Applications-Small.png

New Admin Portal for Akamai Enterprise Application Access

The definition of a user has evolved to comprise much more than an employee, making secure access to the right application, for the right user, at the right time difficult and complex ...
Authentication: Lessons Learned from Microsoft Exchange and F5 BIG-IP Hacks

Authentication: Lessons Learned from Microsoft Exchange and F5 BIG-IP Hacks

The past month has been a very dynamic time in the world of security for hackers and threat researchers, but it has been an extended nightmare for CSOs responsible for securing their ...
1084 MP-27664 IMG_Blog Post Image_700x400_B.jpg

Akamai + Fingerbank: How an open source community can transform security

Isn't it amazing how seemingly simple decisions can have far-reaching effects? When the Inverse team in Montreal took over PacketFence in 2008, it was an open source (OS) solution. They recognized the ...
What's New in Security, Part 2

What’s New in Security, Part 2

Welcome to the Akamai Platform Update! We're presenting an entire week of learning about Akamai's recent product updates. Each day, we'll highlight our latest innovations in each area of the Akamai Intelligent ...
Day4_Blog2_EAA1.jpg

Better Together: Akamai Enhances Zero Trust Network Access with CrowdStrike

More than ever before, users and applications no longer reside at the office. Organizations are managing a mobile and globally distributed workforce that needs access to corporate systems, applications, and data from ...