Recap_Blog3_pic1_Day5.png

What’s Next in Security

Whenever we talk about what's next for Akamai's security portfolio, we clearly want to look at the challenges that are top of mind for our customers -- both today and tomorrow. And ...
What's New in Security, Part 2

What’s New in Security, Part 2

Welcome to the Akamai Platform Update! We're presenting an entire week of learning about Akamai's recent product updates. Each day, we'll highlight our latest innovations in each area of the Akamai Intelligent ...
Day4_Blog2_EAA1.jpg

Better Together: Akamai Enhances Zero Trust Network Access with CrowdStrike

More than ever before, users and applications no longer reside at the office. Organizations are managing a mobile and globally distributed workforce that needs access to corporate systems, applications, and data from ...
Enterprise Application Access Client (EAA) Vulnerability (CVE-2019-18847)

Enterprise Application Access Client (EAA) Vulnerability (CVE-2019-18847)

On October 15, 2019, Tesla discovered, and responsibly disclosed, a vulnerability within Akamai's Enterprise Application Access (EAA) client that allows privilege escalation and remote code execution (RCE) when an attacker is within ...
Figure 1.jpg

Working from Home — The New Threat Frontier

The emergence of the COVID-19 outbreak dramatically changed and disrupted the normal routines of our personal and professional lives. It led us to stay inside and work from home. It altered our ...
EAA_DanHall blog.png

Enterprise Application Access Increases Security for Your Enterprise Applications — and the Data Behind Them

Companies all over the world are moving rapidly to enable their entire workforce to work remotely due to the current environment. Akamai's Enterprise Application Access solution is designed to provide fast and ...
WAMtoZT blog pic.png

Accelerate Migration from Legacy WAM While Enabling Zero Trust Access with EAA and Single-Host Access

Customers are in the process of replacing their legacy proxy/WAM solutions with modern Identity-Aware Proxies to enable Zero Trust access to business applications and services. Akamai's Identity Aware proxy enables secure remote ...
Enabling Workforce Productivity in Challenging Times

Enabling Workforce Productivity in Challenging Times

As the world shifts to an increasingly virtual environment, Akamai continues to be at the forefront of helping customers enable workforce productivity with Akamai's Enterprise Application Access and Enterprise Threat Protector. From ...
Akamai and Microsoft: Delivering a Better Zero Trust Access Model for the Hybrid Enterprise Together

Akamai and Microsoft: Delivering a Better Zero Trust Access Model for the Hybrid Enterprise Together

The best partnerships evolve over time and are forged with a common goal. Microsoft and Akamai have partnered for years with the common goal of delivering integrated solutions that address real customer ...
walk one.jpg

Walk/Don’t Walk: Secure, Intelligent Application Access with Enhanced Security Signals

Digital business transformation has meant a continued shift in the way organizations think about secure access. The focus on security has moved away from data centers and toward users. Workforce productivity, flexibility, ...