Skip navigation
All Places > Tech Square > Blog
1 2 Previous Next

Tech Square

30 posts

Continuous scalability testing as part of the application development lifecycle:

 

This webinar is designed for the technical expert, who is responsible for the user experience and performance of your web and mobile applications.

 

Gone are the days when architects and developers would "throw apps over the wall," and hope that the operations team would catch it and get it running. Today, with advancements in integration and deployment workflows, companies have more control over their apps and better outcomes than ever before.

 

During this session, you'll learn about key considerations and tools available to companies looking to scale to meet the ever-demanding needs of their audiences.

 

 

For any questions please comment below and we will get back to you at the earliest

This webinar is designed for the technical expert, who is responsible for the user experience and performance of your web and mobile applications.

 

Just because you can make something faster doesn't mean it's the right thing to make faster.

 

While Real User Monitoring can be a powerful tool in understanding how your audience engages with your site, it doesn't necessarily provide you with the insight you need in order to understand how site performance is impacting your business.

 

In this session, you'll learn from actual case studies how customers have used data insight to align their key business success factors with their performance investment strategies. You'll also begin to understand how you can adopt these strategies to guide your own performance investment in your company.

 


 

For any questions please comment below and we will get back to you at the earliest

This webinar is designed for the technical expert, who is responsible for the user experience and performance of your web and mobile applications.

 

Performance engineers have more data than ever before regarding their web applications and how their users are experiencing those sites. And yet, developers are at constant risk of developing products that fail to connect with their audiences.

 

In this session, you'll hear from two Akamai experts who have deep experience in investigating, identifying, and optimizing performance issues for some of the biggest online brands. They'll share their insights and recommendations for developers who are engaged in the daily battle to build impactful online experiences.

 

 

For any questions please comment below and we will get back to you at the earliest

This webinar is designed for the technical expert, responsible for the performance and security of your organization’s web infrastructure.This session will focus on: Accelerating and Securing your APIs.

 

Regardless of industry, online experiences, including single page web apps or native mobile applications, increasingly rely on APIs to transport the data that drives a positive end user experience. Favorable user experiences require APIs to be timely and effortlessly responsive. Therefore, APIs must be also be resilient against possible attacks.

 

In this session you’ll hear from two technical experts, focusing on trends and overall opportunities of delivering API traffic on the Akamai platform. The discussion will include:

  • Caching
  • Acceleration
  • Authentication
  • Security concerns

Listen to our experts in this deep dive interactive session on Accelerating and Securing your APIs. We will demonstrate the capabilities available on Akamai’s platform today, as well as what advantages are becoming available throughout 2017.

For any questions please comment below and we will get back to you at the earliest.

This webinar is designed for the technical expert, responsible for the performance and security of your organization’s web infrastructure. This session will focus on: Best Practices for Simple, Secure Remote Enterprise Access.

 

Providing employees with secure access to enterprise applications deployed behind the firewall is a core requirement for all businesses. Increasingly, enterprises must also deal with the riskier proposition of providing this same access to third-parties, including contractors, partners, suppliers, and customers.

 

Enabling secure application access is a complex, cumbersome task, which requires on premise hardware and software. Yet, these technologies, expose enterprises to a variety of security risks. Moreover, risks are now compounded by the growing network presence of untrusted third party users.

 

Akamai’s Enterprise Application Access (EAA) is a new approach to remote access. It provides a unique, secure, and more convenient alternative to traditional remote access technologies, such as VPNs, RDP, and proxies.

 

Please join us for a deep dive interactive session. We will explore a unique, secure, easy to deploy, and application centered approach to remote access.

 

 

For any questions please comment below and we will get back to you at the earliest.

This webinar is designed for the technical expert, who is responsible for the user experience and performance of your web and mobile applications. This session will focus on:

 

Overcoming the complexity and performance challenges introduced by images in today’s highly visual and increasingly mobile web

 

High-quality images are proven to be effective in driving better engagement online but it has become increasingly difficult to deliver a consistent experience to users across the wide variety of devices and inconsistent networks.

 

Website performance all too often gets bogged down by images that are too heavy. Developers spend too much time and effort designing or managing solutions to create all the derivative images for their site or app — not to mention trying to solve the puzzle of when to deliver the right image for every user. Even with sophisticated workflows, coding expertise, and unlimited storage, it’s nearly impossible to create and deliver the right image for every situation.

 

This challenge continues to increase in complexity as more web traffic shifts to mobile, devices and software proliferate, and online user expectations for consistent quality and performance rises ever higher.

