> Akamai > How to Defend Your Perimeter from Today's Outsized Threats
 

How to Defend Your Perimeter from Today's Outsized Threats

White Paper Published By: Akamai
Akamai
Published:  Mar 10, 2012
Type:  White Paper
Length:  12 pages

While threats to network and information security have existed since the dawn of the information age, the complexity and scale of attacks have exploded in recent years, presenting enterprises with daunting challenges as they struggle to defend an increasingly vulnerable perimeter. This paper assesses the current cyber threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats. It takes a close look at DDoS defense in particular, and provides action-able strategies for leveraging cloud security services to provide a robust layer of defense in an increasingly threatening Internet environment.



Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept