What’s New in Security, Part 2

Welcome to the Akamai Platform Update!

We offer a full week of information about the latest Akamai product updates. Every day we will showcase our latest innovations in all areas of the Akamai Smart Platform.

You may have already read Renny Shen’s fantastic blog about the first day of the Akamai security update. Now let me tell you what we have in store for the second day of our security updates.

Our second Day of Safety Updates is designed to ensure more effective monitoring of employee safety as companies face the new reality of the workplace. For many, the company’s new office is a home office and the company’s network is the internet. To make it even more difficult for companies to secure their employees remotely, cybercriminals (who have always worked remotely) benefit from the new work environment – including fuzzy working and gaming on company equipment.

The CIO and CISO are quick to recognize the need to adapt to this new reality and to protect the home office in the same way they protected employees when they were in the office. When moving to an external company network, however, employees often face problems in the areas of application performance, security and productivity.

Security and IT teams must prevent data loss and ensure visibility and control of applications in an external work environment to mitigate risks. But that’s not enough: better data to make smarter security decisions is the key to success.

Environmental signals such as endpoint detection and response can help to make dynamic risk analyses that can positively influence access decisions to business applications and provide a much higher level of safety. For example, if an employee’s device is compromised according to CrowdStrike, the cloud terminal protection platform, should the device continue to access the company’s source code archive?

To support this shift to smarter security controls, Akamai has introduced a number of new features to improve access to the Zero-Trust network, Secure Web Gateway, DNS security and identity solutions. At Akamai, we believe that multiple contextual signals and continuous analysis are the basis for smarter security and access decisions and for building trust.

Some of our competitors claim to have invented the AKA Zero Trust Edge, while in reality they simply discreetly moved their virtual devices to the cloud or added even more PoP to their limited networks. However, this does not provide all the features of a truly distributed platform at the edge of the cloud – and we believe that a truly distributed platform at the edge of the cloud is the only way forward. This is particularly important when it comes to the provision of security services to businesses and the provision of services on a global scale.

To find out more about the new features we are announcing today, please continue reading:

Access to enterprise applications

Enterprise Application Access (EAA) is designed to ensure that only authorized users and devices have access to the internal applications they need, so that the entire enterprise network is not compromised. Akamai offers the Zero Trust Network Access (ZTNA) EAA solution for dynamic access solutions based on identity, device, user context and risk. EAA helps protect Internet applications and the public.

Important new features

  • Application-specific access with CrowdStrike : EAA uses the CrowdStrike threat alert function to rank the risk level of devices (medium or high) and uses these values to decide whether access to applications should be blocked or allowed. This improves application security and prevents access to business applications for unsafe devices.
  • New User Interface (UI) for the Corporate Center : Enterprise Center is a single portal for customers to easily manage EAA and Enterprise Threat Protector. The new ready-to-use user interface helps increase efficiency and allows customers to customise their dashboards and widgets. Administrators can now get a deeper and more complete picture of all their data in one place to make better decisions about user access and protection.

To learn more about the new EAA features, click here.

Protection against business threats

With Enterprise Threat Protector (ETP), Akamai proactively identifies, blocks, and mitigates targeted threats such as malware, blackmail, phishing, DNS leaks, and advanced zero-day attacks. Akamai provides an ETP Secure Web Gateway that enables security teams to ensure that users and devices are securely connected to the Internet no matter where they come from – without the complexity associated with outdated device-based approaches.

Important new features

  • Prevention of data loss : FTE now includes integrated data loss prevention for outbound web traffic to minimize data loss, reduce risk and improve compatibility, based on standard dictionaries for PCI, HIPAA and others. Customers can also create custom dictionaries and set their own limits for policy violations.
  • Visibility and Application Control (VAC) : TVE now makes it possible to identify and manage parallel information technologies. For example, clients can block file downloads and allow dropbox downloads for all users except computer users.
  • Global security for the DNS : The combination of DNS over TLS (DoT) and DNSSEC enables organizations to protect their DNS traffic without losing the ability to use DNS as a security checkpoint and without losing visibility.

To learn more about the new ETP features, click here.

Identification cloud

Akamai’s cloud-based identity and customer access management system lets you quickly deploy a single system for login, registration, authentication and privilege management. The Identity Cloud provides centralized profile access control on a flexible platform designed for global scalability, performance and compliance. It is now even more integrated in applications and can, to a certain extent, handle complex and customer-oriented use cases.

Important new features

  • Hosted Application 2FA : Akamai Identification as a Service now includes a second authentication factor (2FA) for mobile phone numbers, which can easily be activated as a necessary security feature and as a choice for end users.
  • Updating the integration bus : Akamai’s new Identity Cloud Integration Bus provides self-service support and enables customers to exchange data between the Identity Cloud and a variety of platforms, including Salesforce, Adobe, OneTrust and others. Akamai customers can now customize their own integrated systems with an easy-to-understand, visual user interface without any development skills.
  • New monthly average price model for users : The Identity Cloud provides quantitative usage rights for anonymous, registered and active monthly users connected to customer applications.

Read more about the new features of the Identity Cloud.

Border DNS and Global Traffic Management

Enterprises are using Akamai’s authoritative DNS system to improve application performance, availability and resistance to DDoS attacks.

Important new features

  • Service obligations for : Edge-DNS has added support for two new DNS record types (SVCB and HTTPSSVC) based on the design standard developed in collaboration with Akamai. This implementation will ultimately improve DNS security by simplifying the workflow of multiple vendors.
  • Improvements in advanced DNS development : With the additional integration of DevOps, Akamai has expanded the ability for DNS experts to configure and automate DNS management through the powerful APIs available to Edge DNS and Global Traffic Management (GTM) customers.
  • Static properties of GTM : The JWG has introduced a new type of property – Static, which behaves like a peripheral DNS zone in the JWG domain. This is the first step towards the full integration of our leading authoritative DNS naming service and global GTM load sharing.

Learn more about the new features of Edge DNS.

Security and personalisation services

Network operators use Akamai’s Security and Personalization Services (SPS) to provide small and medium business customers with easy-to-use, complementary services that reduce security threats and enable enterprises to filter inappropriate content from their desktops.

Important new features

  • PLC removed : SPS Remote, an optional feature of SPS Secure Business, is a new thin client for iOS and Android devices that protects employees on unreliable Wi-Fi networks. SPS Remote is a monetized service that allows providers to control their business model and pricing. Turnkey development requires only a specification of the design elements of appearance and usability to create fully customized and user-friendly applications.
  • PLC shield: SPS Shield enables network operators to easily provide basic security to all home users and small and medium business customers on the network. Simplified integration and easy customer access accelerate time-to-market and minimize initial and ongoing overhead and capital costs. SPS Shield also makes life easier for subscribers because no software or hardware is installed and all their devices are covered.

To learn more about the new API features, click here.

We hope you are as enthusiastic as we are about these new product features! Visit the Akamai blog every day this week to learn more.

There will be more opportunities to contact us about this and more on Edge Live | Adapt. Sign up to see how customers benefit from these improvements, participate in technical deep sea dives and listen to our executives explain how Akamai will grow in the future.

*** This is a syndicated blog from a network of Akamai blog security bloggers, written by Lorenz Jacober. Read the original message at http://feedproxy.google.com/~r/TheAkamaiBlog/~3/KLgMUrsPMlU/whats-new-in-security-part-2.html.

Related Tags:

jms 2.0 api,jms 2.0 tutorial,jms 2.0 release date,duplicate acknowledgement in jms,jmscontext,jms 2.0 maven dependency