Get In Touch
The days from Christmas Eve to New Year's Day are filled with celebrations. Many companies shut down and encourage their employees to take vacations. However, a sample of data comparing an average work week around the holiday, shows the idea of "downtime" isn't exactly accurate. In fact, many users are accessing corporate applications even on holidays such as Christmas and New Year's Day, particularly in the United States.
Recently, Gartner published a report called "Market Trends: How to Win as WAN Edge and Security Converge Into the Secure Access Service Edge" that dives into how to enable security and network access controls as-a-service from the cloud. But what is Gartner's SASE (pronounced like "sassy")? The acronym stands for Secure Access Service Edge, and is a concept that merges the functions of network and security point solutions into a
The best partnerships evolve over time and are forged with a common goal. Microsoft and Akamai have partnered for years with the common goal of delivering integrated solutions that address real customer problems. A great example is optimizing global end-user performance for cloud workloads with Akamai CDN technology embedded in the Azure platform. This creates a simple solution for a real problem. Now, Microsoft and Akamai are partnering to provide
We are pleased to share that Akamai has been identified as a Leader in The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019.
In the last two posts, we covered the security fundamentals to migrate to the Cloud and the 10 best practices to secure workloads. In this third post, we will talk about securing access to your AWS workloads.
Shadow networks are side channels to traditional networks, undetected and working quietly in the background alongside what the traditional network was designed to do.
Earlier I wrote about the importance of patching, or more accurately the importance of transferring the need to patch (& the associated risk) to someone else by using their cloud security service. While patching definitely falls into the security fundamentals category it remains as relevant as ever, but it's not the only security best practice we need to collectively remember.
We all heed the gospel of patching, but as recent incidents made clear, even cutting-edge disruptors struggle to patch everything, everywhere, and all the time.
Why a Shift Now? Businesses continue to evolve as digital technologies reshape industries. The workforce is mobile and varied, and speed and efficiency are imperative. This has necessitated dynamic, fluid infrastructures and connectivity, as well as unhindered, secure application access -- from anywhere, on any device, at any time. Leaders must remove hurdles to progress, but new initiatives and processes have increased complexity and expanded the attack surface. The past