Akamai Diversity

The Akamai Blog

Recently by Faraz Siddiqui

Faraz Siddiqui

Faraz Siddiqui

January 29, 2019 2:21 PM

Software Defined Perimeter - a Modern VPN with Tradi ...

Application Servers are implemented as a means of providing services and making resources available to users. However, any server connected to the Internet is inevitably targeted by malicious users using open listening ports. There are millions of these ports on the Internet, which means there is plenty of opportunity to exploit these open services.

Faraz Siddiqui

Faraz Siddiqui

September 27, 2018 9:14 AM

Zero Trust Security Architectures - Identity Aware P ...

By Faraz Siddiqui and Andrew Terranova This is Part 4 of a 5 part blog series. Jump to Part 1: Introduction Jump to Part 2: Network Micro-Segmentation Jump to Part 3: Software Defined Perimeter Jump to Part 5: Akamai's Approach to Zero Trust

Faraz Siddiqui

Faraz Siddiqui

July 5, 2018 6:00 AM

No Apps Left Behind on Your Zero Trust Journey

Complexity kills productivity. When it comes to enabling application access, enterprises should not have to choose between user experience and complex techniques that ensure application security. Traditionally, perimeter security is built on an assumption that whatever is inside the perimeter is trusted and users can access any corporate application through traditional authentication approaches. That's a big assumption that has become outdated based on the amount of recent attacks and data

Faraz Siddiqui

Faraz Siddiqui

December 28, 2017 9:00 AM

Trusted access to Wordpress /wp-admin for content Au ...

WordPress started as just a blogging system, but has evolved to be used as a full content management system, and so much more through the thousands of plugins, widgets, and themes. One of the main challenges I have seen with customers is to provide secure access to /wp-admin or /wp-login.php to content authors so that they can make the desired content changes. It seems straight forward, but the real challenge