"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

online security

Results 1 - 25 of 153Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Retailers competing in the high-pressure world of ecommerce have many challenges. Not only do you need to provide an interesting and compelling shopping experience, you also need to make that experience fast and reliable. But this doesn't need to be difficult - check out our best practices guide that includes: Getting started with performance testing The common challenges faced by online retailers Testing checklist Top ecommerce business metrics Who should be on your testing team The different types of performance tests Testing in production vs. in the lab Security and performance testing
Tags : 
performance, testing, retail, websites, applications, retailers, ecommerce
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Retailers competing in the high-pressure world of ecommerce have many challenges. Not only do you need to provide an interesting and compelling shopping experience, you also need to make that experience fast and reliable. But this doesn't need to be difficult - check out our best practices guide that includes: Getting started with performance testing The common challenges faced by online retailers Testing checklist Top ecommerce business metrics Who should be on your testing team The different types of performance tests Testing in production vs. in the lab Security and performance testing
Tags : 
performance, testing, retail, websites, applications, retailers, ecommerce
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Retailers competing in the high-pressure world of ecommerce have many challenges. Not only do you need to provide an interesting and compelling shopping experience, you also need to make that experience fast and reliable. But this doesn't need to be difficult - check out our best practices guide that includes: Getting started with performance testing The common challenges faced by online retailers Testing checklist Top ecommerce business metrics Who should be on your testing team The different types of performance tests Testing in production vs. in the lab Security and performance testing
Tags : 
performance, testing, retail, websites, applications, retailers, ecommerce
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Retailers competing in the high-pressure world of ecommerce have many challenges. Not only do you need to provide an interesting and compelling shopping experience, you also need to make that experience fast and reliable. But this doesn't need to be difficult - check out our best practices guide that includes: Getting started with performance testing The common challenges faced by online retailers Testing checklist Top ecommerce business metrics Who should be on your testing team The different types of performance tests Testing in production vs. in the lab Security and performance testing
Tags : 
performance, testing, retail, websites, applications, retailers, ecommerce
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Retailers competing in the high-pressure world of ecommerce have many challenges. Not only do you need to provide an interesting and compelling shopping experience, you also need to make that experience fast and reliable. But this doesn't need to be difficult - check out our best practices guide that includes: Getting started with performance testing The common challenges faced by online retailers Testing checklist Top ecommerce business metrics Who should be on your testing team The different types of performance tests Testing in production vs. in the lab Security and performance testing
Tags : 
performance, testing, retail, websites, applications, retailers, ecommerce
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Retailers competing in the high-pressure world of ecommerce have many challenges. Not only do you need to provide an interesting and compelling shopping experience, you also need to make that experience fast and reliable. But this doesn't need to be difficult - check out our best practices guide that includes: Getting started with performance testing The common challenges faced by online retailers Testing checklist Top ecommerce business metrics Who should be on your testing team The different types of performance tests Testing in production vs. in the lab Security and performance testing
Tags : 
performance, testing, retail, websites, applications, retailers, ecommerce
    
Akamai Technologies
Published By: HP AppPulse Mobile     Published Date: Oct 12, 2015
Improve website monitoring, performance, capacity and security.
Tags : 
online, capacity, security, website monitoring, performance, best practices, business intelligence
    
HP AppPulse Mobile
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : 
anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
    
Cisco EMEA Tier 3 ABM
Published By: Akamai Technologies     Published Date: May 08, 2017
The gaming industry continues to grow rapidly, and it is projected to grow another 30% in the next three years1 . Online gaming is driving this growth as the industry is making a seismic shift from disk to digital. This shift comes with an abundance of opportunities and challenges, as digital gaming makes it easier than ever to get games into the hands of more players, in more places, in less time. TechValidate Research surveyed 131 Akamai Technologies, Inc. customer accounts to find out more about how gaming companies are innovating the marketplace and the challenges they need to overcome in order to do so. The results show the importance of web security, that acquiring and retaining new users is the biggest business challenge companies are facing, and that mobile is taking over as the most popular gaming platform.
Tags : 
techvalidate, gaming industry, online gaming, akamai gaming, gaming growth
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 07, 2016
Many industry experts advise financial services institutions (FSIs) to embrace digital transformation. At the heart of that mandate is the need to satisfy rising customer expectations for fast, secure, always-on services delivered seamlessly across all channels and devices. While it’s important to harness the digital technologies today’s customers turn to — especially when it comes to engaging the millennial generation — FSIs need to optimize web and mobile performance to deliver exceptional end-user experiences. Here are eight considerations. Get started on your journey – download the whitepaper today
Tags : 
online banking service, online banking services, online banking application, online banking applications, online banking app, online banking apps, financial services it, online banking solutions, digital transformation, digital disruption, infrastructure, cloud security, ddos, security breaches, web application security, cyber threats, cyber security, cloud applications
    
Akamai Technologies
Published By: Gate2Shop     Published Date: Jan 28, 2011
Due to the constantly changing global online payment landscape, online businesses of all sizes need payment solutions that can be easily adapted to their needs. E-commerce providers must take a step ahead and continue to add more innovative features to the continuously growing portfolio of e-commerce solutions. Are you making it easy for your customer to purchase?
Tags : 
gate2shop, ecommerce service provider, online payment, e-commerce solution, compliance, pci, data security standard of visa
    
