Archive for March, 2010 Authenware Joins Openid Foundation

Total Page:16

File Type:pdf, Size:1020Kb

Archive for March, 2010 Authenware Joins Openid Foundation Archive for March, 2010 Authenware Joins OpenID Foundation Posted at 4:44 pm on March 12, 2010 by jfe Authenware today announced its membership in the OpenID Foundation – an industry organization aimed at protecting identities and intellectual property through the bolstering online security. Through its membership, Authenware becomes part of a community of IT powerhouses that seeks to collectively build awareness of the emerging digital security pandemic. “The exploitation of security vulnerabilities creates a major obstacle for the expansion of the Internet as a trusted vehicle for communication and commerce,” said Tom Helou, president of Authenware. “For such a reason, we sought membership within the OpenID Foundation and are proud to partner with a broad spectrum of online leaders who share our values of security, privacy and strong identification.” This entry was posted on Friday, March 12th, 2010 at 4:44 pm and is filed under News, Press Releases. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site. theSocialWeb.tv on the launch of the Open Identity Exchange Posted at 11:48 am on March 9, 2010 by Chris Messina theSocialWeb.tv visits Citizen Space in San Francisco during the RSA Conference to sit down with Don Thibeau of the OpenID Foundation and Drummond Reed of the Information Card Foundation to discuss the launch of the Open Identity Exchange, the result of a year-long collaboration between the two foundations. John McCrea and Chris Messina dive into the details of this announcement and what it means for the social web. From openid.net/2010/03/ 1 25 November 2010 You can also download the video to watch it later. Tags: Don Thibeau, drummond reed, information card foundation, oix, Open Identity Exchange This entry was posted on Tuesday, March 9th, 2010 at 11:48 am and is filed under News. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site. NTT docomo is now an OpenID Provider Posted at 8:35 am on by Nat Sakimura The largest mobile operator in Japan, NTT docomo, which covers approximately 50% of Japanese population, started offering OpenID authentication on March 9. Every docomo user has an identifier called i-modeID. Using this, users can single sign-on to mobile sites using docomo handsets, making one-click payment and other authenticated actions. These kind of features fueled the great success of mobile commerce in Japan. However, this success has not been extended to the non-docomo handset world of the PC. For the PC, docomo offered a separate identifier called “docomo ID”. As it remained independent of “i-modeID”, it did not enjoy the same kind of popularity. This situation was remedied today by linking the two different identity systems with OpenID. As of today, a user can login to a site using “docomo ID” as an OpenID, then the site can obtain “i-mode ID” that is linked to the “docomo ID” transparently. It is expected that the payment on the PC sites through “i-mode payment service” would accelerate content sales through PC. Some technical idiosyncrasies NTT docomo published the docomoID Authentication Technical Specification on their web site. As an OP Identifier, one should specify “https://i.mydocomo.com/“. As a normal claimed identifier, one should specify “https://i.mydocomo.com/id/{user_unique_identifier}” where {user_unique_identifier}” is a random alpha-numeric string that is unique to the user-realm pair. One peculiar feature of docomo’s implementation is that, to provide “i-mode ID” to the content providers, content providers should call a very simple GET API after they obtained the OpenID Assertion. The decision seems to have been made to avoid the transmission of i-mode ID through browsers, which may act as a man-in-the-middle attack point as users’ PC environment is not particularly safe. Using OAuth for this purpose seems to have been an option, but docomo seems to have decided that requiring it on top of OpenID to the content providers seemed to be a little too demanding. Thus, they devised this extremely simple API. Together with it, docomo also From openid.net/2010/03/ 2 25 November 2010 defined a kind of contact service API, which allows the content providers to send mail [*1] to the user’s mobile phone without sharing the mail address. According to their official page, there are 55,692,500 docomo subscribers as of February, 2010. Japan’s population over 15 as of Feb. 1, 2010 is 110,470,000. [*1] Currently, this “contact service” is currently limited to send a mobile site URL Tags: adoption, japan, mobile, nttdocomo This entry was posted on Tuesday, March 9th, 2010 at 8:35 am and is filed under Case Studies, News. