Hi [[ session.user.profile.firstName ]]

How to manage performance like a product

As the world become increasingly connected, digital performance greatly impacts business success & revenue. But how do we ensure that the effort and budget spent on performance optimization are allocated to the right part of the business, rather than just making the slowest pages faster?

By using data to identify and prioritize the most impactful business areas you are able to optimize the most beneficial business areas.

Join this webinar to learn:

- How to apply product management strategies to succeed in performance management

- Best practices in performance management
Recorded May 9 2019 53 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Benjamin Francis, Senior Pre-Sales Engineer, Akamai; Vaishali Sangtani Product Marketing Manager, Akamai
Presentation preview: How to manage performance like a product

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Migrate your Branch Infrastructure to Zero Trust Architecture Recorded: Nov 14 2019 11 mins
    Nick Hawkins, Sr. Director, Product Management, Enterprise Security APJ
    Join Nick Hawkins as he explains how migrating your branch office/operation infrastructure to Zero Trust architecture will increase your security posture.

    At the end of this short clip, you will learn:

    1. Why the traditional branch connectivity set-up might not be viable anymore
    2. Security challenges in traditional connectivity set-up
    3. New approach to branch connectivity using Zero Trust

    The first video in our three part Zero Trust Enterprise Security series! Stay tuned to our channel for more.
  • Performance testing latest trends and success cases Recorded: Nov 8 2019 56 mins
    Diego Lo Giudice, VP, Principal Analyst, Forrester | Jason Hatch, Senior Director, Akamai
    In this session, guest speaker, Forrester VP and Principal Analyst Diego Lo Giudice and, Akamai Senior Director Jason Hatch will share latest performance testing trends on how successful organizations are delivering more frequently while meeting the new pressing requirements of large scale performance load, concurrency and speed.

    Join us and learn:

    • Application performance needs in the accelerated digital world
    • Continuous performance testing meets continuous delivery
    • Modern performance testing trends
    • How to be ready for the unexpected with 2X, 3X, 4X user traffic
  • Performance testing latest trends and success cases Recorded: Oct 17 2019 57 mins
    Diego Lo Giudice, VP, Principal Analyst, Forrester | Jason Hatch, Senior Director, Akamai
    Businesses experience disengaging clients if their websites and mobile apps don’t respond in 2, 3 seconds. They lose revenue and get bad media coverage when customer experience breaks because of large scale unforeseen load and access from increased user traffic.

    Be it an online sale event, a new financial service offering or a new game launch, every organization has planned or unplanned real-life situations where the user traffic increases 2X, 3X compared to normal days.

    Pressure is on for app dev and infrastructure teams. As they transform to deliver better apps more frequently, their continuous delivery and Agile + DevOps journeys break too if end to end performance testing at scale is not done regularly to most closely replicate real world conditions and for peaks.

    In this session, guest speaker, Forrester VP and Principal Analyst Diego Lo Giudice and, Akamai Senior Director Jason Hatch will share latest performance testing trends on how successful organizations are delivering more frequently while meeting the new pressing requirements of large scale performance load, concurrency and speed.

    Join us on 17 Oct, 14:00 Singapore time to learn:

    • Application performance needs in the accelerated digital world
    • Continuous performance testing meets continuous delivery
    • Modern performance testing trends
    • How to be ready for the unexpected with 2X, 3X, 4X user traffic
  • A New Approach to CIAM & Demystifying Deserialization Recorded: Sep 11 2019 63 mins
    Fernando Serto, Head of Security Technology & Strategy, APJ; Ajay Mishra, Senior Enterprise Security Architect, Akamai
    Across the globe, forward-looking enterprises are fundamentally changing their approach to customer identity access management. Many are looking to leverage identity management technologies that enable them to securely store customer data and to provide GDPR-compliant consent management and better customer experience. When sensitive customer data is stored in an identity platform, you also need to make sure that platform is built with strong data protection capabilities and add-ons to protect against vulnerabilities.

    The second part of the webinar will cover our technical security research on deserialization attacks – a high severity vulnerability that can lead to remote code execution attacks.

