Story image

Akamai acquires Janrain for access management capabilities

09 Jan 2019

Akamai Technologies has announced that the company has entered into an agreement to acquire customer identity access management Janrain.

Janrain enables enterprises to enhance digital trust by offloading login and registration workloads, and its integration with Akamai’s Intelligent Edge Platform is expected to provide security, regulatory compliance and scale to online engagements.

As enterprises continue to adopt cloud technologies and digitise their businesses, web security and identity awareness have become increasingly integral to keeping businesses safe and secure and establishing digital trust.

Akamai secures its customers’ websites, apps and APIs from DDoS attacks, application vulnerabilities, bots and other threats, with hundreds of millions of login transactions taking place daily on the Akamai Intelligent Edge Platform.

The acquisition is expected to add complementary capability that will help Akamai's customers establish and maintain digital trust with their users by providing a secure and resilient environment for collecting and storing sensitive user information, managing privacy controls, defending against identity fraud, and improving engagement and brand loyalty.

Akamai Technologies president and Akamai web division general manager Rick McConnell says, "It is challenging to conduct business online without an inherent and expected level of digital trust.”

Integrating Janrain’s Identity Cloud into the Akamai Intelligent Edge Platform aims to provide immediate security benefits to customers in two areas: bot management and threat intelligence.

Akamai Bot Manager mitigates the risks associated with credential abuse by detecting and managing bot activity at login and registration time and reducing fraud without negatively impacting the user experience.

By leveraging Akamai threat intelligence, customers can make informed decisions about which users should be allowed to access registration and login pages based on a reputation built on past online behaviour.

The integrated technology will also be designed to enable accurate, scalable, and secure risk-based adaptive authentication solutions to safeguard against malicious account activities including fraudulent account creation and credential compromise.

Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.
65% of manufacturers run outdated operating systems – Trend Micro
The report highlights the unique triple threat facing manufacturing, including the risks associated with IT, OT and IP.
WikiLeaks' Julian Assange arrested in London
There’s little doubt that it’s a day of reckoning for WikiLeaks cofounder Julian Assange today, after his seven-year long protection inside London’s Ecquador Embassy came to an abrupt end.