Akamai Diversity

The Akamai Blog

Jim Black

Jim Black

May 9, 2018 10:15 AM

Your Users Have Left the Building: Now What?

The dramatic growth of mobile devices, the widespread availability of always-on fast wireless networks, and the rapid adoption of cloud applications have transformed the viability of remote working. Employers are increasingly adopting flex schedules, implementing work from home options, and otherwise enabling their employees to work "off the grid". Here at Akamai, my coworkers can be found all over the globe - setting up shop in places like hotels, coffee

John Summers

John Summers

May 9, 2018 10:10 AM

John Summers Q&A - Evanta Global CIO Executive Summi ...

Akamai's John Summers, VP & CTO, spoke at the recent Evanta Global CIO Executive Summit, a gathering of 75 major organization CIOs. His session was titled, "Cloud Security - Adopt Zero Trust and Put Asset-Level Safeguards in Place." Here are some of the key questions he addressed.

Shaun Tamblin

Shaun Tamblin

May 8, 2018 8:17 AM

Make Application Access IT-Friendly

More and more companies are looking at alternatives to VPNs due to the security risks associated with network level access. And increasingly, the goal is to eliminate network trust through a zero trust architecture - which is one of the primary reasons many of these organizations are deploying Akamai's Enterprise Application Access (EAA) and Enterprise Threat Protector solutions. However, for EAA in particular, another key driver and unique differentiator is

Tommy Cormier

Tommy Cormier

May 3, 2018 8:18 AM

Zero Trust and the Identity

Digital transformation is occurring faster than most people realize, and is impacting every component of the IT organization. Some of the many catalysts include users and applications moving outside the traditional perimeter, users accessing applications that are anywhere, and utilizing many different types of devices. IT organizations are now challenged to keep pace with this transformation, while simultaneously ensuring critical resources are protected.

Or Katz

Or Katz

May 3, 2018 8:14 AM

Phishing in the Wild: A New Threat Research Paper

Phishing is an extremely common attack vector that has been used for many years, and the potential impact and risks involved are well known to most Internet users. Despite this, phishing is still a highly relevant attack method being used in the wild, affecting many people. The question is, how can a security threat continue to have a significant impact, even though many Internet users know about the risks and

Michael Strobl

Michael Strobl

May 2, 2018 9:27 AM

How to Make Your Demo Environment Easy, Accessible.. ...

A common misconception I've heard in the field is that a tradeoff exists between easy access for applications and network security. For example, companies want to allow their sales team, partners, and prospects access into demo environments. With traditional access solutions, there is a question of who gets what level of access. Issues like intellectual property exposure, open attack surfaces, and multiple untracked users add to the complication. Beyond

Benny Tan

Benny Tan

April 25, 2018 2:49 PM

Who is doing what on your network?

Over the past few months, while talking to customers, the topic of Zero Trust Architecture keeps coming up. Seemingly everyone is thinking of implementing the model - which we fully encourage! One of the core components of the principle is the ability to inspect and log all network and system traffic. This often leads me to highlight how Akamai's Enterprise Application Access (EAA) solution provides visibility for our customers into

Jano van Deventer

Jano van Deventer

April 20, 2018 11:48 AM

Addressing the Availability of the ACAEngine

In my experience as a Solutions Engineer, I've seen many companies strive for 100% uptime of enterprise applications. However, this is a goal that cannot happen by itself. Careful thought must be put into the underlying architecture that delivers these critical enterprise applications.

Craig Sparling

Craig Sparling

April 16, 2018 6:00 AM

Take a Tour of New Routed Dashboard

As a product manager, there are few things more rewarding than finally putting your product into the hands of your customer for the first time. We've been working on the new Routed Dashboard for some time, and I've personally spoken to many of you in terms of what would make our new interface more intuitive, more powerful, and frankly, more useful to you in understanding what Akamai is doing