Putting Purpose First as an Akamai Co-Op

As I began my CSR Co-op position this year, I wanted to see up-close how a corporate foundation works. What I’ve found is that the work the Akamai Foundation does around the world is inspiring! Whether it’s partnering with STEM educators, responding to…

Read More >>

Akamai’s Commitment to Reliability

For more than 20 years, Akamai has worked very hard to earn the trust and confidence of our customers and partners by developing services that can be relied upon to be available and secure at all times.

Read More >>

Zeek in Action Videos

This is a quick note to point blog readers to my Zeek in Action YouTube video series for the Zeek network security monitoring project. Each video addresses a topic that I think might be of interest to people trying to understand their network usin…

Read More >>

Zero Trust Should Not Give IT a Bad Name

Maybe you?ve just found out that your company?s IT organization is implementing Zero Trust. Does that mean they don?t trust you? ?Zero Trust? sure sounds that way. Maybe you?ve read about it online or heard somebody talk about it in terms that equate Z…

Read More >>

Software-Defined Networking Concept Adoption at Akamai

Akamai engineering has adopted new technology concepts to enhance and expand routing capabilities at the edge. Previously, Akamai?s traffic-steering capabilities were mainly focused on DNS-based routing. In this article, we would like to give you an in…

Read More >>

All Access Is (or Should Be) Remote Access

With the transition to remote work, we often hear the term remote access used in unison. Typically, remote work application access is facilitated via a remote access mechanism and, presumably, local work application access is facilitated via a local ac…

Read More >>

Why Zero Trust Needs the Edge

Backhauling traffic destroys performance, and backhauling attack traffic can destroy even more. Nevertheless, in a traditional security deployment model, we are faced with the lose-lose options of either backhauling all traffic to the security stack or…

Read More >>