Resource Library

Network World has assembled a comprehensive reference collection of technical resources to help guide your decision making.

Filter the library by ...
CLEAR

Akamai Customer Success Story: Educational Testing Service

Founded in 1947, Educational Testing Service (ETS) is the world’s largest private nonprofit educational testing and assessment organization. ETS keeps that at the forefront as it continually evolves the way it delivers, protects, and optimizes its website and applications. 

Akamai Customer Success Story: Network for Learning

Network for Learning (N4L) is a Crown-owned company set up in 2012 to help bridge the digital divide and make sure every young New Zealander has access to the digital world for learning, regardless of where they live or go to school.  

Video/Webcast | Presented by Alation

By the numbers: Are Data & Analytics Pandemic-Proof?

The COVID-19 pandemic has changed the way we live and work — it has also changed the way we approach data & analytics with far-reaching implications. Through an examination of the latest research on data & analytics and data culture, Stewart Bond, research director at IDC, and Aaron Kalb, chief data & analytics officer at Alation, delve into the effects COVID-19 is having on how enterprises work with data, including how they are dealing with the realities of business today and how they are planning for recovery. 

Gartner 2020 Market Guide for Zero Trust Network Access (ZTNA)

In the 2020 Market Guide for Zero Trust Network Access (ZTNA), Gartner evaluates technologies that enable secure access to internal applications based on identity, context, and policy adherence — regardless of user or application type or location. According to Gartner, “ZTNA improves the flexibility, agility, and scalability of application access, enabling digital businesses to thrive without exposing internal applications directly to the internet, reducing risk of attack.”

How To Guide: Zero Trust Security Transformation

A Zero Trust model ensures that security and access decisions are dynamically enforced based on identity, device, and user context. This security framework dictates that only authenticated and authorized users and devices can access applications and data, while also protecting workloads and users from advanced threats.

How to Secure Your Cloud with CIS

Learn how to leverage Center for Internet Security (CIS) cloud security resources to secure your cloud infrastructure, including your AWS account, as-a-service environments, and virtual machine images.

How to Secure Your Cloud with CIS

Learn how to leverage Center for Internet Security (CIS) cloud security resources to secure your cloud infrastructure, including your AWS account, as-a-service environments, and virtual machine images.

The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020

According to Forrester, “Akamai truly believes in the tenets and implementation of Zero Trust for its customers and for itself. This should be a key point for potential clients…. Coupled with this fervent belief is the power the Akamai platform provides.” 

Gartner 2020 Magic Quadrant for Access Management

As remote work increases access management tool adoption, and security controls shift to identity, the ability to secure access with AM strategies aligned with continuous adaptive risk and trust assessment is paramount.

Video/Webcast | Presented by Celigo

Automation for Growth: Using Integration as a Competitive Advantage

When you think of ways to accelerate growth and gain the edge over your competition, developing an integration strategy probably isn’t the first thing that comes to mind.  High growth SaaS companies have one thing in common, they all automate critical business processes early on to free up resources and run faster. With today’s modern integration platforms as a service (iPaaS), any organization from early stage to well-funded startups can build scalable, efficient and resilient operations. But how do you get started with the right strategy? What processes matter most to automate and when? When should you use native integrations vs. building custom integrations?  Why not just code directly to APIs?  

Load More