Easy VPN Transition With Zero Trust Access

Akamai recently announced Enterprise Application Access capabilities designed to improve performance and user experience, as well as provide an easy migration away from VPN, reducing complexity and risk. The new capabilities — IP address-based access, on-premises network detection, and captive portal support — are architected to accelerate large-scale deployments, enhance performance, and help businesses transition to a Zero Trust security model. This free upgrade for Enterprise Application Access customers is seamless. Continue reading Easy VPN Transition With Zero Trust Access

Why Identity Aware Proxies are Key to Adaptive Access Controls

By now, you have likely heard the term "Zero Trust". From tech seminars and industry events to webinars and whitepapers, it is popping up everywhere. CISOs and CTOs are constantly inundated with calls and messages from different vendors proclai… Continue reading Why Identity Aware Proxies are Key to Adaptive Access Controls

Why Identity Aware Proxies are Key to Adaptive Access Controls

By now, you have likely heard the term "Zero Trust". From tech seminars and industry events to webinars and whitepapers, it is popping up everywhere. CISOs and CTOs are constantly inundated with calls and messages from different vendors proclaiming different ways their solutions can help them transition to this security model. At this year’s RSA Conference, there was a deluge of vendors touting Zero Trust security solutions and I could only imagine being in a CISO or CTOs shoes as they debate the right solution for their organization. Continue reading Why Identity Aware Proxies are Key to Adaptive Access Controls

Intercept SaaS Services with the Akamai EAA Client

A requirement that arose from a customer meeting was to deliver a solution to replace Microsoft DirectAccess since the customer was migrating to Windows 10. This is a common theme, with many enterprise customers looking for new security technologies to deliver internal applications to remote employees and third parties. Interest in Zero Trust solutions is quickly ramping up as other large organisations, including Akamai, have already started the Zero Trust journey. For more background on the trend to replace VPNs, please refer to this article. Continue reading Intercept SaaS Services with the Akamai EAA Client

Intercept SaaS Services with the Akamai EAA Client

A requirement that arose from a customer meeting was to deliver a solution to replace Microsoft DirectAccess since the customer was migrating to Windows 10. This is a common theme, with many enterprise customers looking for new security technologies to… Continue reading Intercept SaaS Services with the Akamai EAA Client

I Am The One Who Knocks — Device Posture and Detecting the Danger In Your Devices

Akamai’s Enterprise Application Access can enable enterprises to do just that with its device posture features. These capabilities are designed to give enterprises insights into the devices that are accessing their protected applications and enable mor… Continue reading I Am The One Who Knocks — Device Posture and Detecting the Danger In Your Devices

I Am The One Who Knocks — Device Posture and Detecting the Danger In Your Devices

Akamai’s Enterprise Application Access can enable enterprises to do just that with its device posture features. These capabilities are designed to give enterprises insights into the devices that are accessing their protected applications and enable more informed decisions about security. Device details are essential data points when evaluating any application access and should be considered part of best practices for completing your enterprise’s view of security. Continue reading I Am The One Who Knocks — Device Posture and Detecting the Danger In Your Devices

Software Defined Perimeter – a Modern VPN with Traditional Challenges

Application Servers are implemented as a means of providing services and making resources available to users. However, any server connected to the Internet is inevitably targeted by malicious users using open listening ports. There are millions of thes… Continue reading Software Defined Perimeter – a Modern VPN with Traditional Challenges

Software Defined Perimeter – a Modern VPN with Traditional Challenges

Application Servers are implemented as a means of providing services and making resources available to users. However, any server connected to the Internet is inevitably targeted by malicious users using open listening ports. There are millions of these ports on… Continue reading Software Defined Perimeter – a Modern VPN with Traditional Challenges

Zero Trust and the Case for Application Microsegmentation

Data breaches have become incessant. Recently, a very popular airline sevices company revealed a suspected breach involving customer credit card information. Even more recently, a hospital in Indiana reported that a virus had infected some of its systems that caused… Continue reading Zero Trust and the Case for Application Microsegmentation