figures-left figure-right-top figure-right-bottom figure-center figure-left-top-mobile figures-left-bottom-mobile figures-right-top-mobile figures-right-bottom-mobile

Resources

The world of cloud changes quickly. Stay up-to-date with the latest trends & innovation, all explored in our resource library.

Explore our full library

slider item
Content Delivery Network (CDN)

Innovation for Global Scaling: The END. Case Study

Li-Or Amir 20.12.21

How to Go Global when You Are Unscalable? END. Clothing is a UK-based, eCommerce-native fashion retailer. It brings both established & young, cutting-edge luxury brands under one roof, with a specialty of limited-edition items. With fashion becoming more and more digitized over the last decade, END.’s traffic was growing quickly, both in volume and geo […]

Read more
slider item
Content Delivery Network (CDN)

Case Study: Fashion Retailer Grows 45% with Holistic Performance & Security Suite

Dr. Eduardo Rocha 20.12.21

To grow global, every online retailer needs globally scalable technology stack. This case study reveals how GlobalDots geared UK-based fashion retailer END. Clothing with the latest innovation from established and rising vendors: CDN, image optimization and security solutions. As a result, END. greatly improved its website performance and global presence, while lowering eCommerce TCO. The financial […]

Read more
slider item
Zero Trust Access Management

How to Keep Hackers Out of Your Distributed Environment

Manuel Reischl 19.12.21

New normal, new challenges One of the outcomes of COVID-19 has been our newfound openness to remote work. According to a recent PwC survey, 41% of workers would now prefer their workdays to be fully remote, compared with 29% in January 2021, signaling the desire to work remotely is only ramping up. For cybersecurity teams, this new reality brings […]

Read more
slider item
Bot Mitigation & Anti-Fraud

Bye Bots, Hi Growth: How Up-To-Date Anti-Fraud Can Grow Your eCommerce by +26%

Li-Or Amir

Bad bots are a tough issue for online merchants: They overload your backend servers with API requests which will never generate revenue; They scalp your most wanted items, leaving your real shoppers with nothing but disappointment; and worst of all – as they retool and grow smarter, they make you constantly chase them. You, as […]

Read more
slider item
Monitoring, Logging & Observability

Max Severity log4j Vulnerability Released – How Can You Defend From It?

Shalom Carmel

On December 10, 2021, a new maximum severity security problem was publicly released to the American National Vulnerability Database (NVD), related to the log4j Java logging library. This problem received a CVSS (Common Vulnerability Scoring System) score of a perfect 10.0 – the highest possible severity score. This high-severity vulnerability (CVE-2021-44228) impacting multiple versions of the Apache […]

Read more
slider item
Bot Mitigation & Anti-Fraud

Case Study: Security Innovation Increases Retailer’s Sales by 25%

Dr. Eduardo Rocha 16.12.21

Every online merchant knows that unique offerings and offers attract not only customers – but cybercriminals too. For UK fashion retailer End Clothing (“END.”), this became a matter of make-or-break as their global eCommerce operations grew. GlobalDots, a world leader in Web Security innovation, geared END. with the latest word in managed bot mitigation. Greatly […]

Read more
slider item
Your Innovation Feed

eBook: Don’t Fortify, Amplify: The New Cloud Security Stack

Steven Puddephatt 25.11.21

2021’s Security leaders deal with everything from cloud-native insider threats to staying one step ahead of the unknown. While the cloud is made to amplify and speed up core business processes, the pressure to fortify cloud-borne assets from possible cyber threats painfully slows things down.  GlobalDots harnessed its 17-year cloud security experience to rethink cloud […]

Read more
slider item
Identity & Access Management (IAM)

How IT can Breeze through Onboardings without Additional Hirings

Dror Arie

Which IT Nuisance Would You Automate First? Employee onboarding is one of the heaviest, most complex operations on a company’s IT. This is especially true in fast-growing companies that may see multiple onboardings per day. And, of course, the wider a company’s software tools array, the more accounts to create and permissions to manage. In […]

Read more
slider item
Cloud Workload Protection

GlobalDots Partners with Cloud Security Innovator Lacework

Li-Or Amir 23.11.21

GlobalDots has announced a partnership with Lacework, the data-driven security platform for the cloud. By adding Lacework to its vendor portfolio, GlobalDots will add to its cloud security offering to clients and partners, introducing a single solution to address workload vulnerabilities across multi-cloud environments. The Lacework Cloud Security Platform has met the GlobalDots standard for […]

Read more
slider item
Identity & Access Management (IAM)

GlobalDots Partners with Authentication Innovator Transmit Security

Li-Or Amir 16.11.21

GlobalDots keeps enriching its IAM (Identity & Access Management) innovation offering, and its Passwordless Authentication range in particular, with the latest addition of highly-valued unicorn Transmit Security. Only this June, Transmit Security announced a $543 million Series A – the largest series A funding round in cybersecurity history, according to Crunchbase. Transmit Security has developed an appless […]

Read more
slider item
SD-WAN and SASE

What is SASE? Your 2021 Definitive guide

Gershon Tchemakin 08.11.21

Pronounced ‘sassy’, SASE (Secure Access Service Edge), is a terminology first proposed by Gartner. While there are many definitions of SASE, it can be simply said to be a network architecture that combines the capabilities of SD-WAN with network security functions and delivers it as a service delivered via the cloud. What is SASE used […]

Read more
slider item
Infrastructure DDoS

How DDoS Works: A 2021 Guide

Pavel Klachan

Distributed Denial of Service (DDoS) is usually performed by bombarding the targeted computer or resource with unnecessary requests to overload systems and prevent some or all legitimate requests from being completed. The traffic overloading the target in a DDoS attack comes from a variety of sources. This option effectively makes stopping the attack by blocking […]

Read more
slider item
Compliance Automation

How to Free Yourself (and Core Teams) from Ungrateful Compliance Work

Dror Arie

What is the most annoying thing about compliance work? Out of 150 security leaders surveyed on Pulse, 41% pointed out their struggle for cooperation from core teams in producing evidence needed for InfoSec audits. In other words, compliance work is ungrateful and unpopular. Cloud compliance in hyper-growth companies poses a significant challenge in terms of […]

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure