Get In Touch
March 2019 Archives
With the rapid uptake in SaaS applications and the ease of moving enterprise applications from the data center to the cloud, many global companies are transforming the way they connect branch offices. In the past, the conventional approach was to connect all of your locations over an MPLS Wide Area Network (WAN) and then send all branch traffic over that to a regional HQ or even a single global HQ.
Chapter 2: Election Day Challenges and Opportunities for Digital News Publishers It will be all about optimizing for Scale, Performance, and Efficiency while maintaining their security posture ... If 2014 was anything to go by for us at Akamai supporting digital publishers, 2019 is going to be an even bigger moment in India's internet history. The first chapter of the blog, listed a few trends on the role of the
When you initially onboarded your OTT traffic to a CDN, you probably went with default settings. And to be honest, why wouldn't you? A standard media configuration is designed for the short http-based segment delivery at scale. It removes the bottleneck of your origin connectivity, taking you from a couple of hundred Mb/s to several Gb/s (and Tb/s) of OTT traffic to your customers as your service grows. So, do
Twenty years ago it would be common to have multiple data centers load balanced with specialized devices. The applications in multiple data centers would use the Domain Name System (DNS) to look up the application destination. The DNS system would be set up to with multiple data center locations. This would "round robin" the results between the data centers. If you have four data centers, the customers would get "round-robined"
Meeting the Expectations of Millions as They Go Online on The Election Day The 2019 General Elections could possibly be the most important Election event ever, in India... As India advances towards the general elections, this year, it will be the world's largest democratic exercise, and the biggest test ever for digital news publishers. India has close to 900 million eligible voters, and an estimated 500 million have access to
API traffic is exploding online and across the Akamai Intelligent Edge Platform. APIs are the connective tissue among organizations driving innovative and integrated digital experiences. As these experiences are mission critical for organizations to monetize partnerships, create connections for employees, or enable modern application architectures, they need scale, protection, and governance to be successful.
Beijing Summer Olympics, 2008 - I remember the butterflies in my stomach as I saw Michael Phelps touch the wall to win his 7th gold at 100m butterfly. It was a record time of 50.58 but everyone was biting their nails because the difference between winning and losing here was only a hundredth of a sec.
Organizations that do business on the web are at various stages in their digital transformation journey. Some are developing some of the most innovative and immersive digital experiences on the web, others are, for the first time, figuring out how to safely move applications to the cloud with minimal disruption to the user experience, and most are somewhere in the middle.
With the March 2019 Release update, the Security Configuration User Interface (UI) evolution is now complete, and we hope it integrates more seamlessly into your online business.
For those who use Web Application Protector from Akamai: "Your APIs just got an extra layer of protection". For everyone else, learn how easy a WAF can be. You protect your web applications, that's awesome, but what about all your APIs? Do you know how many you have, who accesses them and what information they expose?
My business depends on my domain name being 100% available. How do I ensure my domain name is durable to attack and resilient during Internet stress? After many years of hard work from many Internet engineers and system administrators, Akamai Technologies has been working towards DNS infrastructure that would be ready for service 24/7, 365 days a year with beyond five 9s availability and the architecture to thwart any form
Akamai launched Bot Manager three years ago. Since then, the bot landscape has continued to evolve and we've introduced a number of improvements to our bot detections to stay ahead of it. These included browser fingerprinting and behavioral anomaly detection, as well constantly refining our core bot detections such as request anomaly.
Today, Akamai announced the March 2019 Release with new features and capabilities across its security, performance, and media product lines - with a focus on helping customers better manage their cloud migration initiatives. Within security, Akamai has made updates to every product line to help organizations better protect your apps and APIs, stop credential stuffing, and move to zero trust.
In today's fast-moving digital world, we know businesses need to rapidly adapt to meet user expectations and stay competitive. At Akamai, we see a world of unimagined potential, enabled through the unique power of the Akamai Edge. It's this power, backed by the support of our 2000 global experts, located in over 20 countries, that creates the agility your business needs to accelerate and secure your multi-cloud world -- and
Many organizations are well underway on their journey to using cloud platforms to become more agile, reduce costs, and drive efficiencies. Nobody wants to reinvent the wheel though so to speak, and reusing established design patterns can be the difference between a delayed rollout and a fast and effective implementation of your cloud-based service or application. Read on to discover how Akamai fits into such prevalent design patterns, all the
The short answer is no. As expected, the long answer is a little more nuanced. But first, a quick refresher on Zero Trust security for those who haven't jumped on the bandwagon yet. (For those who have, feel free to skip the next section.)
The growth of HTTPS on the Internet Amidst ever-growing security concerns, providing protected Internet connections is more important than ever. The movement towards an Internet that places more emphasis on data integrity and confidentiality is taking place swiftly. HTTP connections are giving way to HTTPS as the growth in encrypted communications continues.
Background: Media Content Security Security in the media & entertainment industry means securing the entire content consumption path. For any OTT or streaming company that wants to serve or distribute its content to end users, has to protect and safeguard their content against an ever-evolving plethora of online piracy and cyber threats. There multiple different types of threats across the content consumption path, so, while companies would need enterprise security
Background: Geo-Blocking Content There are no hard and fast rules to the way content is licensed throughout the world, but typically content owners develop license agreements at the country level which gives them a fair amount of flexibility when monetizing their content. These license agreements then require the content providers to place geographic restrictions on the services they sell in order to maintain compliance with said license agreements. This manifests