 

Please join our online images expert for a deep-dive to help you uncover hidden pitfalls to image creation and delivery, discuss why images are so important to optimize, and learn best practices that can help you streamline image creation and delivery while improving end-user experiences.

 

 

For any questions please comment below and we will get back to you at the earliest.

This webinar is designed for the technical expert, responsible for the performance and security of your organization’s web infrastructure. This session will focus on:How to Simply get Started with Akamai Protect & Perform Solutions.

 

Akamai’s global platform offers a wealth of robust performance and security features. However, realizing the full potential of our platform requires experts with deep knowledge. These experts have worked to deploy and optimize policies governing security rulesets and performance optimizations.

 

This year, Akamai has introduced the Onboard and Configuration Assistant, an intelligent interview-style system, which requires only 15 minutes of your time before a configuration can be rendered. This new service offers operational efficiency, empowering organizations that were previously unable to fully understand the benefits of the platform.

 

During this session, we’ll explore the new features of the Onboard and Configuration Assistant, led by experts who designed and built them for you.

 

Listen to our experts in this deep dive interactive session and demonstration on Akamai’s Protect and Perform Solutions.

 

For any questions please comment below and we will get back to you at the earliest.

 

 

This webinar is designed for the technical expert, responsible for the performance and security of your organization’s web infrastructure. This session will focus on Best Practices: Defend Against Malicious Bots and Account Takeover.

 

Malicious bots threaten not only your infrastructure but also your customer accounts. Credential abuse is an identity and authentication challenge fueled by breaches of confidential and personally identifiable information (PII). These breaches occur across many organizations, in all industries.

 

Lists of compromised credentials are available on the “dark” web. Since users often reuse the same credentials on multiple sites, attacker's test these credentials across different sites to determine which are valid where.

 

Stolen credentials are used by attackers to conduct account fraud, known as an Account Take Over (ATO) attack.

 

Whilst there is no silver bullet at your disposal, you can develop an effective defense strategy using a combination of the following:

  • Bot detection techniques
  • Application anomaly triggers
  • Nimble response options

Listen to our experts in this deep dive, interactive session. We will demonstrate Akamai’s best practices to defend against malicious bots and account takeover attempts.

 

 

For any questions please comment below and we will get back to you at the earliest.

Best Practices: Discover Blazing Fast Web and Apps for Mobile

This webinar is designed for you, the technical expert, responsible for the performance and security of your organization’s web infrastructure. This session will focus on: Best Practices: Discover Blazing Fast Web and Apps for Mobile.

 

Fast user experiences are no longer exclusively the domain of web development teams. Increasingly, mobile app developers are challenged to deliver experiences that effectively engage their audiences, even when last mile cellular connectivity is slow and congested.

 

Akamai is committed to delivering feature rich, simple solutions to help both web and app developers overcome those challenges. Attend this session to hear from the experts bringing next-generation performance into the mainstream.

 

Gain insight regarding:

  • Machine learning based on real-user behaviors
  • Intelligent performance optimization
  • New technology innovation for native apps

Hear our product experts Ted Shutter and Akhil Jayaprakash Product Managers who will demonstrate Akamai’s best practices to discover blazing fast web and apps for Mobile.

 

For any questions please comment below and we will get back to you at the earliest.

This webinar is designed for you, the technical expert responsible for the performance and security of your organization’s web infrastructure. This session will focus on:

Best practices to defend against the Mirai Botnet and the next wave of Mega Attacks

Millions of IoT devices including DVRs, CCTVs, cameras and routers have been enslaved by the Mirai malware and now constitute what is being called the largest Botnet ever.

In November 2016, this Botnet was used to launch an unprecedented attack on a major DNS provider's platform. This massive attack affected many prominent sites and web applications. The first quarter of 2016 marked a high point in the number of attacks – peaking at more than 100 Gbps. This trend was matched in Q3 2016, with another 19 mega attacks.

This new, massive threat requires a re-examination of traditional DDoS defense technologies, detection tools and response strategies.

Listen to our security expert for a deep dive interactive session. He will demonstrate on how Akamai helps organizations defend against the Mirai Botnet and the next wave of Mega Attacks.

 

For any questions please comment below and we will get back to you at the earliest.

This webinar is focused on you – the technical expert who is responsible for the performance and security of your organization’s web infrastructure. This session will focus on:

Best practices to protect your enterprise from advanced threats
The enterprise threat landscape is evolving quickly. Advanced threats such as malware are rising in volume and getting better at circumventing traditional security approaches. In addition, increasingly sophisticated threat delivery combined with the adoption of SaaS, Cloud and IoT in the enterprise - has introduced new visibility, control, and security gaps. Enterprises need a solution that can quickly detect, identify, and mitigate advanced threats all while enforcing an acceptable Internet use policy across the enterprise.

 

John Devasia, is our Senior Product Manager in the Carrier and Enterprise division at Akamai Technologies. He is responsible for defining product strategy and products that will help enterprises minimize risk and increase security as they transition their infrastructure and applications to a cloud only model. John has held a wide range of positions within Akamai, including Solutions Architect, Enterprise Architect and Practice Manager. He spent the early part of his career at Cisco and Visa. He holds a B.Tech in Electrical Engineering from the University of Calicut, an MS in Electrical Engineering from San Jose State University, an MBA from Babson College and is a Certified Information Systems Security Professional (CISSP).

 

Dennis Birchard, is Akamai’s North American Principal Enterprise Security Architect. If there are security risks and customers have questions or concerns, he mitigates those concerns and provide positive feedback as to the problem and how we solve it. Dennis has worked at Akamai Tech for 10 years and over his tenure, he has a customer facing position, with occasional public speaking engagements. Dennis loves long walks across the ARIN-RIPE-DB, diving amongst bot, virus, and malware infested waters of the data ocean we call the Internet.

 

Please join our security experts for a deep dive interactive session and demo on best practices to protect your enterprise from advanced threats such as malware and DNS exfiltration.

We have scheduled a Technical Insight & Meet the Expert Webinar for all the America customers on November 15th, 2016. 

 

We will be sending out the details of the Webinar with the date (Add to Calendar) along with the Thank You and Sorry mailer to all the attendees and Registrants of TIS 7 which was held on August 30th, 2016. This mail blast is scheduled for September 15th, 2016.

 

The details of the event and Target audience is given below:

 

Agenda:

  1. Topic: Enterprise Threat Protector
  2.  Speakers: John Devasia
  3. Duration: 60 mins
  4. Month & Date: November 15th 
  5. Target Audience:
    1. Geo: America
    2. Division: Web and Media
    3. Customer Status: Direct and Indirect (excluding IBM and AT&T)
    4. Contact Type: Technical Audience

  

Thanks for your support in advance!

 

Don't forget to check the Advocacy Program 

This webinar is focused on you – the technical expert who is responsible for the performance and security of your organization’s web infrastructure.

 

Best Practices with HTTP/2

With hundreds of Akamai customers using HTTP/2, we have the unique opportunity to experience the new protocol in action in many organizations.

 

Michael Gooding, our Web Performance Evangelist, will share insights on how to set up and measure h2 effectively, improve browser rendering as well as best practices with JS, CSS and sprites.

 

Meet the Expert – Image Management

We are thrilled to introduce a new interactive segment called “Meet the Expert”.

 

Please join Akamai’s Image optimization expert Mohammad Aboul-Magd who will answer your questions on why images matter, challenges associated with delivering quality images to all your users and how to optimize the end user experience using Akamai’s Image Manager.

 

 

 

For any questions please comment below and we will get back to you at the earliest.

This webinar is focused on you – the technical expert who is responsible for the performance and security of your organization’s web infrastructure.

 

Please join David Senecal, Akamai’s Senior Product Architect for a deep dive session and demo on how to develop an effective, flexible strategy to manage bot traffic on your website.

 

This session will focus on:

 

BEST PRACTICES FOR MANAGING BOT:

Websites provide online businesses with an unprecedented level of contact with customers and end-users. However, they also place business information where it can be easily accessed by other external actors – often using automated bots.

 

For many organizations, bots represent up to 40% of their overall site traffic, from good bots engaged in essential business tasks to bad bots performing harmful activities. Regardless of business impact, bot traffic can reduce site performance for legitimate users and increase web infrastructure costs.

 

Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.

 

 

For any questions please comment below and we will get back to you at the earliest.

This webinar is focused on the technical expert who is responsible for the performance and security of your organization’s web infrastructure.

Attending this webinar will enable you to:

  • Understand the importance of managing web security in an evolving threat landscape
  • Realize the advantages of leveraging Big Data and context aware web security solutions
  • Learn how you can identify and filter malicious users before they perform an attack
  • View a virtual demonstration of detecting and blocking malicious web traffic

 

This session will focus on:
Cloud Security Intelligence:
Blocking a malicious user even before an attack is launched is the best way to avoid down time and data theft. Identifying and filtering IP Addresses based on past behavior and risk scoring helps improve security intelligence and enables you to protect your web infrastructure against the most sophisticated DDoS and application layer attacks.

Client Reputation Demonstration:
View a demonstration of how Client Reputation can proactively prevent malicious requests from entering your infrastructure.

 

For any questions please comment below and we will get back to you at the earliest.