Get In Touch
October 2019 Archives
Earlier this month, Akamai participated in CX Day, a global event dedicated to the customer experience. This was our first time celebrating, and I was lucky enough to join my fellow leaders for the event.
We are pleased to share that Akamai has been identified as a Leader in The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019.
Recursive DNS communications are normally unencrypted between a client and a resolver. In an effort to improve user privacy and address security concerns, Mozilla announced it would begin enabling DNS over HTTPS (DoH) by default in its Firefox browser. However, Mozilla recognized it would be necessary in some cases for enterprises to be able to inspect DNS traffic to enforce security controls. Consequently, Firefox also supports a "Network Signal" that,
Data science and security research teams in the carrier organization at Akamai process massive volumes of DNS queries every day to detect and track malicious activity. The data is live-streamed from DNS resolvers deployed in diverse service provider networks in every region of the world. Providers who supply the data anonymize it using Cryptography-based Prefix-preserving Anonymization (Crypto-PAn), a well known tool.
On October 22, 2019, a new method of web cache poisoning, called CPDoS or Cache Poisoned Denial of Service, was announced by researchers, Hoai Viet Nguyen and Luigi Lo Iacono. Targeting content delivery networks and other caching systems, the attack works by using a malicious header in the HTTP request to cause an error message to be cached, rather than the intended content. The error page is subsequently served to
Co-Author: Mark Greve, Engineering Manager at Akamai. Part of the Media Client Team The first part of this blog series discussed about the quality of user experience (QoE) metrics and two strategies that heavily influence the QoE: the bitrate selection strategy and the buffering strategy. In this second part, we discuss about ExoPlayer's buffering strategy and how to configure the ExoPlayer to lower the startup time and, for video on-demand
What is GTM Global Traffic Management, or GTM, is a DNS-based load balancing service that offers application owners a level of flexibility and insight that is unmatched by traditional on-prem solutions. Highly scalable and fault-resilient, GTM offers customers a layer of abstraction between endpoints, so traffic can be easily shifted between targets. However, the platform is not limited to weighted load distribution: GTM can execute intelligent routing decisions based on
Written by: Ritesh Kalyanshetty and Sandeep Singh Pervasiveness of CDNs within the expanding Media and Entertainment Industry Media and entertainment companies, including content owners and over-the-top (OTT) service providers are living in an era symbolized by a dramatic increase in content consumption fueled by the widespread availability of online video content, coupled with factors like hyper-connected devices and ubiquitous high-speed data.
Last week Akamai reached a significant milestone when traffic on our intelligent edge platform exceeded the threshold of 100 Tbps (terabits per second) for the first time in our history, peaking at 106 Tbps. To put that volume of traffic into context, delivering 106 terabits per second is roughly the same as downloading 3,300 two-hour HD movies every second, or nearly 12 million an hour.
Additional research and support provided by Danny Wasserman. Overview One of the goals of phishing sites is to lure individuals into providing sensitive data, such as personally identifiable information, banking and credit card details, and passwords, through the use of email, SMS, social media, and messaging apps. This information is then used to access important accounts and can result in identity theft and financial loss.
JSON Web Tokens (JWT) use digital signatures to establish the authenticity of the data they contain, as well as authenticating the identity of the signer. A valid signature check ensures that any party can rely on the contents and the signatory of the JWT. This is typically accomplished by using an asymmetric signing algorithm such as RS-256 (RSA + SHA256 hash). The "asymmetry" is where the private key of a
The October 2019 Release includes enhancements to Akamai security products with many new and updated capabilities. Highlights and capabilities that our customers have been particularly excited about include: The Bot Intelligence Console provides greater visibility into the bot landscape, allowing you to benchmark against your industry vertical or the platform as a whole, and see everything that Akamai knows about any individual bot. KRS Evaluation Mode makes it easier to
As part of our October release, we are making our onboarding experience much faster and simpler. These benefits are extended to new customers looking to onboard and protect new hostnames on Akamai - as well as existing customers looking to spin up, test, and protect new functionality within their site or applications.
I remember the days when brands captivated users online with dancing aliens (LowerMyBills.com) and Elf Yourself advertising campaigns (OfficeMax). In this new digital era, however, customers are smarter, more powerful, and dictate more than ever how and when they interact with brands. More important than price or product, customer-centric business models are the new competitive differentiator. Positive customer experiences are not only critical for corporate branding but can significantly impact
Today, Akamai announced the October 2019 Release, which introduces new capabilities to our Media product line with a focus on helping customers accelerate their cloud transformation using the power of the edge. Within Media, the new enhancements are highlighted by: Scalable forensic watermarking support from the Akamai Edge, pre-integrated with leading third-party providers to provide a more effective way to trace piracy back to the source. The new Access Revocation
A slow response can wreck an otherwise perfect video playback experience. At least, that is what data shows when it comes to streaming high quality video content to any device, anywhere in the world. While there is no way to control when a slow response will happen, Akamai can offer an alternative when it does.
In my previous blogs, I wrote about how phishing is no longer just an email problem, how the industrialization of phishing is being driven by the easy availability and low cost of phishing toolkits, and how current phishing defenses are being bypassed by attackers.
Time is always of the essence to extend compelling video content such as sporting events and concerts and make the most of media rights windows. This is especially true for catch-up TV, highlight creation, time-shifting 24/7 simulcast streams, and social sharing. At Akamai, we are continually making improvements that make it easier to extend content monetization, including a service that simplifies video-on-demand (VOD) clip creation from live streams in an
Written by: David Springfall, Founder and CTO of Yospace Under David's technical and strategic leadership, Yospace pioneered server-side ad insertion and established itself as the global leader in OTT stream monetisation. The Yospace technology supports full one-to-one personalisation and provides a true broadcast-quality user experience for live and on-demand. Today, Yospace services major networks and providers throughout the world, including AT&T Entertainment Group in the US; Sky, ITV, BT Sport,
Online video streaming is everywhere today. It's available on the smallest hand-held devices to the largest of screens in our living rooms. Magically and for the most part, it works and provides a very captivating experience. However, if you step back to look at the overall architecture, media streaming is a very reactive process.
Digital business transformation has meant a continued shift in the way organizations think about secure access. The focus on security has moved away from data centers and toward users. Workforce productivity, flexibility, and application performance are driving the demand to give users cloud-delivered secure access from the edge.
Akamai Announces New Capability to Allows Content Providers to Shut Down Sources of Piracy ...
Akamai Adds Edge Based Watermarking Support, Pre Integrated with leading 3rd Party Providers ...
Hybrid DDoS has always been an interesting concept. From a vendor perspective, it's not hard to understand the motivations behind it. The vendors pushing hybrid DDoS are the same ones that have been selling DDoS mitigation appliances for years and were late to join the industry-wide shift to cloud. Hybrid DDoS allows them to continue selling their on-premises appliances, while buying time to build out and learn how to operate
If you could have all the visibility that Akamai has into bot traffic, what would you do with it? That's been a common theme in conversations with many of our customers over the past year. Bot Manager provides a range of dashboards and reporting tools designed to help you better understand how bots are interacting with your websites and applications. But you've asked for more. You want to see how
Web Application Protector (WAP) is adding some exciting new capabilities in the October 2019 Release. Akamai designed WAP to provide automated protection for your websites and APIs from DDoS and web application attacks. As such, one of the primary objectives (besides providing best-in-class protections) has always been operational simplicity. We continuously improve our products, working closely with our customers that use them every day. This release introduces a redesigned and
Tuning a web application firewall can be a daunting task. Security teams invest significant time and energy testing WAF rules in order to gain the confidence necessary to set them to deny. But as soon as the application changes or new or updated WAF rules are available, they have to do it all over again - only this time, without knowing if the rule changes will improve their security posture
The energy footprint of the IT sector is estimated at 7% of global electricity consumption, according to Greenpeace International. And, although the data center and colocation industry is a small segment of the IT sector, it represents a large portion of its power consumption. By 2020, the power consumption for operating and cooling data centers is anticipated to reach a staggering 73 billion kWh and will greatly affect CO2
We have eagerly awaited Gartner's analysis of the growing CIAM industry. According to Gartner, in its August 2019 Solution Comparison for Customer Identity and Access Management Capabilities of 9 Vendors, "CIAM offerings are expanding and are now key business enablers for unifying customer experience and streamlining operations."
A recent blog post by LinkedIn says there are more available job postings listed in October than any other month. Since 89% of the hiring managers who spoke to LinkedIn said it takes less than four weeks to fill those roles, there is a limited window of opportunity - for both job seekers and criminals. October is National Cyber Security Awareness Month (NCSAM). With that in mind, if you're on