dnssecurity
Compromised enterprise devices detection based on abnormal behavior patterns– UEBA in action
Recently, many reports of incidents have been making headlines, proving that no business or industry is immune to advanced threat actors. Applying user and entity behavior analytics (UEBA) for the challenging task ...
Distinguishing Among DNS Services Part 3: Investment and Innovation
This is Part 3 of a 3-part blog series highlighting some of the distinguishing aspects of Akamai's authoritative DNS services, Edge DNS and Global Traffic Management. Part 1 focused on Akamai's DNS ...
Distinguishing Among DNS Services Part 2: The Economics
This is Part 2 of a 3-part blog series highlighting some of the distinguishing aspects of Akamai's DNS services, Edge DNS and Global Traffic Management. Part 1 focused on Akamai's DNS platform ...
Distinguishing Among DNS Services Part 1: The Platform
This is Part 1 of a 3-part blog series highlighting some of the distinguishing aspects of Akamai's DNS services, Edge DNS and Global Traffic Management. To begin the series, we focus on ...
Demonstrate Commitment, Differentiate Services, Develop Opportunities
Everything's mobile -- especially today, when running a business is harder than ever -- and responsiveness is everything. Staying ahead of the curve means workers may need to operate in "always available" ...
Architecting DNS for DDoS Durability and Resilience
After many years of hard work from many Internet engineers and system administrators, Akamai Technologies has been working towards DNS infrastructure that would be ready for service 24/7, 365 days a year ...