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site. Government of Japan started accepting OpenID Posted at 5:09 am on by Nat Sakimura Ministry of Economy, Trade and Industry of Japan (METI) launched a site called “IdeaBox“, which solicits ideas for IT Policy widely. At the site, people can propose, discuss, and vote on policies. METI positions it as a network- based committee which is open to public. A similar site was operated last year from October to November and attracted over 1700 policy idea. This version of IdeaBox, launched Feb 23, accepts OpenID so that one can login with the account from mixi, Yahoo! Japan, Livedoor and Google. It has various other social components so that one can also tweet about it directly from the site, bookmark it on delicous and hatena bookmark, etc. This initiative will run through March 15. Site Address: http://open-meti.go.jp/ From openid.net/2010/03/ 3 25 November 2010 Tags: japan This entry was posted on Tuesday, March 9th, 2010 at 5:09 am and is filed under Case Studies, News, government. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site. Open Identity Exchange Commences Open Government Pilot National Institutes of Health Posted at 7:01 am on March 3, 2010 by jfe Washington, D.C. — March 3, 2010 —The Open Identity Exchange (OIX) www.openidentityexchange.org, a non-profit organization dedicated to supporting an Internet- scale trust ecosystem, announced today it will commence work on an open government pilot under the requirements set forth by the ICAM Trust Framework Adoption Process (TFAP) established by U.S. General Services Administration (GSA). The National Institutes of Health (NIH) will serve as lead agency using open identity technologies to support a number of services, including customized library searches, access to training resources, registration for conferences, and use of medical research wikis, with strong privacy protections, all designed to ensure accessible and transparent communication between the government agency and U.S. citizens. The OIX has been certified by the GSA as a Trust Framework Provider. This permits the OIX to issue certifications to Identity Providers who choose assessors and certification models, including the audited self-certification model championed by the OpenID Foundation. As lead government agency, the NIH is ready to move into production status with OpenID credentials for existing, pilot-status and future applications using NIH Login (now known as iTrust/NIH). From openid.net/2010/03/ 4 25 November 2010 “The NIH has played a critical role pioneering the use of open identity standards for open government,” said Don Thibeau, chair of the OIX. “We want to acknowledge the critical role the agency has played as a pioneer in the government’s use of open identity standards. The impact of the NIH iTrust pilots is reflected not only in the formation of Open Identity Exchange in the marketplace but also in the groundbreaking leadership NIH has demonstrated in new public sector applications.” “This pilot supports and illustrates the value of the President’s open government initiative. We believe deeply in using electronic identity technologies to enable communication between government entities and citizens,” said Dr. Peter Alterman, Senior Advisor to the NIH Chief Information Officer for Strategic Initiatives. “By doing so, we are sending a strong message to citizens that we care deeply about their security and privacy.” This entry was posted on Wednesday, March 3rd, 2010 at 7:01 am and is filed under Uncategorized. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site. Open Identity Exchange Launches at RSA Posted at 6:56 am on by jfe Washington, D.C. and San Francisco — March 3, 2010 — Industry leaders Google, PayPal, Equifax, VeriSign, Verizon, CA, and Booz Allen Hamilton today announced at the RSA Conference 2010 the formation of the Open Identity Exchange (OIX) www.openidentityexchange.org, a non-profit organization dedicated to building trust in the exchange of online identity credentials across public and private sectors. With initial grants from the OpenID Foundation (OIDF) and Information Card Foundation (ICF), OIX has been approved as a trust framework provider by the United States Government to certify online identity management providers to U.S. federal standards for identity assurance. Trust frameworks are a new way for one site to trust the identity, security, and privacy assurances from another site (the “identity provider”) acting on behalf of a user. Google, Paypal, and Equifax are the first three identity providers certified by OIX to issue digital identity credentials that will be accepted for privacy-protected registration and login at U.S.
