sb-au logo
Story image

Akamai acquires Janrain for access management capabilities

09 Jan 2019

Akamai Technologies has announced that the company has entered into an agreement to acquire customer identity access management Janrain.

Janrain enables enterprises to enhance digital trust by offloading login and registration workloads, and its integration with Akamai’s Intelligent Edge Platform is expected to provide security, regulatory compliance and scale to online engagements.

As enterprises continue to adopt cloud technologies and digitise their businesses, web security and identity awareness have become increasingly integral to keeping businesses safe and secure and establishing digital trust.

Akamai secures its customers’ websites, apps and APIs from DDoS attacks, application vulnerabilities, bots and other threats, with hundreds of millions of login transactions taking place daily on the Akamai Intelligent Edge Platform.

The acquisition is expected to add complementary capability that will help Akamai's customers establish and maintain digital trust with their users by providing a secure and resilient environment for collecting and storing sensitive user information, managing privacy controls, defending against identity fraud, and improving engagement and brand loyalty.

Akamai Technologies president and Akamai web division general manager Rick McConnell says, "It is challenging to conduct business online without an inherent and expected level of digital trust.”

Integrating Janrain’s Identity Cloud into the Akamai Intelligent Edge Platform aims to provide immediate security benefits to customers in two areas: bot management and threat intelligence.

Akamai Bot Manager mitigates the risks associated with credential abuse by detecting and managing bot activity at login and registration time and reducing fraud without negatively impacting the user experience.

By leveraging Akamai threat intelligence, customers can make informed decisions about which users should be allowed to access registration and login pages based on a reputation built on past online behaviour.

The integrated technology will also be designed to enable accurate, scalable, and secure risk-based adaptive authentication solutions to safeguard against malicious account activities including fraudulent account creation and credential compromise.

Story image
OT networks warned of vulnerabilities in CodeMeter software
Manufacturers using the Wibu-Systems CodeMeter third-party licence management solution are being urged to remain vigilant and to urgently update the solution to CodeMeter version 7.10.More
Story image
Video: 10 Minute IT Jams - Who is CrowdStrike?
Today, Techday speaks to CrowdStrike ANZ channel director Luke Francis about the company's key products and offerings, its upcoming annual security conference, and the infrastructure it leverages in the A/NZ region.More
Story image
McAfee finds vulnerabilities in 'temi' the videoconferencing robot
Temi is commonly used in environments including businesses, healthcare, retail, hospitality, and other environments including the home.More
Story image
Fortinet SOARs to new heights of protection on the wings of AI & automation
Jon McGettigan, Fortinet A/NZ Regional Director, talks about SOAR (security orchestration, automation and response) and explains that effective SOAR starts with your security policy.More
Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More
Link image
How to better protect your organisation's most valuable asset - its data.
Data resilience strategies are becoming increasingly critical in relation to the skyrocketing value of data and the proliferation of malicious entities wishing to steal it.More