Need cloud computing? Get started now

Akamai Tech Workshops

Join our virtual, interactive workshops for a tech deep dive into topics that matter to you.

Get tech insights from Akamai experts

Each workshop will address a different topic and provide you with the opportunity to connect with our experts and your peers to examine use cases, how to mitigate vulnerabilities, and deep dive into solution environments. 


Past Workshops

AKAMAI TECH WORKSHOP

How to Enforce Zero Trust with Akamai Guardicore Segmentation

In this workshop, we take a deep dive into our newest Zero Trust security solution, Akamai Guardicore Segmentation, which we gained with our acquisition of Guardicore.

AKAMAI TECH WORKSHOP

How to Implement Zero Trust

In this virtual workshop, we take a deep dive into two of Akamai’s Zero Trust security solutions, Enterprise Application Access, and Secure Internet Access Enterprise. 

Akamai Tech Workshop

How to Protect Your Apps & APIs

In this workshop, we explain how Akamai helps you to defend websites, APIs, and users against a wide range of multi-vector attacks and to stop credential stuffing, bots, and human web fraud with the smartest detection and mitigation.

Akamai Tech Workshop

Web Security Analytics — Basics

We would like to enable you to get a basic understanding of how to use the related analytic tool provided with your Akamai web security services, getting insight into the security events triggered for your properties.

This session will provide you with a high-level overview on how to start analyzing security events triggered by your cloud security service.

Akamai Tech Workshop

Akamai App & API Protector: Holistic Web App Protection at the Edge

For multiple consecutive years, global industry analyst firms and customers have recognized Akamai for industry-leading application and API security. As a leader, we are excited to reveal our next-level web application and API protection (WAAP) solution designed to bring together many of our core technologies like web application firewall, bot mitigation, API security, and DDoS protection in a single solution.

Akamai Tech Session

Anti-Piracy: Protect, Detect & Enforce

Have you tried to prevent web-skimming attacks with Content Security Policy (CSP) and found it a challenge to keep up with the changes on your websites? Would you rather have a real-time behavioral detection technology that identifies vulnerabilities and suspicious/malicious behavior in JavaScript resources? Would you rather proactively prevent data privacy violations and the potential reputation loss and GDPR fines that can come along with those?

Akamai Tech Session

Page Integrity Manager — Magecart

Safeguarding user data from web-skimming attacks

Have you tried to prevent web-skimming attacks with Content Security Policy (CSP) and found it a challenge to keep up with the changes on your websites? Would you rather have a real-time behavioral detection technology that identifies vulnerabilities and suspicious/malicious behavior in JavaScript resources?

Akamai Technical Session

Adaptive Security Engine

The Adaptive Security Engine is a new core technology powering Akamai’s application and API protection offerings.

It is designed to enable a hands-off approach to protecting web applications and APIs with the highest degree of confidence.

This session will give insight into the new features that are included in the Adaptive Security Engine and the new version of the automated attack groups (AAGs) like Pragma Stripping, Automatic Update, Tuning Recommendation, Exception Enhancement, SmartSniff, Automatic XML/JSON API Inspection, and Single Selector Scoring.

Akamai Technical Session:

Managing Bots: Action, Challenges, and Detection

As the bot threat landscape evolves, so do Akamai’s detection and challenge mechanisms.

This session is designed to help you become up to date with all new capabilities and help you tweak bot protections in a way that fits your application or service.

Akamai Tech Workshop

What Is Cloud Wrapper?

Many organizations that distribute online media content are migrating to the cloud. They may be moving at different rates and for different reasons, but all have a common need to lower costs and deliver amazing user experiences to their online audiences.

Akamai Tech Workshop

How to Successfully Prepare for Peak

In this webinar, we will discuss how to successfully plan for and manage peak traffic events, the types of testing that are the most effective, and when that testing should occur.

Akamai Tech Workshop

The Need for Speed with Core Web Vitals

Google’s Core Web Vital Metrics, the Page Experience SEO update and what they mean for our customers. Measuring this with mPulse Improving the metrics.

 

 

Akamai Tech Workshop

Deploying Code at the Edge

Akamai EdgeWorkers enables you to create your own services using JavaScript and deploy them across our platform. Deploying code at the edge brings data, insights, and decision-making closer to the users and systems that act upon them. Using common use cases, this session will cover best practice for building, deploying, and testing your EdgeWorkers and EdgeKV JavaScript code running at the edge.

Akamai Tech Workshop

How to Master SEO by Tuning for Crawlers

Many performance optimizations make sense for end users but are counterproductive for bots. This session takes a deep dive into how to tune your Akamai configurations for search engine crawlers. You will learn how intelligently disabling optimizations for bots can speed up performance, resulting in lower traffic, better insights, and a maximized crawl budget.

Akamai Tech Workshop

How Safe Are Your Scripts?

Don’t think you’re susceptible to JavaScript attacks? Think again. The rise of JavaScript is unstoppable, which leads to increased complexity and new vulnerabilities exploited by malicious actors. In this session, we will explore the JavaScript ecosystem and discuss how you can protect your users from web skimming or form jacking attacks, hence avoiding GDPR violations.

 

Akamai Tech Workshop

Surging DDoS Attacks During a Pandemic

We’ll take a tech deep dive into DDoS attacks we have witnessed on our platform, provide considerations to be taken when deciding on mitigation strategies, and advice on how to survive a DDoS attack.