Akamai Diversity

The Akamai Blog

Why moats and castles belong in the past

We are all familiar with the enterprise security approach of treating an organization like a castle, and protecting it with a moat. Moats have been used for perimeter defense since ancient Egypt. While the moat and castle enterprise security approach has worked well in the past it is starting to show its age.

From an IT management perspective, remote access management can be complex. Deployment, administration, testing and compliance is often multifaceted and time consuming, and security is an on-going concern.

With the acquisition of Soha Systems, Akamai's vision of bringing a simpler, more secure access approach to the enterprise is now available. We have blogged about this, most notably an excellent piece penned by Lorenz Jakober titled "Secure Enterprise Access Needs to Evolve".

The big picture - images matter to customers

There is no doubt that images sell. On websites, the use of pictures not only illustrates a product, it encourages emotional engagement. A study by Nielsen[1] found that 63% of shoppers on mobile and tablet devices ranked product images first in importance over any other content on the page. So, what are you doing about the images on your website?

UK broadband connection speeds - the devil in the detail

On March 8th, Akamai released the Fourth Quarter 2016, State of the Internet / Connectivity Report, which gives a global view of internet connectivity trends as observed across the Akamai Intelligent Platform.  It is always an interesting read, and looking back over the report's history since its first publication in 2009, we can really see how much traffic trends and speeds have evolved.  The 'high broadband' category was then defined as speeds above 5Mbps, and had a global adoption rate of 16%.  According to the report's editor, David Belson, we are now seeing 15Mbps adoption rates at 25% worldwide!

In January Akamai launched Enterprise Application Access (EAA), a new solution designed to help companies address one of the biggest headaches they have: simplifying remote and third-party application access while maintaining the security of the enterprise.  For the IT department, there are two main challenges with making simple, secure remote access a reality:

As we know, enterprises have come a long way from the days when a few remote users needed access to a handful of applications. Now, applications can live in data centers, in AWS, in Azure - in reality, anywhere on the Internet.

So who really needs to access these enterprise apps?

A reminder of the importance of security

Recently the UK Office for National Statistics released its latest statistical bulletin for the Crime Survey for England and Wales: Year Ending September 2016.  The survey covers all reported crime (6.2 million incidents) and whilst it shows no statistically significant change on the preceding report, there was some interesting data related to computer crime.

Missed the rest of series? Click for Part 1 and Part 2

With the best will in the world and great planning, even the most stable websites occasionally suffer an unexpected outage. Your web operations team is charged with managing the risk of these unforeseen situations and they need to recognise that images are just as vital to your disaster recovery and business continuity plans.

Missed the start of series? Click for Part 1

We all know that a good mobile strategy is important to reach and engage customers. Responsive web design (RWD) improves the design and layout for a better mobile experience. However, images also need a mobile strategy.

<< 1 2 3