Recommended publications
  • Signing Me Onto Your Accounts Through Facebook And
    Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services Rui Wang Shuo Chen XiaoFeng Wang Indiana University Bloomington Microsoft Research Indiana University Bloomington Bloomington, IN, USA Redmond, WA, USA Bloomington, IN, USA [email protected] [email protected] [email protected] Abstract— With the boom of software-as-a-service and social extensive commercial deployments as what happen on networking, web-based single sign-on (SSO) schemes are being today’s web, thanks to the increasing popularity of social deployed by more and more commercial websites to safeguard networks, cloud computing and other web applications. many web resources. Despite prior research in formal verification, little has been done to analyze the security quality Today, leading web technology companies such as of SSO schemes that are commercially deployed in the real Facebook, Google, Yahoo, Twitter and PayPal all offer SSO world. Such an analysis faces unique technical challenges, services. Such services, which we call web SSO, work including lack of access to well-documented protocols and code, through the interactions among three parties: the user and the complexity brought in by the rich browser elements represented by a browser, the ID provider (a.k.a, IdP, e.g., (script, Flash, etc.). In this paper, we report the first “field Facebook) and the relying party (a.k.a, RP, e.g., Sears). Like study” on popular web SSO systems. In every studied case, we any authentication scheme, a secure web SSO system is focused on the actual web traffic going through the browser, and used an algorithm to recover important semantic expected to prevent an unauthorized party from gaining information and identify potential exploit opportunities.
    [Show full text]
  • CIAM Platforms LEADERSHIP COMPASS
    KuppingerCole Report LEADERSHIP COMPASS by John Tolbert December 2018 CIAM Platforms This report provides an overview of the market for Consumer Identity and AcCess Management and provides you with a Compass to help you to find the Consumer Identity and ACCess Management produCt that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaChes to providing CIAM solutions. by John Tolbert [email protected] December 2018 Leadership Compass CIAM Platforms KuppingerCole Leadership Compass CIAM Platforms By KuppingerCole Report No.: 79059 Content 1 Introduction .................................................................................................................................... 6 1.1 Market Segment ...................................................................................................................... 7 1.2 Delivery models ....................................................................................................................... 9 1.3 Required Capabilities .............................................................................................................. 9 2 Leadership .................................................................................................................................... 12 3 Correlated View ............................................................................................................................ 20 3.1 The Market/Product Matrix .................................................................................................
    [Show full text]
  • Customer Relationship Management (CRM) Chapter Leads to the Most Arguments About Placement Whenever We Update This Book
    Retain › Introduction Introduction to Retain By this stage of the book you’ve probably realised that getting your customers’ attention through digital channels is only part of the battle. Holding on to that attention in order to build a long-term customer relationship is the next essential step. We’ve covered planning, building and driving traffic to carefully developed digital assets. The next few chapters deal with methods and tools for retaining the stream of potential and existing customers by building relationships with them and leading them to conversions. The Customer relationship management (CRM) chapter leads to the most arguments about placement whenever we update this book. A core approach in taking care 14 of and converting customers, CRM can be a core business strategy as well as an approach and should be considered at all stages of the customer journey. Content marketing lays out the building blocks for effectively using content, not advertising, to reach audiences. With users becoming increasingly blind to adverts Customer and wary of blatant promotional material, there is a strong need for brands to provide value in the forms of good content to engage and retain their audience. Being chosen as a customer’s preferred brand often hinges on how favourably you relationship are seen by others in the market. Being well represented on Social media, and implementing a sound Social media strategy, is important for brands marketing online. Monitoring sentiment around your brand, using online monitoring tools, will management help you to understand how digital communities perceive brands. Video marketing is another excellent tool for engaging and capturing your audience’s (CRM) attention.
    [Show full text]
  • Getting to Know Your Customers: the Emergence of CIAM Abstract
    Getting To Know Your Customers: The Emergence of CIAM Abstract Ten years ago identity and access management (IAM) solutions were rarely deployed beyond the company firewall, providing permissions and access rights to enterprise resources to employees and contractors. When available, the management of customer and partner access to a generally limited set of resources was often poorly coordinated. Today, however, a very different social, technology and business environment demands that enterprises make their customers’ online experience as sleek and personalized as possible. And to do this, enterprises are embracing a new breed of consumer or customer identity and access management (CIAM) solutions from their IAM vendors. The investment and commitment to CIAM are being driven by an ever- increasing sophistication of customer expectation in terms of a ‘joined up’ user experience and real-time availability of relevant resources accessible anywhere, anytime and from any device. Alongside the need to protect the ‘disappearing perimeter’ with adequate security is measured the need to address competitive advantage and maintain customer loyalty. Boosting transparency between marketing and lines of business has the potential to deepen the customer relationship. In this report, we investigate this emerging trend, what the major players are doing, and what should be the next steps for TechVision Research clients. This report covers: • The CIAM value proposition and business rationale for the enterprise • Getting the balance right between enterprise IAM (EIAM) and CIAM • TechVision Research’s shortlist of CIAM vendors • Eight steps an enterprise should take to best leverage CIAM Author: David Goodman, D. Phil Principal Consulting Analyst [email protected] Getting To Know Your Customers: The Emergence of CIAM David Goodman Table of Contents Abstract .............................................................................................................................................................................
