Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Akamai > How to Defend Your Perimeter from Today's Outsized Threats
 

How to Defend Your Perimeter from Today's Outsized Threats

White Paper Published By: Akamai
Akamai
Published:  Mar 10, 2012
Type:  White Paper
Length:  12 pages

While threats to network and information security have existed since the dawn of the information age, the complexity and scale of attacks have exploded in recent years, presenting enterprises with daunting challenges as they struggle to defend an increasingly vulnerable perimeter. This paper assesses the current cyber threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats. It takes a close look at DDoS defense in particular, and provides action-able strategies for leveraging cloud security services to provide a robust layer of defense in an increasingly threatening Internet environment.



Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism