enterprise Network Firewalls1. Gartner evaluates each vendor’s Enterprise Network Firewall offerings on a scale of completeness of vision and ability to execute.
Download this now


Stopping the next massive cyberattack
By Check Point Software Technologies | 28/4/2015
Cybercrime is now a leading menace of 21st century businesses. Perhaps even more unsettling, many cybercrime victims have been breached despite sizeable security investments and best-of-breed product deployments. For this reason, the sophistication of recent attacks has created a widespread sense of fear and distrust among consumers.
Download this now


Cloud services provisioned outside of IT control can spell trouble
By Tangoe | 20/4/2015
Cloud applications and services are woven into the very fabric of most organisations, yet the vast majority underestimate the number of cloud deployments in their organisation. This report looks at how you can achieve success by harnessing the ability to identify, centralise, and streamline corporate cloud deployments.
Download this now


6 Best practices of Managed Mobility Services
By Tangoe | 20/4/2015
The constant change in the mobility landscape often leads to a convoluted, ineffective process of mobility management. Mobility Managed Services (MMS) is emerging as a response to this complexity. MMS can address the varying levels of challenge through an objective-based setting for management in the enterprise. MMS pre-integrates solutions and components that offer specialised skill-sets for continuous improvement of the mobile infrastructure.
Download this now