The Era of CDN Specialization

Is the industry witnessing a new CDN era in which specialization is becoming the norm? It seems like the era of CDN specialization is upon us. We have the Big Three CDNs (Akamai, EdgeCast & Limelight), and the CDN specialist.

Read More »

CDN Ecosystem 4.0

Bizety is rolling out the 4th update to the CDN Ecosystem diagram that plots the position of each CDN, or CDN like company in the content delivery network ecosystem. This update includes all 17 US based CDNs, including the Big

Read More »

Should Akamai buy Imperva

Today, a once in a lifetime opportunity has presented itself to Akamai. It might disappear in a few weeks. Akamai has $1B of cash in the bank, and a stated revenue milestone of $5B by 2020. That’s a significant increase

Read More »

How Can Imperva Incapsula Recover

Wall Street is punishing the information security sector right now. Investors are heading for the exits, running away from FireEye and Imperva. Imperva is down 43% today on the news that they will miss quarterly revenues by $4.5M, when they

Read More »

CDN in the Defense-in-Depth Strategy

The Content Delivery Network adds a critical security layer to any Defense-in-Depth strategy. The CDN is just as important as the firewall, or intrusion detection system, when it comes to mitigating certain types of attacks. With the corporate computer network

Read More »

CDN Ecosystem 2.0

This is part two of the Content Delivery Network Ecosystem diagram. The diagram below includes 16 of 17 USA based CDNs. The objective of the diagram is to visually represent each CDN in the ecosystem. In my original post, I

Read More »

Akamai and Incapsula DDoS Trends

Big thanks to Akamai and Incapsula for providing the community with a DDoS trends report detailing the specific types of DDoS attacks. The key takeaway is the attacks are getting more sophisticated where attackers launch multi vector attacks to mask

Read More »

The 3 CyberSecurity CDNs

Advanced Persistent Threats (APT) are at the forefront of the latest cyber attacks. No organization is immune. APT incorporate the elements of electronic military warfare, where cyber criminals create detailed “Attack-in-Offense” plans that counter the best Defense-in-Depth strategies that corporations

Read More »
Scroll to Top