Skip navigation
All Places > Tech Square > Blog
1 2 Previous Next

Tech Square

27 posts

This webinar is designed for the technical expert, responsible for the performance and security of your organization’s web infrastructure.This session will focus on: Accelerating and Securing your APIs.

 

Regardless of industry, online experiences, including single page web apps or native mobile applications, increasingly rely on APIs to transport the data that drives a positive end user experience. Favorable user experiences require APIs to be timely and effortlessly responsive. Therefore, APIs must be also be resilient against possible attacks.

 

In this session you’ll hear from two technical experts, focusing on trends and overall opportunities of delivering API traffic on the Akamai platform. The discussion will include:

  • Caching
  • Acceleration
  • Authentication
  • Security concerns

Listen to our experts in this deep dive interactive session on Accelerating and Securing your APIs. We will demonstrate the capabilities available on Akamai’s platform today, as well as what advantages are becoming available throughout 2017.

For any questions please comment below and we will get back to you at the earliest.

This webinar is designed for the technical expert, responsible for the performance and security of your organization’s web infrastructure. This session will focus on: Best Practices for Simple, Secure Remote Enterprise Access.

 

Providing employees with secure access to enterprise applications deployed behind the firewall is a core requirement for all businesses. Increasingly, enterprises must also deal with the riskier proposition of providing this same access to third-parties, including contractors, partners, suppliers, and customers.

 

Enabling secure application access is a complex, cumbersome task, which requires on premise hardware and software. Yet, these technologies, expose enterprises to a variety of security risks. Moreover, risks are now compounded by the growing network presence of untrusted third party users.

 

Akamai’s Enterprise Application Access (EAA) is a new approach to remote access. It provides a unique, secure, and more convenient alternative to traditional remote access technologies, such as VPNs, RDP, and proxies.

 

Please join us for a deep dive interactive session. We will explore a unique, secure, easy to deploy, and application centered approach to remote access.

 

 

For any questions please comment below and we will get back to you at the earliest.

This webinar is designed for the technical expert, who is responsible for the user experience and performance of your web and mobile applications. This session will focus on:

 

Overcoming the complexity and performance challenges introduced by images in today’s highly visual and increasingly mobile web

 

High-quality images are proven to be effective in driving better engagement online but it has become increasingly difficult to deliver a consistent experience to users across the wide variety of devices and inconsistent networks.

 

Website performance all too often gets bogged down by images that are too heavy. Developers spend too much time and effort designing or managing solutions to create all the derivative images for their site or app — not to mention trying to solve the puzzle of when to deliver the right image for every user. Even with sophisticated workflows, coding expertise, and unlimited storage, it’s nearly impossible to create and deliver the right image for every situation.

 

This challenge continues to increase in complexity as more web traffic shifts to mobile, devices and software proliferate, and online user expectations for consistent quality and performance rises ever higher.

 

Please join our online images expert for a deep-dive to help you uncover hidden pitfalls to image creation and delivery, discuss why images are so important to optimize, and learn best practices that can help you streamline image creation and delivery while improving end-user experiences.

 

 

For any questions please comment below and we will get back to you at the earliest.

This webinar is designed for the technical expert, responsible for the performance and security of your organization’s web infrastructure. This session will focus on:How to Simply get Started with Akamai Protect & Perform Solutions.

 

Akamai’s global platform offers a wealth of robust performance and security features. However, realizing the full potential of our platform requires experts with deep knowledge. These experts have worked to deploy and optimize policies governing security rulesets and performance optimizations.

 

This year, Akamai has introduced the Onboard and Configuration Assistant, an intelligent interview-style system, which requires only 15 minutes of your time before a configuration can be rendered. This new service offers operational efficiency, empowering organizations that were previously unable to fully understand the benefits of the platform.

 

During this session, we’ll explore the new features of the Onboard and Configuration Assistant, led by experts who designed and built them for you.

 

Listen to our experts in this deep dive interactive session and demonstration on Akamai’s Protect and Perform Solutions.

 

For any questions please comment below and we will get back to you at the earliest.

 

 

This webinar is designed for the technical expert, responsible for the performance and security of your organization’s web infrastructure. This session will focus on Best Practices: Defend Against Malicious Bots and Account Takeover.

 

Malicious bots threaten not only your infrastructure but also your customer accounts. Credential abuse is an identity and authentication challenge fueled by breaches of confidential and personally identifiable information (PII). These breaches occur across many organizations, in all industries.

 

Lists of compromised credentials are available on the “dark” web. Since users often reuse the same credentials on multiple sites, attacker's test these credentials across different sites to determine which are valid where.

 

Stolen credentials are used by attackers to conduct account fraud, known as an Account Take Over (ATO) attack.

 

Whilst there is no silver bullet at your disposal, you can develop an effective defense strategy using a combination of the following:

  • Bot detection techniques
  • Application anomaly triggers
  • Nimble response options

Listen to our experts in this deep dive, interactive session. We will demonstrate Akamai’s best practices to defend against malicious bots and account takeover attempts.

 

 

For any questions please comment below and we will get back to you at the earliest.

Best Practices: Discover Blazing Fast Web and Apps for Mobile

This webinar is designed for you, the technical expert, responsible for the performance and security of your organization’s web infrastructure. This session will focus on: Best Practices: Discover Blazing Fast Web and Apps for Mobile.

 

Fast user experiences are no longer exclusively the domain of web development teams. Increasingly, mobile app developers are challenged to deliver experiences that effectively engage their audiences, even when last mile cellular connectivity is slow and congested.

 

Akamai is committed to delivering feature rich, simple solutions to help both web and app developers overcome those challenges. Attend this session to hear from the experts bringing next-generation performance into the mainstream.

 

Gain insight regarding:

  • Machine learning based on real-user behaviors
  • Intelligent performance optimization
  • New technology innovation for native apps

Hear our product experts Ted Shutter and Akhil Jayaprakash Product Managers who will demonstrate Akamai’s best practices to discover blazing fast web and apps for Mobile.

 

For any questions please comment below and we will get back to you at the earliest.

This webinar is designed for you, the technical expert responsible for the performance and security of your organization’s web infrastructure. This session will focus on:

Best practices to defend against the Mirai Botnet and the next wave of Mega Attacks

Millions of IoT devices including DVRs, CCTVs, cameras and routers have been enslaved by the Mirai malware and now constitute what is being called the largest Botnet ever.

In November 2016, this Botnet was used to launch an unprecedented attack on a major DNS provider's platform. This massive attack affected many prominent sites and web applications. The first quarter of 2016 marked a high point in the number of attacks – peaking at more than 100 Gbps. This trend was matched in Q3 2016, with another 19 mega attacks.

This new, massive threat requires a re-examination of traditional DDoS defense technologies, detection tools and response strategies.

Listen to our security expert for a deep dive interactive session. He will demonstrate on how Akamai helps organizations defend against the Mirai Botnet and the next wave of Mega Attacks.

 

For any questions please comment below and we will get back to you at the earliest.

This webinar is focused on you – the technical expert who is responsible for the performance and security of your organization’s web infrastructure. This session will focus on:

Best practices to protect your enterprise from advanced threats
The enterprise threat landscape is evolving quickly. Advanced threats such as malware are rising in volume and getting better at circumventing traditional security approaches. In addition, increasingly sophisticated threat delivery combined with the adoption of SaaS, Cloud and IoT in the enterprise - has introduced new visibility, control, and security gaps. Enterprises need a solution that can quickly detect, identify, and mitigate advanced threats all while enforcing an acceptable Internet use policy across the enterprise.

 

John Devasia, is our Senior Product Manager in the Carrier and Enterprise division at Akamai Technologies. He is responsible for defining product strategy and products that will help enterprises minimize risk and increase security as they transition their infrastructure and applications to a cloud only model. John has held a wide range of positions within Akamai, including Solutions Architect, Enterprise Architect and Practice Manager. He spent the early part of his career at Cisco and Visa. He holds a B.Tech in Electrical Engineering from the University of Calicut, an MS in Electrical Engineering from San Jose State University, an MBA from Babson College and is a Certified Information Systems Security Professional (CISSP).

 

Dennis Birchard, is Akamai’s North American Principal Enterprise Security Architect. If there are security risks and customers have questions or concerns, he mitigates those concerns and provide positive feedback as to the problem and how we solve it. Dennis has worked at Akamai Tech for 10 years and over his tenure, he has a customer facing position, with occasional public speaking engagements. Dennis loves long walks across the ARIN-RIPE-DB, diving amongst bot, virus, and malware infested waters of the data ocean we call the Internet.

 

Please join our security experts for a deep dive interactive session and demo on best practices to protect your enterprise from advanced threats such as malware and DNS exfiltration.

We have scheduled a Technical Insight & Meet the Expert Webinar for all the America customers on November 15th, 2016. 

 

We will be sending out the details of the Webinar with the date (Add to Calendar) along with the Thank You and Sorry mailer to all the attendees and Registrants of TIS 7 which was held on August 30th, 2016. This mail blast is scheduled for September 15th, 2016.

 

The details of the event and Target audience is given below:

 

Agenda:

  1. Topic: Enterprise Threat Protector
  2.  Speakers: John Devasia
  3. Duration: 60 mins
  4. Month & Date: November 15th 
  5. Target Audience:
    1. Geo: America
    2. Division: Web and Media
    3. Customer Status: Direct and Indirect (excluding IBM and AT&T)
    4. Contact Type: Technical Audience

  

Thanks for your support in advance!

 

Don't forget to check the Advocacy Program 

This webinar is focused on you – the technical expert who is responsible for the performance and security of your organization’s web infrastructure.

 

Best Practices with HTTP/2

With hundreds of Akamai customers using HTTP/2, we have the unique opportunity to experience the new protocol in action in many organizations.

 

Michael Gooding, our Web Performance Evangelist, will share insights on how to set up and measure h2 effectively, improve browser rendering as well as best practices with JS, CSS and sprites.

 

Meet the Expert – Image Management

We are thrilled to introduce a new interactive segment called “Meet the Expert”.

 

Please join Akamai’s Image optimization expert Mohammad Aboul-Magd who will answer your questions on why images matter, challenges associated with delivering quality images to all your users and how to optimize the end user experience using Akamai’s Image Manager.

 

 

 

For any questions please comment below and we will get back to you at the earliest.

This webinar is focused on you – the technical expert who is responsible for the performance and security of your organization’s web infrastructure.

 

Please join David Senecal, Akamai’s Senior Product Architect for a deep dive session and demo on how to develop an effective, flexible strategy to manage bot traffic on your website.

 

This session will focus on:

 

BEST PRACTICES FOR MANAGING BOT:

Websites provide online businesses with an unprecedented level of contact with customers and end-users. However, they also place business information where it can be easily accessed by other external actors – often using automated bots.

 

For many organizations, bots represent up to 40% of their overall site traffic, from good bots engaged in essential business tasks to bad bots performing harmful activities. Regardless of business impact, bot traffic can reduce site performance for legitimate users and increase web infrastructure costs.

 

Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.

 

 

For any questions please comment below and we will get back to you at the earliest.

This webinar is focused on the technical expert who is responsible for the performance and security of your organization’s web infrastructure.

Attending this webinar will enable you to:

  • Understand the importance of managing web security in an evolving threat landscape
  • Realize the advantages of leveraging Big Data and context aware web security solutions
  • Learn how you can identify and filter malicious users before they perform an attack
  • View a virtual demonstration of detecting and blocking malicious web traffic

 

This session will focus on:
Cloud Security Intelligence:
Blocking a malicious user even before an attack is launched is the best way to avoid down time and data theft. Identifying and filtering IP Addresses based on past behavior and risk scoring helps improve security intelligence and enables you to protect your web infrastructure against the most sophisticated DDoS and application layer attacks.

Client Reputation Demonstration:
View a demonstration of how Client Reputation can proactively prevent malicious requests from entering your infrastructure.

 

For any questions please comment below and we will get back to you at the earliest.

This webinar is focused on the technical expert who will manage Akamai services for your organization.


Attending this webinar will enable you to:

  • Understand the importance of managing web security in an evolving threat landscape
  • View a virtual demonstration of various web based attacks
  • Observe web asset behavior under attack
  • Interact with our technology and industry experts and find solutions to your technical challenges
  • Get an early view into our upcoming products and services

 

This session will focus on:
Web Attack Demonstration:
View a detailed demonstration of a wide range of attacks that can bring down web infrastructures. We will showcase how web assets behave while under attack, help you understand how Akamai views and tracks malicious actors on the Akamai Platform with Client Reputation and Security Monitor and demonstrate how Akamai’s web security solutions defend against web attacks.
Managed Security Services:
To build a responsive security strategy, enterprises not only need the right security technology but also develop effective security monitoring, mitigation, and reporting capabilities. Learn how Akamai’s Security Operations Centre (SOC) helps customers mitigate web security threats and manage their cloud security solution.



 

For any questions please comment below and we will get back to you at the earliest.

Insights into hidden features and tips to optimize your Akamai solution.

This webinar is focused on you – the technical expert who will manage Akamai services for your organization.

Attending this webinar will enable you to:

  • Understand the challenges involved in delivering a superior web experience
  • Explore design strategies needed for evolving websites and user expectations
  • Explore best practices for optimizing images
  • Interact with our technology and industry experts and find solutions to your technical challenges

 

This session will focus on:

Web Design Strategies for a Hyperconnected World

Web design is evolving rapidly due to the increase in number and type of mobile devices and changing user behavior. While these changes bring new opportunities, they also bring complexities. You’ll learn the common problems with modern websites and how to implement some of the most effective web design strategies.

Image Management – Best practices

Delivering the best images to all users is no longer an easy task. There are different sizes, formats & qualities to consider, and knowing when to choose each one can be difficult. In an ever changing environment where time is money, being able to react and get images from camera to user quickly can be the difference between success and failure. Attend this session to explore best practices for managing images and find out how we can help.



 

For any questions please comment below and we will get back to you at the earliest.

Modern websites are being customized to cater to multiple devices, platforms, last mile transport types and operating systems. In this complex ecosystem, traditional metrics like average page load time or document complete measurements don’t tell the whole story.

 

Join Akamai’s web performance experts Michael Gooding and Shawn Miller to learn about web performance measurement techniques that focus on metrics that are important for your end user experience and your business objectives.

Attending this webinar will enable you to:

  • View detailed examples of various web performance measurement and testing techniques
  • Learn about the key performance metrics and tools to measure end user experience
  • Gain actionable insights to improve web performance and mitigate performance issues

 

 

For any questions please comment below and we will get back to you at the earliest.