    [Show full text]
  • 10 Best Practices to Drive On-Site Engagement.Pdf
    10 BEST PRACTICES TO DRIVE ON-SITE ENGAGEMENT Contents Introduction 3 Leverage Existing Social Identities 4 Define Reasons to Register 5 Provide a Welcoming Return Experience 7 Encourage Users to Link Multiple Social Accounts 8 Encourage Social Sharing 9 Drive Engagement by Including Friends 10 Optimize for Mobile Browser Experiences 11 Reward Participation and Loyalty 12 Offer Ratings and Reviews 13 Test, Learn and Iterate 14 Conclusion 15 tm Introduction Introduction Today’s connected consumer has a number of fundamental expectations about what they should be able to do online Regardless of the type of website (media, entertainment, retail, consumer brand, etc ), people increasingly expect an element of social interactivity This shift in behavior creates new acquisition and engagement opportunities, and thankfully the tools that enable marketers to step up to this challenge are continually improving This paper explores best practices for incorporating social technologies into your site, including key considerations for how, when, why and where to integrate social components to maximize the experience as well as your return, along with some real-world examples We’ll cover these opportunities to integrate social: • Social Login • Social Sharing • Leveraging the Social Graph • Loyalty and Rewards • Mobile and Tablet Consideration Copyright © 2013 Janrain Inc All rights reserved On-Site Engagement | www janrain com | 888 563 3082 PG3 tm 1 Leverage Existing Social Identities When people arrive at a website, many of makes the process quick
    [Show full text]
  • On the Security of Single Sign-On
    On the Security of Single Sign-On Vladislav Mladenov (Place of birth: Pleven/Bulgaria) [email protected] 30th June 2017 Ruhr-University Bochum Horst G¨ortz Institute for IT-Security Chair for Network and Data Security Dissertation zur Erlangung des Grades eines Doktor-Ingenieurs der Fakult¨atf¨urElektrotechnik und Informationstechnik an der Ruhr-Universit¨atBochum First Supervisor: Prof. Dr. rer. nat. J¨org Schwenk Second Supervisor: Prof. Dr.-Ing. Felix Freiling www.nds.rub.de Abstract Single Sign-On (SSO) is a concept of delegated authentication, where an End- User authenticates only once at a central entity called Identity Provider (IdP) and afterwards logs in at multiple Service Providers (SPs) without reauthenti- cation. For this purpose, the IdP issues an authentication token, which is sent to the SP and must be verified. There exist different SSO protocols, which are implemented as open source libraries or integrated in commercial products. Google, Facebook, Microsoft and PayPal belong to the most popular SSO IdPs. This thesis provides a comprehensive security evaluation of the most popular and widely deployed SSO protocols: OpenID Connect, OpenID, and SAML. A starting point for this research is the development of a new concept called malicious IdP, where a maliciously acting IdP is used to attack SSO. Generic attack classes are developed and categorized according to the requirements, goals, and impact. These attack classes are adapted to different SSO proto- cols, which lead to the discovery of security critical vulnerabilities in Software- as-a-Service Cloud Providers, eCommerce products, web-based news portals, Content-Management systems, and open source implementations.
    [Show full text]
  • 80061 Leadership Compass Consumer Authentication 2019
    KuppingerCole Report LEADERSHIP COMPASS by John Tolbert September 2019 Consumer Authentication This report provides an overview of the market for Consumer Authentication products and services and provides you with a compass to help you to find the Consumer Authentication product or service that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing Consumer Authentication solutions. by John Tolbert [email protected] September 2019 Leadership Compass KuppingerCole Leadership Compass Consumer Authentication Consumer Authentication Report No.: 80061 By KuppingerCole Content 1 Introduction ................................................................................................................................. 6 1.1 Market Segment ....................................................................................................................... 7 1.2 Delivery models ........................................................................................................................ 7 1.3 Required Capabilities ................................................................................................................ 7 2 Leadership.................................................................................................................................. 11 3 Correlated View ......................................................................................................................... 19 3.1 The Market/Product
    [Show full text]
  • Customer Identity and Access Management, Q2 2017 Top Eight Providers That Matter Most and How They Stack up by Merritt Maxim June 15, 2017
    FOR SECURITY & RISK PROFESSIONALS The Forrester Wave™: Customer Identity and Access Management, Q2 2017 Top Eight Providers That Matter Most And How They Stack Up by Merritt Maxim June 15, 2017 Why Read This Report Key Takeaways In our 20-criteria evaluation of customer IAM Gigya And Janrain Lead The Pack (CIAM) providers, we identified the eight most Forrester’s research uncovered a market significant ones — Auth0, ForgeRock, Gigya, in which Gigya and Janrain lead the pack. Janrain, LoginRadius, Microsoft, Ping Identity, Salesforce, ForgeRock, and Ping Identity offer and Salesforce — and researched, analyzed, competitive options. Microsoft, LoginRadius, and scored them. This report shows how each and Auth0 lag behind. provider measures up and helps security and S&R Pros Want Secure, Seamless Digital risk professionals make the right choice for their Experiences For Customers digital businesses. The CIAM market is growing because more S&R professionals increasingly trust CIAM providers to help solve key customer IAM challenges and support customer-centric digital transformation initiatives. Every vendor in this Forrester Wave™ is tracking toward this goal. Analytics, Customer Data Management, And Geographic Coverage Are Key Differentiators As home-grown, disparate technologies for managing customer identity and access become more expensive to administer and less effective, improved customer analytics, customer data management, and the ability to service customers in multiple geographies will dictate which providers will outpace their competitors.
    [Show full text]
  • The Value of Social Login Solving the Engagement Gap Insights from Consumer Research
    The Value of Social Login Solving the Engagement Gap Insights from Consumer Research tm + As marketers we endeavor to communicate meaningful and authentic dialogues with consumers. But 98% of people say the information we’re trying to share is misaligned. Almost all 10% Q the time Frequently 48% “How often do companies send 98% are information, promotions, etc. mistargeted not relevant to you?” Infrequently 40% Never 2% Q1. How often, if at all, have you experienced a situation where a company has sent you information, promotions, etc. that are not relevant to you? n=593 Why are we having this problem? We need to know who we’re talking to in order to be relevant. Site registration aims to solve this problem. But why doesn’t it always work? For one, people are account fatigued, and more resistant to registering. 53% have 5+ usernames 57% have 5+ passwords *** Q *** “How many 29% have 4—5 usernames *** di!erent *** usernames and 26% have 4—5 passwords *** *** passwords have *** you created 15% have 2—3 usernames *** *** online? 16% have 2—3 passwords *** 3% have 0—1 usernames 1% have 0—1 passwords Q6A. You may not use, let alone remember, all of the di!erent username and passwords that you have created online. However to the best of your knowledge, how many di!erent usernames have you created online for sites that require a username and password? n=593 Even after they’ve created an account, many have forgotten login information and decide to leave sites. Q 92% “How often have 61% have left instead of Qyou gone to a A Few resetting or recovering ? Times website, forgotten login information.
