Get In Touch
Recently by Jano van Deventer
My colleague in Spain recently wrote an informative article about DNS Protection and why it's a must-have security solution for any company. Building out on this topic, I would like to look specifically at the Education market and what the consequences can be if DNS Visibility is not taken seriously. I will also share some insight in the results that we typically see when we run proof of concepts with
I was quite fortunate to visit Tokyo for the first time last year, and it was an unforgettable experience to explore all the sights and sounds around the Ginza district and to interact with the very friendly Japanese people. It wasn't all play, though -- and I had to get some real work done as well.
By Jano van Deventer and Andrew Terranova This is Part 3 of a 5 part blog series. Jump to Part 1: Introduction Jump to Part 2: Network Micro-Segmentation Jump to Part 4: Identity Aware Proxy Jump to Part 5: Akamai's Approach to Zero Trust Introduction In the first part of this blog series, we covered an overview of zero trust security architecture concepts. The main concept is that trust should
In my experience as a Solutions Engineer, I've seen many companies strive for 100% uptime of enterprise applications. However, this is a goal that cannot happen by itself. Careful thought must be put into the underlying architecture that delivers these critical enterprise applications.