Get In Touch
Providing employees with secure access to enterprise applications deployed behind the firewall is a core requirement for all businesses. Increasingly, businesses must also deal with delivering third-party access to critical applications whether hosted in the public cloud or a private data center.
Your cloud-hosted workloads are your "main event". They are your commerce website, your CRM application, your collaboration tools, your partner portal, your corporate website, etc - the engines that drive your business and enable your organization to connect, collaborate, and transact business across a broad group of employees, customers, partners, suppliers, and more. Unlike the making of a motion picture, where you can rehearse and do as many re-takes as
Do you remember playing capture the flag as a kid? I sure do! My friends and I would split up into even teams - usually about 6 kids per team. Then each team would hide our precious flag on our side of the backyard. Now the important "strategery" comes into play once the game actually begins, as I found the winning formula was to make sure my teammates all spread
In the words of the great Peter Drucker "if you can't measure it, you can't manage it". This is especially true when it comes to managing performance in the Cloud. Most organizations rely on the standard performance monitor tooling that is offered by their Cloud Provider, which only provides basic insights into the health of the infrastructure within the data center. But what about what's happening outside the data center?
Or is it?! Do you feel burnt out on hearing from vendors who don't have any new or interesting perspectives to share on the seemingly overplayed topic of Cloud? As a former IT Manager myself, I feel you. That's why I sought out an expert, Jason Fuller, to share his insights and best practices for designing cloud architectures. I wanted to get an unbiased perspective from a guy who has
Akamai's next "Girls Who Code" summer immersion program is still a couple of months away, but in the meantime I wanted to tell you about our involvement with another fantastic organization inspiring girls to pursue tech careers - the Girl Scouts.
Are you delivering or thinking of delivering your web presence or application through a CDN? The many reasons to do so are well documented. Your site will be faster, more reliable, and you will require less data centre bandwidth and infrastructure. All this leads to a better user experience, which affects profitability, customer retention, conversation rates, etc. But this post isn't about why you should use a CDN. We're going
Your web application by default is accessible to the entire planet. This exposure can open your site up to unnecessary risk. Akamai's Request Control Cloudlet can quickly allow or deny access to website content based on the IP or Geography associated with an inbound request. For example, you may deny access to users in embargoed countries or allow it only to a specific region where your users live. Manage the
In my last articles I introduced the idea of how simple is the concept of a WAF (although implementing a reliable WAF system is not that simple), what are false positives and false negatives and the best approach to trade-off between them, what is the impact of wide visibility when it comes to build a WAF, the importance of having a solid team of experts backing up a WAF solution,