Akamai Diversity

The Akamai Blog

Or Katz

Or Katz

September 16, 2020 8:00 AM

Rethinking Defensive Strategy at the Edge, Part 2: R ...

In the first post in our blog series Rethinking Defensive Strategy at the Edge, we began to outline why a new defensive edge strategy is needed for today's enterprise. As previously mentioned, the strategy enhances those in place and introduces another layer of defense that includes the following three components: data and indicators, risk-based signals and entities, and protective actions. This post explores user entities as well as risk-based signals

Or Katz

Or Katz

September 14, 2020 8:00 AM

Rethinking Defensive Strategy at the Edge, Part 1: A ...

In recent years, new enterprise remote access architectures and frameworks have been introduced, such as Zero Trust Access (ZTA). Those concepts have driven changes in the way the network perimeter has been defined -- specifically, from the outside in, not the inside out. Access to applications and services usually start from users and devices outside of traditional on-premises network perimeters.

Paul Jackson

Paul Jackson

August 12, 2020 2:15 PM

The Publishing Industry -- Where to Now?

Many of us have spent far more time at home looking at screens to keep up to date with the world than would have seemed possible at the start of the year. In the UK, as with many other countries, the lockdown rules and pandemic response were changing on a near-daily basis, and the 5 PM government briefing became a regular fixture of the evening news. Unsurprisingly, those media firms

Jim Black

Jim Black

July 9, 2020 12:30 PM

The Children's Internet Protection Act (CIPA)

What Is CIPA? Enacted in 2000 by the United States Congress, the Children's Internet Protection Act (CIPA) limits children's exposure to explicit internet material such as obscene content. CIPA mandates that K-12 schools and public libraries must deploy technologies that filter this type of content on internet-connected computers in order to be eligible for federal funding such as E-Rate.

Chinedu Egonu

Chinedu Egonu

July 7, 2020 9:00 AM

The Only Constant Is Change -- Rethinking Secure Acc ...

It seems like a long time ago now when IT teams had their annual strategy meeting, where topics related to network modernization with SASE or SD-WANs, remote access, threat prevention, and cloud adoption were likely discussed. COVID-19, however, has caused a lot of these initiatives to take a backseat and put the spotlight on business continuity.

Richard Meeus

Richard Meeus

June 26, 2020 10:20 AM

Time for a Haircut

Like many people around the world, my hair has grown profusely in the past few months and bears little resemblance to the photo in my profile. Without the required care and attention, my hair is getting dangerously close to the bad hairstyles I adopted in the 1980s.

Sanjay Sadarangani

Sanjay Sadarangani

April 28, 2020 1:35 PM

Accelerate Migration from Legacy WAM While Enabling ...

Customers are in the process of replacing their legacy proxy/WAM solutions with modern Identity-Aware Proxies to enable Zero Trust access to business applications and services. Akamai's Identity Aware proxy enables secure remote access for end users from anywhere, on any device, to business applications hosted across multiple data centers using modern cloud and Zero Trust principles.

Or Katz

Or Katz

January 23, 2020 12:30 PM

Zero Trust Access: Santa Claus Wasn't the Only One W ...

The days from Christmas Eve to New Year's Day are filled with celebrations. Many companies shut down and encourage their employees to take vacations. However, a sample of data comparing an average work week around the holiday, shows the idea of "downtime" isn't exactly accurate. In fact, many users are accessing corporate applications even on holidays such as Christmas and New Year's Day, particularly in the United States.

Lorenz Jakober

Lorenz Jakober

November 13, 2019 11:00 AM

Security at the Edge - What is Gartner's SASE & why ...

Recently, Gartner published a report called "Market Trends: How to Win as WAN Edge and Security Converge Into the Secure Access Service Edge" that dives into how to enable security and network access controls as-a-service from the cloud. But what is Gartner's SASE (pronounced like "sassy")? The acronym stands for Secure Access Service Edge, and is a concept that merges the functions of network and security point solutions into a