Akamai Diversity

The Akamai Blog

Phishing is an extremely common attack vector that has been used for many years, and the potential impact and risks involved are well known to most Internet users. Despite this, phishing is still a highly relevant attack method being used in the wild, affecting many people. The question is, how can a security threat continue to have a significant impact, even though many Internet users know about the risks and potential impact? Akamai's Enterprise Threat Research team decided to dive deeper into several recent phishing scams to provide insights into the modern phishing scam landscape and what makes these campaigns an effective and an ongoing security threat.

 A common misconception I've heard in the field is that a tradeoff exists between easy access for applications and network security. For example, companies want to allow their sales team, partners, and prospects access into demo environments. With traditional access solutions, there is a question of who gets what level of access. Issues like intellectual property exposure, open attack surfaces, and multiple untracked users add to the complication. Beyond demo access, demo creation and support is challenging to keep under control - platforms move swiftly from one release to the next and environments are moved around on-prem or into the cloud. Naturally, my response to all of this is: Akamai has the solution! Enterprise Application Access (EAA) supports all the above scenarios, allows visibility, and (for our EU friends) is GDPR compliant.

Who is doing what on your network?

Over the past few months, while talking to customers, the topic of Zero Trust Architecture keeps coming up. Seemingly everyone is thinking of implementing the model - which we fully encourage! One of the core components of the principle is the ability to inspect and log all network and system traffic. This often leads me to highlight how Akamai's Enterprise Application Access (EAA) solution provides visibility for our customers into the number of third party contractors connecting into their infrastructure - insight often unavailable with traditional access solutions. With a traditional access solution, contractors are allowed into the network by configuring a VPN and establishing an SSH session or exposing devices/appliances in the DMZ.

Addressing the Availability of the ACAEngine

In my experience as a Solutions Engineer, I've seen many companies strive for 100% uptime of enterprise applications. However, this is a goal that cannot happen by itself. Careful thought must be put into the underlying architecture that delivers these critical enterprise applications.

Take a Tour of New Routed Dashboard

As a product manager, there are few things more rewarding than finally putting your product into the hands of your customer for the first time. We've been working on the new Routed Dashboard for some time, and I've personally spoken to many of you in terms of what would make our new interface more intuitive, more powerful, and frankly, more useful to you in understanding what Akamai is doing to protect your applications and infrastructure. A picture is worth a thousand words, so rather than continue typing, I wanted to take you on a video tour of the new Routed Dashboard. Enjoy.

Actionable Threat Intelligence, Tailored to You

We are very excited to be launching the next generation of our Client Reputation product. This update takes Client Reputation a huge step further in providing our customers with truly actionable intelligence tailored for them. It computes an even better assessment of the real risk that every individual client device presents to the customer. We now enable significantly greater visibility into the activity performed by those clients on both their websites as well as across the entire Akamai platform.

alt text

Traditional RUM products make use of APIs (Navigation-Timing, Resource-Timing, etc.) built into browsers to help measure the performance characteristics of the loading of a web page. That is, they do their best to quantify the work required by the browser when rendering a web page.

Akamai 2018 Spring Release, In A Nutshell

Progressing Towards Our Future in The Cloud, Together

As organizations continue to fuel and execute on their digital transformation ambitions, they're increasingly finding significant business agility and cost savings by adopting cloud, multi-cloud, or hybrid architectures. Availability, security, and maximization of user experience are the top goals for organizations adopting these architectures.

However, the "availability" promise of your cloud infrastructure may not necessarily extend to promise "accessibility'" of workloads, applications, and data for every single end user, regardless of their device, network, or global location. 

The truth is...you need both!  A cloud infrastructure optimized for high availability combined with a cloud delivery platform optimized for security, high accessibility, and performance. 

Akamai's comprehensive and integrated intelligent cloud delivery platform has been serving as a crucial foundation for our customers' growing digital businesses by helping them deliver the amazing digital experiences their end users expect.

TLS 1.3 support is coming this spring

While March brings NCAA Madness, this year it also brought TLS 1.3, which will be coming to all Akamai customers soon!  Let's give some background.

Perception Matters: Making RUM More Real

blog2pic1.pngTraditional nav timing metrics have given us a lot in the way of understanding how our pages and apps are performing, but as users' expectations rise and page complexity grows, you need to really understand how users are perceiving the performance of your website beyond traditional page load timing. The goal of the new perceived performance metrics is to capture other important aspects of your visitor's overall experience during page load and beyond.