Get In Touch
In the first post in our blog series Rethinking Defensive Strategy at the Edge, we began to outline why a new defensive edge strategy is needed for today's enterprise. As previously mentioned, the strategy enhances those in place and introduces another layer of defense that includes the following three components: data and indicators, risk-based signals and entities, and protective actions. This post explores user entities as well as risk-based signals
In recent years, new enterprise remote access architectures and frameworks have been introduced, such as Zero Trust Access (ZTA). Those concepts have driven changes in the way the network perimeter has been defined -- specifically, from the outside in, not the inside out. Access to applications and services usually start from users and devices outside of traditional on-premises network perimeters.
Many of us have spent far more time at home looking at screens to keep up to date with the world than would have seemed possible at the start of the year. In the UK, as with many other countries, the lockdown rules and pandemic response were changing on a near-daily basis, and the 5 PM government briefing became a regular fixture of the evening news. Unsurprisingly, those media firms
What Is CIPA? Enacted in 2000 by the United States Congress, the Children's Internet Protection Act (CIPA) limits children's exposure to explicit internet material such as obscene content. CIPA mandates that K-12 schools and public libraries must deploy technologies that filter this type of content on internet-connected computers in order to be eligible for federal funding such as E-Rate.
It seems like a long time ago now when IT teams had their annual strategy meeting, where topics related to network modernization with SASE or SD-WANs, remote access, threat prevention, and cloud adoption were likely discussed. COVID-19, however, has caused a lot of these initiatives to take a backseat and put the spotlight on business continuity.
Like many people around the world, my hair has grown profusely in the past few months and bears little resemblance to the photo in my profile. Without the required care and attention, my hair is getting dangerously close to the bad hairstyles I adopted in the 1980s.
Customers are in the process of replacing their legacy proxy/WAM solutions with modern Identity-Aware Proxies to enable Zero Trust access to business applications and services. Akamai's Identity Aware proxy enables secure remote access for end users from anywhere, on any device, to business applications hosted across multiple data centers using modern cloud and Zero Trust principles.
The days from Christmas Eve to New Year's Day are filled with celebrations. Many companies shut down and encourage their employees to take vacations. However, a sample of data comparing an average work week around the holiday, shows the idea of "downtime" isn't exactly accurate. In fact, many users are accessing corporate applications even on holidays such as Christmas and New Year's Day, particularly in the United States.
Recently, Gartner published a report called "Market Trends: How to Win as WAN Edge and Security Converge Into the Secure Access Service Edge" that dives into how to enable security and network access controls as-a-service from the cloud. But what is Gartner's SASE (pronounced like "sassy")? The acronym stands for Secure Access Service Edge, and is a concept that merges the functions of network and security point solutions into a