How to launch your business in China: the initial step to host your web portals

April 19, 2018 | Yitong Zhou
There's no denying that with the current economic climate there is a big opportunity for Western organizations and companies to expand their business in the People's Republic of China. But how do you launch your business in China?
Read more

Protection against sophisticated DDoS attacks

March 28, 2018 | Bas Greevink
The security landscape in our industry has changed significantly over the last year. Public cloud is common these days, and security is more important than performance. Recent DDoS attacks on Dutch banks help us to be more aware of these changes.
Read more

Protect your brand: investing in a Web Application Firewall pays off

January 15, 2018 | Jeroen Riesewijk
Prolonged DDoS attacks are back. The number of new ransomware families is increasing drastically, and the amount of malware is rising. Unfortunately, we must jump to the conclusion that websites are attacked even more in various and multiple ways these days.
Read more

Akamai Edge Day 3: Cloud Security Solutions Roadmap and lessons learned from a DDoS attack

October 13, 2017 | Iris Eijbrink
The third day of Bas at Akamai Edge was an interesting one. This day was more focused on practical experiences, including roadmap sessions and panel discussions. The time between the sessions left room to have good conversations and discussions with customers, partners and contacts.
Read more

Akamai Edge Day 2: mPulse, Bot Manager Premier, Enterprise Application Access and Enterprise Threat Protector

October 12, 2017 | Wendy Duurland
This blog will elaborate on Akamai's new services introduced at Akamai Edge: mPulse, BotManager Premier, Enterprise Application Access and Enterprise Threat Protector.
Read more

Akamai Edge Day 1: The NetAlliance Partner Summit

October 11, 2017 | Wendy Duurland
Yesterday was the first day of our consultant Hosting & Security Bas Greevink at Akamai Edge in Las Vegas. This first day was dedicated to the exclusive Akamai Partner summit, which can only be attended by invitation.
Read more

7 critical considerations for choosing a cloud security provider

September 10, 2017 | Malou Warmerdam
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premises infrastructure with security measures in the cloud for a more robust web security posture.
Read more

10 top things to look for in a cloud security solution provider

September 9, 2017 | Malou Warmerdam
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. Choosing a cloud security solution to work successfully with your  existing security infrastructure requires understanding what’s really being offered.
Read more

Bot Manager - product brief

September 8, 2017 | Malou Warmerdam
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”.
Read more

Manage, don't mitigate: what you need to know about bots and scrapers

September 1, 2017 | Malou Warmerdam
A bot, or web robot, is a software application that runs automated tasks over the Internet. Web bots and screen scrapers – which scrape information from website pages – may be deployed by search engines, competitors, and other third parties.
Read more