Gate2Shop
Published By: Adobe     Published Date: Aug 04, 2015
This white paper explores how cloud-based e-signature technology can drastically reduce the time it takes to complete deal making process and at the same time improve customer satisfaction, document security, and more.
Tags : 
esign, e-signatures, online signatures, digital signatures for sales, sales, clous computing, document security, signed documents, customer satisfaction, authentication, security management, security policies, customer experience management, document management, secure content management
    
Adobe
Published By: Adobe     Published Date: Aug 04, 2015
The rapid adoption of e-signature solutions and the continued strong growth in the market for services and software is driven by several factors:
Tags : 
esign, e-signatures, online signatures, digital signatures for sales, sales, clous computing, document security, signed documents, customer satisfaction, e-signature solution, authentication, security management, document management, information management, secure content management
    
Adobe
Published By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
    
Akamai
Published By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
    
Akamai
Published By: Savvis UK Limited     Published Date: May 14, 2013
Savvis has been hosting eCommerce platforms for nearly two decades. Internet retailers including easyJet and Hallmark Digital trust us to power their online success. Savvis offers a comprehensive portfolio of infrastructure, network and application management across the eCommerce ecosystem. No matter what you sell or where you are along the eCommerce journey, we can support your commercial goals with the speed of implementation, accessibility, security and affordability of a retail-ready cloud environment, with our Virtual Private Data Centre. Combined with our global data centre footprint and network options ranging from Tier1 public IP access to private, low-latency connectivity, the VPDC offers a resilient, made-to-measure solution for any eCommerce application.
Tags : 
virtual, private, data centre, it foundation, ecommerce, platforms, internet retailers, online, virtual private data centre, security, affordability
    
Savvis UK Limited
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This infographic illustrates how Entrust PKI Technology is still a key player and global leader in online security.
Tags : 
security, internet security, online security, pki, entrust pki technology, application security, authentication, security management, security policies
    
Entrust Datacard
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"DNS has recently been dubbed by Gartner Research as “mission-critical” infrastructure and as such, who you select for a DNS provider can have a significant impact on the functionality and performance of your online assets. To help with your research, download this DNS evaluation guide. You will learn the most important functions of a robust DNS provider including: • Advanced traffic steering from failover to GSLB capabilities • Rapid record propagation time • Secondary DNS support • Security expertise Keep your brand safe and your user-experience top notch by choosing the best provider for your business. Learn more now! "
Tags : 
    
Oracle + Dyn
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
DNS has recently been dubbed by Gartner Research as “mission-critical” infrastructure and as such, who you select for a DNS provider can have a significant impact on the functionality and performance of your online assets. To help with your research, download this DNS evaluation guide. You will learn the most important functions of a robust DNS provider including: Advanced traffic steering from failover to GSLB capabilities Rapid record propagation time Secondary DNS support Security expertise Keep your brand safe and your user-experience top notch by choosing the best provider for your business. Learn more now!
Tags : 
    
Oracle + Dyn
Published By: Plantronics     Published Date: May 20, 2016
This white paper reveals seven necessary technologies to help ensure end users can take full advantage of web conferencing, from wherever they happen to be.
Tags : 
web conference, technology, web meetings, web conferencing, online conference, mobility, video conference, security, byod, bring your own device, application security, mobile computing, virtualization
    
Plantronics
Published By: MessageLabs     Published Date: Sep 25, 2008
The Internet has proven to be a vital communications medium for worldwide commerce, but as an open and unprotected global network it can also present a wide range of threats that can cripple any business organization. Several years ago, most Internet threats were relatively benign examples of a young adolescent’s technical expertise but over time they have evolved into increasingly sophisticated domestic and foreign attacks that are designed to capture financial, personal, or strategic business information. Threats now come in the form of deliberately malicious acts, and exploitative opportunities for hackers and/or organized crime. The impact is serious, and the landscape of victims is getting broader every day. In response, no organization can afford to have its networks remain unprotected.
Tags : 
messagelabs, online threats, security, small & medium businesses, email spam, viruses, trojan horses, worms, phishing attacks, spyware, adware, honeypots, sandboxing, the wildlist, security management
    
MessageLabs
Published By: FireEye     Published Date: Mar 05, 2014
Never before have state and local governments been expected to do so much with so little. Even as budgets remain tight in a post-recession environment, tech-savvy citizens demand higher levels of service, they want to pay taxes by credit card, renew their driver's license online, and check traffic from their smartphone. These responsibilities make cyber security critical for state agencies, municipalities, and public utilities. Governments possess residents' most sensitive information - including inviolable personal data such as Social Security numbers and birth certificates. This white paper highlights: Why traditional tools fail to detect advanced attacks; Gaining a cohesive, correlated view of all major threat vectors; How to leverage signature-less, real-time security that thwarts zero-Day attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
Today's cyber attacks have changed radically from just a few years ago. No longer are they the sole province of opportunistic crooks, online vandals and digitial ""hacktivists."" Today, advanced cyber attacks are the weapon of choice for organized criminal enterprises and nation-states. This white paper highlights: Why organizations need much more than fundamental security tools; Strategies for dealing with advanced targeted attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye
Start   Previous   1 2 3 4 5 6 7    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory