Akamai Diversity
Home > Akamai

Recently by Akamai

Akamai CEO and co-founder Tom Leighton discusses the company's cybersecurity and data protection business. He speaks with Caroline Hyde from the Boston Institute of Contemporary Art on Bloomberg Technology. (Source: Bloomberg)

By Arlen Frew 

Top-level Domain (TLD) operators are focused on making the Internet a better and safer place, enabling name registrations, and maintaining the DNS namespace in support of their stakeholders.  The entire Internet ecosystem, including TLDs, is always looking for ways to improve security. This is especially important as everyone and everything gets connected and awareness of the adverse impact of malicious online activity increases.  Some TLD operators are also looking for ways to supplement their revenue streams to better serve the breadth of economic, cultural, and linguistic needs of their constituents, and to meet policy requirements unique to their region or vertical emphasis.

Lighting the flame marks the beginning of PyeongChang, commemorating the ancient Greek myth of Prometheus stealing fire from Zeus, and connecting the games to its predecessors. The lighting ceremony has provided some of the most iconic moments, such as Muhammad Ali lighting the flame in Atlanta in 1996 and Antonio Rebollo shooting a flaming arrow to ignite the cauldron in Barcelona in 1992.

Taking the Fight Where It Belongs

This Guest blog was written by Robert Mahowald, a Group Vice President at IDC who leads IDC's Worldwide Applications research practice, in addition to co-leading IDC's Cloud Services: Global Overview program.

A surprising set of facts emerged from the most recent quarterly installment of IDC's CloudView 2017 survey (February 2017, n= 6,212 tech buyer respondents in 31 countries): Year-over-year, the percent of organizations sourcing their tech capability from cloud providers grew 137%.

 But that's not all that's new:

  • In large companies, respondents choosing net new and replacement technology for their companies stated that they will go with "cloud-first" for these services, rather than cloud-also and cloud-last
  • The percentage of organizations that are "multi-cloud" is on track to grow from 70.6% today to 91.7% within 24 months
  • For the first time, respondents pointed to "security" as the #1 driver for their company's use of cloud technology

This Guest blog was written by Martha Gomez Vazquez, a Senior Research Analyst for IDC's Infrastructure Services research practice focusing on Security Services and Hardware & Software Support and Deployment.

The widespread success of security breaches over the past few years has proven beyond a doubt that the security threat landscape continues to evolve on a daily basis, forcing organizations to constantly rethink their security posture. At the same time, many organizations are also on a digital transformation journey, one that relies on technologies such as cloud, big data and analytics, mobile, and social. These technologies are rapidly changing the ways we connect and work; they are also changing how organizations now view network perimeters and security. By 2020, IDC predicts that digital transformation will shift to an entirely new scale and 50% of global companies will generate half of their business from digitally transformed offerings, operations, and supplier distribution and customer networks.

Written by Sr. Solutions Engineer, Micah Maryn.

Most folks around the Washington DC beltway have heard the cybersecurity Executive Order (EO 13800 - Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure) referred to as a simple risk assessment. But the reality is that it is much more about broadly modernizing federal IT infrastructure and improving the cybersecurity of our federal networks. Sure, the first step is a risk management report, but the next focuses on procurement of shared IT, including cloud and cybersecurity services.

"Don't work for recognition, but do work worthy of recognition" - H. Jackson Brown.

A friend sent this quote to me after I explained to her my ambivalence about being recognized by Gartner as a "Leader" in their Web Application Firewall Magic Quadrant.  I had mixed feelings because I wanted to believe that I knew the market, I knew our competitors, and I certainly already knew what our customers were telling us about our Web Application Firewall.  Our customers are happy.  The product is getting better.  Market share is growing in a growing market.  I didn't need someone else to tell me we were a leader!   In other words, like most - if not all - of my colleagues and friends, I want to feel intrinsic pride in the work that I do. 

Congratulations to TalkTalk, who were just named the number one provider in the UK for Fibre Broadband response times by the SamKnows industry benchmark. How did they accomplish this? With the support of Nominum's, now part of Akamai, carrier-class DNS software solution, CacheServe.

Written by Lisa Adams

The Girls Who Code Summer Immersion program at Akamai Technologies is off to a great start! During Week 1 we welcomed the class of 20 girls and the teaching team of three instructors from Girls Who Code. The girls began learning how to program in the Scratch language, and already gave impressive demonstrations using their new skills! We also conducted the Meet and Greet event, which was well attended by the girls, the teaching team, the girls' parents and supporters, and the Akamai organizing team and mentor groups. The event featured a talk by Dr. Tom Leighton, Akamai's co-founder and CEO, where Dr. Leighton shared his excitement about Akamai's hosting the Girls Who Code for a third consecutive year. Dr. Leighton told the audience: "You are going to make a difference, even if you don't know it yet. You will define the future."

In an earlier blog, "Remote Access no longer needs to be Complex and Cumbersome", I wrote about the new game-changing remote access solution available from Akamai called Enterprise Application Access (EAA). My thesis was that in our cloud-first, mobile-dominated world, providing access to behind-the-firewall applications need not be as complex as with today's traditional DMZ/VPNs infrastructure.