and Security Technologies

Results: 1110



#Item
201Akamai Technologies / Content delivery network / Performance management / System administration / Software as a service / Business transaction management / IBM cloud computing / Application firewall / Cloud computing / Computing / Centralized computing

PRODUCT BRIEF Cloud Monitor A Cloud-based API solution that puts critical transaction and security event data at your fingertips As you migrate an increasing number of applications and services to the Cloud, more of you

Add to Reading List

Source URL: it.akamai.com

Language: English - Date: 2013-10-01 04:06:01
202Akamai Technologies / Content delivery network / Performance management / System administration / Software as a service / Business transaction management / IBM cloud computing / Application firewall / Cloud computing / Computing / Centralized computing

PRODUCT BRIEF Cloud Monitor A Cloud-based API solution that puts critical transaction and security event data at your fingertips As you migrate an increasing number of applications and services to the Cloud, more of you

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2013-10-01 04:06:01
203Akamai Technologies / Content delivery network / Prolexic Technologies / Networks / Denial-of-service attack / Computing / Concurrent computing / Internet

AKAMAI WEB SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Flow-Based Monitoring Network-layer monitoring for early detection and notification of potential DDoS attacks Organizations increasingly interact with customers, em

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2015-04-06 03:50:01
204Content delivery network / Internet / Security / Application firewall / IP address / Cambridge /  Massachusetts / Access control / Computer security / Computing / Akamai Technologies

AKAMAI CLOUDLETS: PRODUCT BRIEF IP/Geo Access Cloudlet Easy to manage whitelists and blacklists on the Akamai Intelligent Platform™ Access control is an important part of managing visitor access to your website or ap

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2015-03-17 14:24:00
205Akamai Technologies / Content delivery network / Prolexic Technologies / Networks / Denial-of-service attack / Computing / Concurrent computing / Internet

AKAMAI WEB SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Flow-Based Monitoring Network-layer monitoring for early detection and notification of potential DDoS attacks Organizations increasingly interact with customers, em

Add to Reading List

Source URL: www.akamai.de

Language: English
206Computing / Data privacy / Computer law / Law / Regulatory compliance / Payment Card Industry Data Security Standard / Information security / Health Insurance Portability and Accountability Act / Akamai Technologies / Computer security / Data security / Security

AKAMAI FEATURE Akamai Compliance Management Reduce Risk with SSL Delivery and Acceleration Services Help support PCI, ISO, FISMA, BITS and HIPAA Compliance Initiatives Maintaining regulatory compliance for your business

Add to Reading List

Source URL: www.akamai.fr

Language: English - Date: 2013-05-02 06:58:00
207Internet / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Akamai Technologies / Network architecture / Prolexic Technologies / Denial-of-service attacks / Computing / Computer network security

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona DDoS Defender DDoS defense to protect websites against the increasing scale, frequency, and sophistication of attacks As businesses and other organizations move incre

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2015-04-13 05:52:02
208Computer network security / Software testing / Cross-platform software / JavaScript / Computer security / Internet privacy / Evaluation / Vulnerability / Computer insecurity / Computing / Security / Cyberwarfare

SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE A European Network of Excellence in Managing Threats and

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2015-01-09 11:36:39
209Data collection / Intelligence / Intelligence gathering disciplines / Military terminology / Unmanned aerial vehicle / Signals intelligence / National security / Military communications

Weapon Systems and Technologies for Enduring Campaigns Thursday 25th November, 2010 Session 8 UNCLASSIFIED version of the original Unmanned Aircraft for use by Local Security Services

Add to Reading List

Source URL: www.barnardmicrosystems.com

Language: English - Date: 2013-11-28 13:55:51
210Content delivery network / Internet / Cloud computing / Computing / Akamai Technologies

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Site Shield Defends the origin by cloaking web infrastructure and reducing vulnerability Everyone connected to an enterprise – customers, employees and partners – expe

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2014-07-18 11:30:01
UPDATE