Akamai Diversity

The Akamai Blog

Recently by Andrew Terranova

Andrew Terranova

Andrew Terranova

October 2, 2018 4:08 PM

Zero Trust Security Architectures - Akamai's Approac ...

This is Part 5 of a 5 part blog series. Jump to Part 1: Introduction Jump to Part 2: Network Micro-Segmentation Jump to Part 3: Software Defined Perimeter Jump to Part 4: Identity Aware Proxy Introduction In the first part of this blog series, we covered an overview of zero trust security architecture concepts. The main concept is that trust should never be assumed based on where a user is

Andrew Terranova

Andrew Terranova

September 20, 2018 11:38 AM

Zero Trust Security Architectures - Network Micro-Se ...

This is Part 2 of a 5-part blog series. Jump to Part 1: Introduction Jump to Part 3: Software Defined Perimeter Jump to Part 4: Identity Aware Proxy Jump to Part 5: Akamai's Approach to Zero Trust Introduction In the previous part of this blog series, we covered an overview of zero trust security architecture concepts. The main concept is that trust should never be assumed based on where a

Andrew Terranova

Andrew Terranova

September 18, 2018 7:29 AM

Zero Trust Security Architectures

This introduction is Part 1 of a 5 part blog series. Jump to Part 2: Network Micro-Segmentation Jump to Part 3: Software Defined Perimeter Jump to Part 4: Identity Aware Proxy Jump to Part 5: Akamai's Approach to Zero Trust Introduction Most enterprises today operate hundreds of applications that support core business practices and were developed years ago with the same assumption in mind - that anyone inside the perimeter

Andrew Terranova

Andrew Terranova

May 17, 2018 7:34 AM

Yin and Yang of the Zero Trust Model

It may seem strange to apply concepts from Chinese philosophy to an IT security model, but representing complex ideas in simple terms can be a powerful tool for understanding and communicating. By viewing zero trust through the lens of Yin and Yang, we see that to be complete, the scope of the model must include how users and devices access all resources. This includes not just our own applications

Andrew Terranova

Andrew Terranova

March 21, 2018 7:50 AM

Zero Trust and the Slowly Boiled Frog

Disclaimer: No actual frogs were harmed in the writing of the blog post. We wouldn't do that. We like frogs. What is Zero Trust Networking? The Zero Trust security model was proposed by John Kindervag of Forrester Research back in 2010. The concept is that the traditional trust model of "trust, but verify" is no longer valid; instead we should "never trust, always verify".