sb-as logo
Story image

Akamai acquires Janrain for access management capabilities

09 Jan 2019

Akamai Technologies has announced that the company has entered into an agreement to acquire customer identity access management Janrain.

Janrain enables enterprises to enhance digital trust by offloading login and registration workloads, and its integration with Akamai’s Intelligent Edge Platform is expected to provide security, regulatory compliance and scale to online engagements.

As enterprises continue to adopt cloud technologies and digitise their businesses, web security and identity awareness have become increasingly integral to keeping businesses safe and secure and establishing digital trust.

Akamai secures its customers’ websites, apps and APIs from DDoS attacks, application vulnerabilities, bots and other threats, with hundreds of millions of login transactions taking place daily on the Akamai Intelligent Edge Platform.

The acquisition is expected to add complementary capability that will help Akamai's customers establish and maintain digital trust with their users by providing a secure and resilient environment for collecting and storing sensitive user information, managing privacy controls, defending against identity fraud, and improving engagement and brand loyalty.

Akamai Technologies president and Akamai web division general manager Rick McConnell says, "It is challenging to conduct business online without an inherent and expected level of digital trust.”

Integrating Janrain’s Identity Cloud into the Akamai Intelligent Edge Platform aims to provide immediate security benefits to customers in two areas: bot management and threat intelligence.

Akamai Bot Manager mitigates the risks associated with credential abuse by detecting and managing bot activity at login and registration time and reducing fraud without negatively impacting the user experience.

By leveraging Akamai threat intelligence, customers can make informed decisions about which users should be allowed to access registration and login pages based on a reputation built on past online behaviour.

The integrated technology will also be designed to enable accurate, scalable, and secure risk-based adaptive authentication solutions to safeguard against malicious account activities including fraudulent account creation and credential compromise.

Story image
Australians ignoring cybersecurity policies in favour of productivity
Trend Micro has found that 67% of remote workers have increased their cybersecurity awareness during COVID-19 related lockdowns. However, despite greater awareness people may still engage in risky behaviour, the survey finds.More
Story image
State-based cyber attack targeting Australian government and businesses
Prime Minister Scott Morrison told media on Friday morning that a 'malicious' attack by a state-based cyber actor is underway in the country.More
Story image
Keyfactor and Primekey announce partnership to automate PKI
“PrimeKey and Keyfactor share a mutual respect and mission to provide trust and security in zero-trust networks and manufacturing environments.”More
Story image
Cybersecurity spending slumps - but swift recovery expected
New research from GlobalData found that the industry will recover after this initial slump to be worth almost US$238 billion by 2030.More
Story image
Oracle combines cloud automation with comms security in new solution
The Oracle Communications Security Shield (OCSS) Cloud is built on the company’s cloud infrastructure, and uses AI and real-time enforcement to combat the heightened risk of infrastructure attacks presented to contact centres and enterprises.More
Link image
Enterprises ditching passwords & joining crypto revolution
Now, businesses relying on hardware tokens, software tokens, and passwords can secure high-risk operations and authenticate transaction approvals without the typical security, usability, and cost trade-off of those methods.More