blog

02/06/2023

NetStorage: Product Brief

Learn how NetStorage meets the demands of online content delivery with features that simplify and optimize cloud-based online storage.
02/06/2023

Cloud Wrapper: Product Brief

Cloud Wrapper optimizes connectivity between cloud infrastructures and the Akamai Intelligent Edge to maximize origin offload and reduce cloud egress costs.
24/11/2022

ION

Ion Deliver fast, engaging, and reliable user experiences on your sites and apps. Free PoC Consistently delight users, on any device, anywhere Deliver the best experiences […]
24/11/2022

App & API Protector

App & API Protector One-stop, zero-compromise security for websites, applications, and APIs. Free PoC More protection. Better outcomes. Less friction. Tailor defenses to the latest applications […]
06/10/2022

What Is a DDoS Attack?

DDoS, or distributed denial of service, is a type of cyberattack that tries to make a website or network resource unavailable by flooding it with malicious […]
06/10/2022

Cloud Computing Services

Cloud Computing Services Features and Benefits By now most people have heard about cloud computing services, but what does cloud mean? While cloud services may vary in […]
06/10/2022

What is a CDN

A content delivery network (CDN) is a group of geographically distributed servers that speed up the delivery of web content by bringing it closer to where […]
06/10/2022

Lateral Movement Explained

What is lateral movement? Lateral movement is the set of techniques that attackers use to gain access to additional assets after they have initially penetrated network […]
06/10/2022

What is microsegmentation?

What is microsegmentation? Microsegmentation is an emerging security best practice that offers several advantages over more established approaches like network segmentation and application segmentation. The traditional […]
06/10/2022

What is Ransomware?

Understanding ransomware Ransomware is a type of malware that encrypts an organization’s high-value data, such as files, documents and images, and then demands a ransom from […]
06/10/2022

Zero Trust security model

What is Zero Trust? Zero Trust is a network security model based on a philosophy that no person or device inside or outside of an organization’s network should […]
06/10/2022

Memcached DDoS Explained

A Memcached Distributed Denial of Service (DDoS) attack is a cyber attack aimed at Memcached, a database caching system designed to speed up websites and networks. It works […]
06/10/2022

Streaming Media Services

Demand for streaming media services is growing quickly, presenting content providers with new revenue opportunities and new technical challenges as well. Consumers expect instant and uninterrupted […]
06/10/2022

Streaming Media Server

As the demand for streaming media continues to rise, content delivery providers require a state-of-the-art streaming media server solution in order to meet customer expectations and stay competitive in […]
06/10/2022

Live Video Streaming

Live video streaming is an excellent tool for content distributors and other organizations seeking to excite their audience and engage actively with them through live events […]
29/09/2022

Kona Site Defender: Product Brief

Kona Site Defender: Product Brief Build trust and reduce risk with the industry-leading web application and API security solution that is tailored to your business.
Tiếng Việt