EdgeBlog_9.14.20.png

Rethinking Defensive Strategy at the Edge, Part 1: A Changing Landscape for Securing Users

| | Cloud Security, edge, zero trust, zerotrust
In recent years, new enterprise remote access architectures and frameworks have been introduced, such as Zero Trust Access (ZTA). Those concepts have driven changes in the way the network perimeter has been ...
multicloud

Gartner: SASE Poised to Transform Cybersecurity

Research firm Gartner is lending credence to a promising technology called secure access service edge (SASE). SASE is an emerging, disruptive technology that strives to create a secure cloud environment that is ...
Security Boulevard
4 Critical Elements Your Next Security Solution Must Have

4 Critical Elements Your Next Security Solution Must Have

Security is essential to the success of any digital business. But there's one thing you can always count on: security-related incursions are inevitable. And the results can be devastating. Security breaches erode ...
Load Balancing.png

Akamai Load Balancing to Lock-in Quality

| | CDN, dns, edge
As Akamai's Global Traffic Management for Cloud, Data Centers and CDNs blog introduces, Akamai's Intelligent Edge™ platform includes DNS and Layer 7 load balancing capabilities that combine to get users to the ...
GSS at Edge World

GSS at Edge World

| | Corporate, edge, edgeworld
It's a busy time for my team as we prepare for next week's customer conference, EdgeWorld, in Las Vegas. I'm excited for another productive week of interacting and innovating with our customers ...
Protecting the New Online Frontiers: Akamai on Watch

Protecting the New Online Frontiers: Akamai on Watch

| | Cloud Security, edge
At Akamai, security is at the heart of everything we create. After more than two decades on the front lines of the Internet revolution, Akamai continues to pioneer strategies, products, and solutions ...

Application Isolation in the Spotlight

Two major announcements bring application isolation into the spotlight Microsoft and HP elevate the importance of isolation in the endpoint security stack Isolate risky browser activity, but don’t forget files are risky ...
3 Reasons Your Business Needs Security at the Edge

3 Reasons Your Business Needs Security at the Edge

| | Akamai Edge, cloudsecurity, edge
Security at the edge is an approach to defending your business from security threats by deploying defense measures closer to the point of attack and as far away from your assets (your ...
Bromium Secure Browsing Isolates Intelligently and Maximizes Browser Choice

Bromium Secure Browsing Isolates Intelligently and Maximizes Browser Choice

Web browsing is intensely personal, even at work. Users develop strong preferences, tend to lock in a browser early, and are fiercely loyal to their favored choice. Forcing them to change browsers—or ...
Addressing Risk with Subresource Integrity (SRI)

What’s in Your Website? Lurking Risk from Third-party Resources

Address Risk from Third-party Resources with Subresource Integrity (SRI) In most real-life web apps there’s a need to include third-party resources. Whether it is for advertisements, A/B testing, analytics or other purposes, ...