sb-au logo
Story image

Akamai ramps up security strategy with latest acquisition

Akamai Technologies has acquired Soha Systems, in a move that looks to complement Akamai’s strategy of securing, protecting and accelerating enterprise applications and services in the cloud.

For businesses having to deal with delivering third-party access to critical applications whether hosted in a public cloud or a private data center, enabling secure access can be a tiresome task.

Robert Blumofe, executive vice president for Platform and general manager of Enterprise at Akamai, says that in many ways, the traditional enterprise model is 'turning inside out' with applications, employees and data moving to the cloud, well outside of the enterprise's traditional zone of control.

“At the same time, security and IT teams remain responsible for ensuring visibility, security and performance," he explains.

"By adding Soha's secure access technology to our Cloud Networking Solutions, we believe we are well positioned to help our customers take full advantage of the key trends, cloud and mobile, driving enterprise computing."

Through the acquisition, Akamai plans to extend its portfolio of Cloud Networking Solutions and also aims to simplify and improve remote and mobile access to enterprise resources, while at the same time minimising the exposed attack surface.

It is the company’s belief that Soha's secure access technology will be instrumental to Akamai's goal of bringing these new capabilities to market in 2016.

Haseeb Budhani, co-founder and CEO of Soha Systems, says enterprise security is undergoing a phase shift and Soha’s secure access service has been designed to address the unique challenges businesses are currently facing.

"We look forward to fully integrating our groundbreaking solution as a high-value component of Akamai's massively scalable, global platform."

Story image
Five security challenges for the Enterprise of Things
Many enterprise networks aren't adequately managed, creating risk for businesses that don’t have full visibility into all of the devices on their network, writes Forescout regional director for A/NZ Rohan Langdon.More
Story image
Gartner: Security leaders must balance risk, trust and opportunity
Security and risk leaders must focus on balancing risk, trust and opportunity to help maintain the ability of their organisations to function.More
Link image
Webinar: Best practices for managing disparate security solutions
As budgets get more constrained, the emphasis shifts from merely finding threats to increased efficiency in managing security operations. Learn how to juggle a crowded field of solutions.More
Story image
Gartner: By 2023, 65% of the world will have personal data covered under modern privacy regulations
“Security and risk management (SRM) leaders need to help their organisation adapt their personal data handling practices without exposing the business to loss."More
Story image
Understanding data is the first step in public sector cloud adoption
Before any cloud migration, it is essential to know exactly what data the organisation already has and where it’s located.More
Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More