Get In Touch
Here's what I learned this past holiday season: I'm not alone shopping on my mobile device on Christmas Day and Boxing Day. And while Hollywood actors may take the holidays off, threat actors certainly do not. Let's have a look at some of the numbers. Akamai has a lot of data, but let's look at some of the most interesting tidbits.
The days from Christmas Eve to New Year's Day are filled with celebrations. Many companies shut down and encourage their employees to take vacations. However, a sample of data comparing an average work week around the holiday, shows the idea of "downtime" isn't exactly accurate. In fact, many users are accessing corporate applications even on holidays such as Christmas and New Year's Day, particularly in the United States.
What's the problem? As part of a concerted effort to protect end user privacy and increase browser security, major web browsers have been making changes to their treatment of 3rd party cookies. These changes are designed to cripple ad targeting services that track user behavior online and rely on 3rd party cookies.
Maintaining a high-quality playback experience for users is extremely critical whether it is for on-demand content or for large-scale live events. Origin failures occur when a server is overwhelmed with requests, due to congested networks or other unexpected events. These failures can keep origin responses from getting back to the client; hence, the need for redundant server architectures.
What is GTM Global Traffic Management, or GTM, is a DNS-based load balancing service that offers application owners a level of flexibility and insight that is unmatched by traditional on-prem solutions. Highly scalable and fault-resilient, GTM offers customers a layer of abstraction between endpoints, so traffic can be easily shifted between targets. The platform is not limited to weighted load distribution, however; GTM can execute intelligent routing decisions based on
In the second part of this blog, I covered how HTTPS web content inspection is provided in Akamai's Enterprise Threat Protector (ETP) service using ETP proxy. In this final blog post I want to provide information about how Akamai generates, distributes and controls access to private keys including TLS certificates.
In the first blog post I covered why HTTPS web traffic has grown to unprecedented levels, provided a TLS primer and looked at the basic concept of intercepting and inspecting HTTPS web traffic with Man-In-The-Middle techniques (MITM). In the second part, I will dive a bit deeper into how the TLS MITM capability has been implemented in Akamai's Enterprise Threat Protector (ETP) service.
As part of Akamai's ongoing investments in improving delivery performance, last month we completed the worldwide deployment of the Bottleneck Bandwidth and RTT (BBR) TCP congestion control algorithm across our Edge Platform. The BBR algorithm is designed to help improve the reliability and resiliency of data by optimizing the rate at which it's transmitted over last-mile networks to end users. After more than a year of extensive testing, we've rolled