Akamai Diversity

The Akamai Blog

Tim Knudsen

Tim Knudsen

November 5, 2019 10:30 AM

Akamai and Microsoft: Delivering a Better Zero Trus ...

The best partnerships evolve over time and are forged with a common goal. Microsoft and Akamai have partnered for years with the common goal of delivering integrated solutions that address real customer problems. A great example is optimizing global end-user performance for cloud workloads with Akamai CDN technology embedded in the Azure platform. This creates a simple solution for a real problem. Now, Microsoft and Akamai are partnering to provide

Beth Barach

Beth Barach

October 11, 2019 3:00 PM

Walk/Don't Walk: Secure, Intelligent Application Acc ...

Digital business transformation has meant a continued shift in the way organizations think about secure access. The focus on security has moved away from data centers and toward users. Workforce productivity, flexibility, and application performance are driving the demand to give users cloud-delivered secure access from the edge.

Sumit Bahl

Sumit Bahl

July 29, 2019 3:59 PM

Easy VPN Transition With Zero Trust Access

Akamai recently announced Enterprise Application Access capabilities designed to improve performance and user experience, as well as provide an easy migration away from VPN, reducing complexity and risk. The new capabilities -- IP address-based access, on-premises network detection, and captive portal support -- are architected to accelerate large-scale deployments, enhance performance, and help businesses transition to a Zero Trust security model. This free upgrade for Enterprise Application Access customers is

Chinedu Egonu

Chinedu Egonu

July 24, 2019 11:50 AM

Why Identity Aware Proxies are Key to Adaptive Acces ...

By now, you have likely heard the term "Zero Trust". From tech seminars and industry events to webinars and whitepapers, it is popping up everywhere. CISOs and CTOs are constantly inundated with calls and messages from different vendors proclaiming different ways their solutions can help them transition to this security model. At this year's RSA Conference, there was a deluge of vendors touting Zero Trust security solutions and I could

Jano van Deventer

Jano van Deventer

June 25, 2019 11:00 AM

Intercept SaaS Services with the Akamai EAA Client

I was quite fortunate to visit Tokyo for the first time last year, and it was an unforgettable experience to explore all the sights and sounds around the Ginza district and to interact with the very friendly Japanese people. It wasn't all play, though -- and I had to get some real work done as well.

James Chan

James Chan

June 3, 2019 9:00 AM

I Am The One Who Knocks -- Device Posture and Detect ...

With growing mobile and remote workforces, enterprises must allow many different device types to access their applications in the name of productivity and flexibility. Traditional, perimeter-based security methods are no longer viable due to complexity, maintenance overhead, and inherently insecure model. Instead, businesses should shift their focus to verifying who and what is accessing a network and eliminating the perimeter.

Faraz Siddiqui

Faraz Siddiqui

January 29, 2019 2:21 PM

Software Defined Perimeter - a Modern VPN with Tradi ...

Application Servers are implemented as a means of providing services and making resources available to users. However, any server connected to the Internet is inevitably targeted by malicious users using open listening ports. There are millions of these ports on the Internet, which means there is plenty of opportunity to exploit these open services.

Chinedu Egonu

Chinedu Egonu

December 31, 2018 10:43 AM

Zero Trust and the Case for Application Microsegment ...

Data breaches have become incessant. Recently, a very popular airline sevices company revealed a suspected breach involving customer credit card information. Even more recently, a hospital in Indiana reported that a virus had infected some of its systems that caused the hospital to be placed on diversion. A disaster recovery software company also admitted that a breach of its marketing databases occurred. If that isn't enough, an online electronics retailer

Maria Ramirez

Maria Ramirez

December 19, 2018 2:36 PM

Zero Trust Security Protects Businesses while Enabli ...

Many companies have their own applications, internal domains, and local area network (LAN). But when it comes to business applications, organizations are increasingly dependent on cloud-based resources. These may include email servers, customer relationship management (CRM) software, or other applications. However, when access to internal machines by external users is necessary, the most common solutions are centered on virtual private networks (VPNs).