Need cloud computing? Get started now

Learning Glossary

Informational articles and guides to help you learn more about technology topics in cybersecurity, cloud computing, and content delivery.

For education and training specific to Akamai products and solutions, please visit our Learning Hub.

Security

SECURITY

Learn about microsegmentation

Microsegmentation is an emerging security best practice that offers several advantages over more established approaches like network segmentation and application segmentation.

SECURITY

Learn about web app and API protection

Web app and API protection (WAAP) is security technology that can help to protect web and mobile applications from attack. It can be implemented in a number of ways, including API management, firewalls, web application firewalls, and intrusion detection and prevention systems.

SECURITY

Learn about compliance frameworks

Compliance and regulatory frameworks are sets of documented guidelines and best practices. Organizations follow these guidelines to meet regulatory requirements, improve processes, strengthen security, and achieve other business objectives (such as becoming a public company, or selling cloud solutions to government agencies).


Cloud Computing


Content Delivery – CDN

CONTENT DELIVERY – CDN

Learn about CDNs

Content delivery networks, or CDNs, make online experiences faster and more reliable by delivering content closer to users.

CONTENT DELIVERY – CDN

Learn about streaming and media delivery

Demand for streaming media services and media delivery is growing quickly, presenting content providers with new revenue opportunities and new technical challenges as well.

Learn how the internet works

In a series of short video presentations, Robert Blumofe, Akamai Executive Vice President and Chief Technology Officer, explains how the foundation stones of the World Wide Web work. Other related articles of interest are listed here as well.


Latest Glossary Pages

What Is API Security Testing?

API security testing utilizes techniques and tools for thorough testing to identify and remediate vulnerabilities.
Read more

What Is an Event Consumer?

In event-driven architecture (EDA), event consumers are applications, services, devices, or people that subscribe to a channel that provides information about events.
Read more

What Is Maze Ransomware?

Maze is a form of double extortion ransomware that encrypts files, enabling ransomware operators to demand a ransom in exchange for decryption keys.
Read more