Remote Access Audit Management

Service Overview

When your business applications go to clouds, Identity and Access Management (IAM) and Single Sign On (SSO) becomes critical in cybersecurity. Besides using multi-factor authentication (MFA) to strengthen identity control, businesses can minimize cybersecurity risk by closing up unnecessary openings to the external world in operations.

Often in the process of digital transformation, businesses rely on collaborations with partners. However, human errors in such collaborations can leak security information and cause businesses a great loss in profit or reputation.

Akamai Enterprise Application Access (EAA) applies a zero-trust security management model. For example, it closes all ports going into a firewall and at the same time it ensures that authorized users and devices can visit only certain applications and not your entire network.

Features

● Centralized Access Management
Akamai EAA allows your business to activate access management of your business application within minutes with no extra hardware or software whether your application is deployed in a private cloud (e.g. VMware or OpenStack), a public cloud (e.g. AWS, Microsoft Azure, Google Compute Engine, or IBM Cloud SoftLayer), or on-premise.

● SAAS Integration
Akamai EAA provides seamless access to internal business applications from suppliers such as Atlassian, Microsoft, SAP and Oracle. Akamai EAA can also integrate with Okta or other SSO solutions.

● Multi-Factor Authentication (MFA)
Akamai EAA offers identity authentication through emails, SMS, or TOTP. Akamai EAA can also integrate with 2FA suppliers such as Duo Security to give you an extra layer of protection.

● Built-in Load Balancers
Akamai EAA can distribute visits to your internal business applications based on your policy after monitoring the status of your business application. This increases the reliability of your business operation.

Steps of Implementation

  • Step 1: Apply for Akamai Enterprise Threat Protector (ETP)

You can get in touch with us here to apply for an Akamai EAA trial.

  • Step 2: Deploy Security Connector
  1. Download EAA VMWare OVA
  2. Deploy OVA to your cloud environment
  3. Configure Security Connector IP
  4. Configure Security Connector DNS
  5. Configure Security Connector NTP
  6. Verify the network configuration of Security Connector
  7. Verify the network connection of Security Connector
  8. Verify the registration of Security Connector
  • Step 3: Configure Identity

○ Add new accounts and passwords using Akamai EAA’s Cloud Directory
○ Create an Organizational Unit (OU) and authorizable accounts through your existing AD/LDAP

  • Step 4: Create User Groups & App Groups

○ Create user groups based on purpose of service
○ Create app groups based on applications

  • Step 5: Configure Your Application
App is up App Deployed

The Application Deployment Wizard helps to publish your application and then verify its status once it is complete.

Akamai EAA is suitable for all applications on a private cloud, an IaaS (such as GCP, Azure or AWS) or an SaaS (such as Office365 or SAP).

Is This for My Business?

● I need to establish a convenient and safe remote access management and a comprehensive auditing.
● I need a simplified partner management and reduce incidents of leakage of information security maintenance.

Service Infrastructure

Management edge servers

Management edge servers

  1. Management edge servers:
    ● Provide security, performance and optimization of components of the digital interface and the data between users and applications.
    ● Provide features such as management, logging, reporting and settings. Besides a secure, multi-tenant architecture data cloud, you can also choose to have a single-tenant data cloud to deal with the traffic from each single user.
  2. Akamai connectors:
    When a user enters the URL in a browser, he/she will be connected to Akamai EAA’s SSO service.  He/she only needs to provide a certificate to access applications and integrate with existing SSO products.
EAA visiting data flow example

EAA visiting data flow example

報名表單

Please enable JavaScript in your browser to complete this form.
產業類型
請填寫公司電話號碼包含區碼 ,限數字不可輸入符號,範例:0226565630
請填寫您的分機號碼
您如何得知本次活動訊息?(可複選)
本人已瞭解並同意授予羽昇國際問卷資料使用聲明之權利,並留此同意書以供日後查驗。
聲明:以下依據《個人資料保護法》(暨施行細則),向您告知本問卷蒐集、處理及利用個人資料之事項:本問卷依據個資法蒐集、處理及利用您的個人資料包含識別個人姓名、行動電話、電子郵件地址等。本問卷資料將提供會後會議相關資料、相關產品資訊、支援服務、業務諮詢、促銷訊息、新產品推廣訊息、產品及教育訓練與課程之提供與行銷推廣、產品配送、產品市場分析及統計或研究、寄送抽獎贈獎活動贈品之使用。上述個人資料之蒐集、處理及利用,將僅限本問卷業務需要使用,並遵守個資法之規定妥善保護您的個人資訊。依據個資法第 3 條規定,您可向羽昇國際行使之個資權利包括:查詢、閱覽、複製、補完、更正、處理、利用及刪除。您可與羽昇國際客服專員聯繫,羽昇國際將儘速處理與回覆 您的請求。您亦可拒絕提供相關之個人資料,但若無完整的資料,羽昇國際將無法進行本問卷之後續作業,致無法提供您相關服務。未經您的許可,羽昇國際不會將您的個資與第三方分享。
Scroll to Top