Skip to main content
Dark background with blue code overlay

Resource Library

Videos

What is Credential Abuse

Credential abuse happens when malicious bots steal your users’ login information. Find out how it starts, and how to protect your users, brand, and revenue.
Watch now

On-demand Demo: Customer Identity and Access Management

Learn how Akamai Identity Cloud can help you create deeper relationships with customers, while providing a better user experience in a secure and compliant way.
Watch now

Podcast: Identity-Aware Proxies, VPNs, and Business Continuity

Akamai CTO of Security Strategy Patrick Sullivan speaks with Patrick Gray, the host of Risky Business, a must-listen podcast for information security professionals.
Watch now

Customer Stories

Segmentation

Segmentation Case Study: Large Healthcare System

Read how this large healthcare system improves its compliance posture with Guardicore.
Learn more

Im Co., Ltd.

Learn how Japan's leading beauty and health company enables secure, easy-to-use remote access for employees.
Learn more
Download Delivery

GREE

GREE, inc. founded the company in 2004 with the corporate mission of making the world a better place through the power of the Internet.
Learn more

Ebooks

Ebook

10 Considerations for Bot Management

In this ebook, you will learn how to evaluate bot management solutions and understand what the differences mean for you.
Get ebook
Bot Manager

Protect Your Online Business from Credential Stuffing

Understand the threat of credential stuffing, how bots vary in sophistication, and how that affects the bot detection technology needed to stop them.
Get ebook
Security

State of Segmentation Ebook

In this report we analyze data from 1,000 IT security decision-makers to reveal 4 key findings about the current state of segmentation.
Get ebook

Product Briefs

Product Brief

Private Access Edge

Private Access Edge is a solution to extend the enterprise private network to the mobile edge allowing phones, tablets, and IoT to be managed within an SD-WAN
See now
Retail and Consumer Goods

Cloud Wrapper: Product Brief

Cloud Wrapper optimizes connectivity between cloud infrastructures and the Akamai Intelligent Edge to maximize origin offload and reduce cloud egress costs.
See now
Broadcast

Akamai Audience Segmentation Cloudlet Product Brief

Define audiences and quickly split visitor traffic for A/B and multivariate testing while taking advantage of the performance and security of your Akamai CDN.
See now

Reference Architectures

Bot Manager

Securing Multi-Cloud Reference Architecture

The Akamai Intelligent Edge platform allows you protect applications deployed across a multi-cloud environment with a consistent security posture. View the reference architecture diagram to see how this works.
See now
Retail and Consumer Goods

Mergers and Acquisitions: Reference Architecture

See how the Akamai Intelligent Edge Platform speeds mergers and acquisitions by consolidating multiple networks without changing the existing infrastructure.
See now
Retail and Consumer Goods

Page Integrity Manager: Reference Architecture

Learn how Page Integrity Manager protects your web pages and safeguards your business by taking a behavioral approach to detecting malicious script activity.
See now

Webinars

Page Integrity Manager

In this video, you’ll learn how Page Integrity Manager strengthens web page integrity by detecting and mitigating script vulnerabilities before damage occurs.
Watch now

The Truth About Piracy: The Pervasive Problem That Won't Go Away

Explore the challenges associated with tackling video piracy, how technology innovation can help (or not), and whether the industry should (and could) do more.
Watch now

How to Maximize Security Through Simplicity

Securing apps and APIs from a wide range of threats is critical to your business success. Learn how you can defend against web and API-based attacks, with a single WAAP solution.
Watch now

White Papers

White Paper

Small and Midsize Businesses Face Big Threats

Small and midsize businesses (SMBs) face cybersecurity risks just like larger companies and ISPs are well positioned to help them with new security services.
Read more
Security

The Hacker's Mindset

Security e-newsletter for top of mind with CISOs in Greater China region - Volume 3
Read more
App and API Protector

The hacker's mindset

Security e-newsletter for top of mind with CISOs in ASEAN region - Volume 1
Read more