    [Show full text]
  • Quarterly Review of the Software & Internet Sector
    Quarterly Review of the Software & Internet Sector Q4 2014 Member: FINRA / SIPC About Navidar Navidar is an investment banking firm providing companies and investors in dynamic industries with strategic M&A advice, capital raising solutions, vital insights and breakthrough opportunities. ■ Big Firm Experience Combined with Senior Banker Attention ■ Global Relationships with Top-Tier Investors and World-Leading Companies ■ Greater Creativity and Customized Solutions ■ Focused on the Middle Corridor of the United States Past Transactions Executed by Navidar October 2014 September 2014 June 2014 April 2014 Has been acquired by Has acquired Has been acquired by Has been acquired by Buyside Advisor Sellside Advisor Sellside Advisor Sellside Advisor March 2014 December 2013 October 2013 December 2012 Has been acquired by Has acquired Has been acquired by Private Equity Placement Sellside Advisor Buyside Advisor Sellside Advisor October 2012 August 2012 February 2012 February 2012 Has been acquired by Has been acquired by NOL Shareholder Rights Capital Structure Review Plan Sellside Advisor Sellside Advisor October 2011 July 2011 January 2011 January 2011 January 2011 Has been acquired by Has been acquired by Debt Placement Sellside Advisor Sellside Advisor Private Equity Placement Debt Placement July 2010 July 2009 November 2010 January 2009 Has acquired World Golf Systems Group PLC Private Equity Placement Recapitalization Private Equity Placement Buyside Advisor Note: Transactions above only represent a sample of past transactions executed
    [Show full text]
  • Beyond Marketing: Why Digital Disruption Requires a Deeper Transformation
    Beyond Marketing: Why Digital Disruption Requires a Deeper Transformation By: Tim Walters, Ph.D. Highlights 3 5 9 12 Understanding How digital disrupts Beyond marketing: Conclusion: Grasp the disruption Coming to terms with true meaning of the digital disruption “consumerization of IT” Sponsored by Executive Summary The forces of digital disruption have toppled established business models, magnified the significance of digital channels and competences, and initiated the “customer-centric era.” Chief marketing officers (CMOs) and their marketing organizations would seem to be ideally positioned to lead the organizational response to these disruptions. Marketing typically owns the customer relationship and has developed sophisticated methods for understanding and communicating with customers. Indeed, many of the vendors and service providers who aim to help companies with customer experience management (CEM) have focused their attention on marketing professionals and processes. Surprisingly, however, CMOs are rarely at the forefront as companies tackle the digital innovations necessary to attract and retain empowered consumers. Accenture recently surveyed C-level executives in 20 countries and found that the CEO was responsible for such initiatives in 35% of the organizations, followed by the CTO (23%) and the CIO (22%). The CMO? Virtually invisible at 1%.1 Such results do not indicate a lack of will or skill on the part of CMOs and marketing professionals. Rather, they show that the forces at work in digital disruption have not only granted consumers unprecedented voice and choice — they have also fundamentally transformed the business environment and the capabilities required for business success. Digital is so disruptive because it radically accelerates and warps not only the customer relationship but also the entire process from product innovation to customer satisfaction.
    [Show full text]
  • Blackbaud Netcommunity New Features Guide
    chapter 1 New Features for 7.2 Janrain is now Akamai 1 Blackbaud Checkout Enhancements 2 Donation 2.0 Enhancements 2 Support for Direct Debit(ACH) 2 Support for "Other" Designations 4 Match Event Guests to Constituents in Raiser's Edge 4 Email Enhancements 4 This guide provides an overview of new features and enhancements for Blackbaud NetCommunity 7.2. For information about how to install or update to this version, see the Infinity Platform Installation and Upgrade Guide. Note: You must use The Raiser’s Edge 7.96 (with Patch 17) or higher to integrate with Blackbaud NetCommunity 7.2. For Customer Support assistance, visit Blackbaud's website. This release of Blackbaud NetCommunity is version 7.2. Previous references to the 7.2 release mentioned that it would be called version 7.1 Service Pack 6. However, due to the nature of the enhancements included in this release (such as adding Blackbaud Checkout to various parts), this update is 7.2 instead. Janrain is now Akamai Akamai Technologies recently acquired Janrain and renamed their customer identity and access management (CIAM) product to Akamai Identity Cloud. Integration with this third-party authentication service enables your organization to manage multiple logins for your Blackbaud NetCommunity website and social network websites, such as Facebook and Twitter. Existing Janrain integrations require no updates: the functionality and configuration for this integration has not changed. You'll simply notice the rebrand and updated website information for the company. Your original Janrain dashboard remains at https://dashboard.janrain.com/ . We're updating our help documentation to reflect the rebrand to Akamai.
    [Show full text]