Get In Touch
Akamai has been a leader in customer service for years, and we've leveraged that experience to best support our customers through the COVID-19 pandemic. That includes our internal customers, our employees who are working hard to do their jobs while adjusting to a full-time remote environment. This is brand new for all of us, so it's more important than ever to listen to their needs.
This is the first in a series of blog posts that will discuss how smart DNS resolvers can enhance ongoing ISP and MNO network transformation efforts such as the transition to 5G, better integration of Wi-Fi, and new network designs that optimize the edge to improve service delivery and network efficiency.
Akamai has been a strong advocate for water conservation by supporting early-stage innovations. This World Water Monitoring Day (September 18), we present the inspiring work of one of our innovators -- Foundation For Environmental Monitoring (FFEM), based in Bangalore, India -- that is working on developing open source devices to monitor key environmental parameters such as water and soil.
Our three-part blog series, Re-thinking Defensive Strategy at the Edge, has been focusing on outlining a new defensive edge strategy for today's enterprise. We began with a discussion of data and indicators. Most recently, our second post focused on using risk signals and correlating them for improved security controls. This last post in the series will transition the discussion from data and correlation into how to use these to enable
As a former Gartner analyst and now a strategist at Akamai, I have had several conversations with CISOs across the world on the topic of 'designing a future-ready security architecture'.
In the first post in our blog series Rethinking Defensive Strategy at the Edge, we began to outline why a new defensive edge strategy is needed for today's enterprise. As previously mentioned, the strategy enhances those in place and introduces another layer of defense that includes the following three components: data and indicators, risk-based signals and entities, and protective actions. This post explores user entities as well as risk-based signals
In recent years, new enterprise remote access architectures and frameworks have been introduced, such as Zero Trust Access (ZTA). Those concepts have driven changes in the way the network perimeter has been defined -- specifically, from the outside in, not the inside out. Access to applications and services usually start from users and devices outside of traditional on-premises network perimeters.
The FBI has released a flash warning that thousands of organizations around the world, and across multiple industries, have been threatened with DDoS attacks unless they pay a bitcoin ransom. This ransom DDoS, or RDoS, threat was covered by Akamai's Security Intelligence Response Team (SIRT) in a Security Alert released on August 17, 2020.