Simplifying Data Center and IaaS Visibility and Protection

Simplifying Data Center and IaaS Visibility and Protection

Helping customers further secure their on-premises data centers and IaaS deployments is an interesting new use case for our Enterprise Threat Protector service ... Read More
COVID-19 and the Perfect Security Storm

COVID-19 and the Perfect Security Storm

| | Cloud Security
The global pandemic has resulted in a dramatic shift to home working. This has created a perfect security storm that has dramatically increased the security risk for enterprises. The best worst-case scenario is that a single device used by an ... Read More
Business Continuity and Security in an Uncertain Global Environment

Business Continuity and Security in an Uncertain Global Environment

The need for companies to quickly enable remote access to business-critical applications was highlighted in a recent Akamai blog -- Enabling Business Continuity in an Uncertain Global Environment ... Read More
Akamai Enhances Enterprise Threat Protector to Add Secure Web Gateway Capabilities

Akamai Enhances Enterprise Threat Protector to Add Secure Web Gateway Capabilities

Today, Akamai announced that it has added secure web gateway (SWG) capabilities to its Enterprise Threat Protector (ETP) service to help enterprises further accelerate their transformation to a Zero Trust security architecture. So what are the SWG enhancements and what ... Read More
tlstlsone.png

Inspecting TLS Web Traffic – Part 3

| | Enterprise Threat Protector
In the second part of this blog, I covered how HTTPS web content inspection is provided in Akamai's Enterprise Threat Protector (ETP) service using ETP proxy. In this final blog post I want to provide information about how Akamai generates, ... Read More
tlsone.png

Inspecting TLS Web Traffic – Part 2

| | Enterprise Threat Protector
In the first blog post I covered why HTTPS web traffic has grown to unprecedented levels, provided a TLS primer and looked at the basic concept of intercepting and inspecting HTTPS web traffic with Man-In-The-Middle techniques (MITM). In the second ... Read More
Inspecting TLS Web Traffic - Part 1

Inspecting TLS Web Traffic – Part 1

| | Enterprise Threat Protector
In this series of blogs I'm going to talk about how the continued move towards all web traffic being encrypted has impacted enterprise security. In this blog I'm going to focus on the basics - what is encrypted web traffic ... Read More
dns one.jpg

The Benefits of a Single Provider DNS Platform

| | dns
I've written in previous blogs about the value of using DNS as a security control point and how using a DNS based security solution like Akamai's Enterprise Threat Protector can help accelerate your transition to a Zero Trust security approach ... Read More
Firefox DNS over HTTPS (DoH) and Enterprise Threat Protector

Firefox DNS over HTTPS (DoH) and Enterprise Threat Protector

Recursive DNS communications are normally unencrypted between a client and a resolver. In an effort to improve user privacy and address security concerns, Mozilla announced it would begin enabling DNS over HTTPS (DoH) by default in its Firefox browser. However, ... Read More
rt phishing one.png

Real-Time Phishing Protections

In my previous blogs, I wrote about how phishing is no longer just an email problem, how the industrialization of phishing is being driven by the easy availability and low cost of phishing toolkits, and how current phishing defenses are ... Read More
Loading...