Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Edge Ask The Experts

08:00 AM
Akamai Staff
Akamai Staff
Edge Ask The Experts

My Company Is Looking at WAFs to Help Secure Traffic. Where Do We Start?

Above all else, think cloud-agnostic.

Question: My company has a significant cloud services implementation, and we are looking at WAFs to help secure traffic for specific applications. Where do we start?

Akamai: Selecting a Web application firewall (WAF) can be very simple or very complex. Whatever you do, try to make sure it is cloud-agnostic.

Having a cloud-agnostic WAF, like something built on the edge, allows you to protect all of your applications – whether they're on-prem, in one cloud provider, or spread across multiple cloud providers – with the same solution.

This is a more architecturally elegant approach and one that allows your security team to scale – where you can protect applications regardless of where your developer teams are putting them and not have to manage multiple solutions or get in the way of your developers.

What do you advise? Let us know in the Comments section, below.



Recommended Reading:

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
User Rank: Ninja
7/15/2019 | 4:17:38 PM
Put together a side by side comparison

Look at the strenghts and weaknesses
  • Zero Day Attack Mgmt
  • Price Point (Cost not be the only factor)
  • Reporting Capability (Dashboard)
  • Ease of Use
  • 24/7 Support Agreement (What happens if issues surface)
  • Regional Deployment Capability (Do they have a grid)
  • Onsite-Offsite WAF Cloud Deployment
  • Training (Will they add this to sweeten the deal as part of your package)

WAF Comparisons

Review the strengths and weaknesses of each and put them side by side. The final determination should be the cost to determine if this is inline with your budge, but do this ahead of time so your company understands what they need to budget and eventuall spend.



Building Cybersecurity Strategies in Sub-Saharan Africa

Filmed for Dark Reading News Desk at Black Hat Virtual.

LAURA TICH: We have that imbalance, where the big organizations are more protected, where the smaller ones -- which are the most common businesses in the region -- they are least protected... Sometimes they do get the tools, they do get the funding to buy some critical tools, but there's a lack of skills to handle or people who understand how to work those tools. So there are a lot of factors that contribute to our growth -- or lack thereof -- in the cybersecurity industry.


Name That Toon: 'Rise' and Shine
Flash Poll