Get In Touch
Like many people around the world, my hair has grown profusely in the past few months and bears little resemblance to the photo in my profile. Without the required care and attention, my hair is getting dangerously close to the bad hairstyles I adopted in the 1980s.
Customers are in the process of replacing their legacy proxy/WAM solutions with modern Identity-Aware Proxies to enable Zero Trust access to business applications and services. Akamai's Identity Aware proxy enables secure remote access for end users from anywhere, on any device, to business applications hosted across multiple data centers using modern cloud and Zero Trust principles.
The days from Christmas Eve to New Year's Day are filled with celebrations. Many companies shut down and encourage their employees to take vacations. However, a sample of data comparing an average work week around the holiday, shows the idea of "downtime" isn't exactly accurate. In fact, many users are accessing corporate applications even on holidays such as Christmas and New Year's Day, particularly in the United States.
Recently, Gartner published a report called "Market Trends: How to Win as WAN Edge and Security Converge Into the Secure Access Service Edge" that dives into how to enable security and network access controls as-a-service from the cloud. But what is Gartner's SASE (pronounced like "sassy")? The acronym stands for Secure Access Service Edge, and is a concept that merges the functions of network and security point solutions into a
The best partnerships evolve over time and are forged with a common goal. Microsoft and Akamai have partnered for years with the common goal of delivering integrated solutions that address real customer problems. A great example is optimizing global end-user performance for cloud workloads with Akamai CDN technology embedded in the Azure platform. This creates a simple solution for a real problem. Now, Microsoft and Akamai are partnering to provide
We are pleased to share that Akamai has been identified as a Leader in The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019.
In the last two posts, we covered the security fundamentals to migrate to the Cloud and the 10 best practices to secure workloads. In this third post, we will talk about securing access to your AWS workloads.
Shadow networks are side channels to traditional networks, undetected and working quietly in the background alongside what the traditional network was designed to do.
Earlier I wrote about the importance of patching, or more accurately the importance of transferring the need to patch (& the associated risk) to someone else by using their cloud security service. While patching definitely falls into the security fundamentals category it remains as relevant as ever, but it's not the only security best practice we need to collectively remember.