Akamai is the global leader in Content Delivery Network (CDN) services, making the Internet fast, reliable and secure for its customers. The company’s advanced web performance, mobile performance, cloud security and media delivery solutions are revolutionizing how businesses optimize consumer, enterprise and entertainment experiences for any device, anywhere.
Audience Segmentation Cloudlet | Akamai
Connected audiences expect instant, reliable, secure access to websites and applications – from any device, anywhere. Akamai Web Performance Solutions help you engage consumers with fast, personalized online experiences, enabling you to increase revenue opportunities, gain IT agility and scale globally.
Akamai: Kona Web Application Firewall
Online threats are constantly changing. Offering protection against the largest and most sophisticated attacks, Akamai helps you safeguard your websites and other Internet-facing applications from the risks of downtime and data theft.
SaaS Application Delivery Overview with Akamai Manager of Web Performance Marketing Greg Lord
An overview of how SaaS Providers can overcome the challenges with rapid growth, scale, and security of delivering their SaaS applications with Akamai Manager of Web Performance Product Marketing, Greg Lord. Akamai’s Web Performance Solutions enable SaaS Providers to deliver all their SaaS Applications to any user (e.g. – customers, partners, and suppliers), on any device, anywhere in the world by overcoming the inherent challenges related to Internet performance, reliability, and security.
Akamai – Cloud Computing Services
Subscribers expect a broadcast quality experience with engaging video content on any device. Akamai Network Operator Solutions help providers operate a cost-efficient network that capitalizes on traffic growth and new subscriber services by reducing the complexity of building a Content Delivery Network (CDN) and interconnecting it across providers.
Akamai’s Security Intelligence Research Team (SIRT) is conducting research into the security posture of the Internet Key Exchange (IKE & IKEv2) protocol. The paper outlines the findings thus far, including configurations in the protocol itself that attackers could potentially leverage to launch reflected DDoS campaigns.