    Join Akamai Technologies and (ISC)² on Sep 11, 2019 (Wed) at 13:00 (GMT +8) to know more about:
    - Customer identity access management that enables and secures the business
    - How a deserialization attack is performed via a demo
    - Best practices to mitigate deserialization attacks

    Presenter: Fernando Serto, Head of Security Technology and Strategy, Asia Pacific and Japan, Akamai Technologies
    Presenter: Ajay Mishra, Senior Enterprise Security Architect, Akamai Technologies
    Moderator: Tony Vizza, CISSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • Akamai’s latest Melbourne scrubbing centre and Prolexic enhancements Recorded: Aug 22 2019 12 mins
    Jason Hatch, Senior Director Product Management, Security and Performance, Asia Pacific & Japan, Akamai
    On February 2018, GitHub survived the largest DDoS attack ever recorded with Akamai Prolexic. Today, Akamai continues to invest in its DDoS mitigation capacity and capabilities with the launch of its newest scrubbing centre in Melbourne, Australia. Launched in August 2019, this will become an integral part of the Prolexic DDoS mitigation platform that will now have 19 scrubbing centres deployed globally.

    Join us on 22 Aug, 12:30PM Sydney time to learn:

    - What this means to Prolexic customers
    - Why it is better to protect your data center from DDoS attacks at the Edge
    - How zero-second mitigation SLA is achieved
    - Upcoming innovations to increase platform flexibility and simplify overhead
  • Ask-me-anything about Edge Security Recorded: Jul 26 2019 60 mins
    Nick Hawkins, Sr. Director | James Tin, Prin. Security Specialist | Aseem Ahmed, Product Manager
    A quick recap of Akamai Security Summit World Tour on rethinking security to enable digital transformation strategy; followed by a Ask-Me-Anything video panel.

    Topics include:
    - API security
    - Zero Trust
    - Credential Abuse
    - Identity Management
  • Troy Hunt - 'Rise of the Breaches' Recorded: Jul 26 2019 47 mins
    Troy Hunt, Security Researcher & Creator of 'Have I Been Pwned'
    Data breaches are the new normal. We’ve created ecosystems with so many moving parts and so many complex units, it’s little wonder that we so frequently see them go wrong. A combination of more systems, more people, more devices and more ways than ever of producing and publishing data stack the odds in favour of attackers breaching more systems than ever.

    In this talk by Troy Hunt, you’ll get a look inside the world of data breaches based on his experiences dealing with billions of breached records. You’ll see what’s motivating hackers, how they’re gaining access to data and how organisations are dealing with the aftermath of attacks. Most importantly, it will help you contextualise these incidents and understand both what these attacks actually look like and how to defend against them in your organisation.

    This session also includes the Q&A segment from the live event.
  • AMA Live! For all your security questions Recorded: Jun 14 2019 61 mins
    Unmesh Deshmukh, Regional VP | Nick Hawkins, Sr. Director | James Tin, Prin. Security Specialist | Aseem Ahmed, Product Mgr
    Join us for an interactive live video panel to get your questions answered. Ask us anything on the concepts and information presented at the Security Summit. The live video panel will begin with a quick TL;DW (too long, didn't watch) recap before we start the AMA segment.

    Topics include:
    - API security
    - Zero Trust
    - Credential Abuse
    - Identity Management
  • Fireside Chat with Troy Hunt and Ari Weil Recorded: Jun 13 2019 21 mins
    Troy Hunt, Security Researcher & Creator 'Have I Been Pwned' | Ari Weil, Vice President of Product Marketing, Akamai
    At the end of the security summit, Troy and Ari have an informal retrospective chat on the summit's highlights, notable quotes and surprises.

    Troy shares his perspectives and examples of how change and inertia work as opposing forces in impacting the security industry. In this chat, they go into a deeper discussion on some of the key questions from the summit's attendees, such as how data breach disclosure can be done right after things go wrong.

    Make sure you also register for the live 'Ask-Me-Anything' session here: https://www.brighttalk.com/webinar/ama-live-for-all-your-security-questions
  • Customer Identity & Access Management - Introducing Akamai Identity Cloud Recorded: Jun 13 2019 25 mins
    Ari Weil, Vice President of Product Marketing, Akamai
    What is Customer Identity & Access Management and how can it help? Come learn about why identity is a pressing challenge for today's digital businesses and how Akamai Identity Cloud, the market leader in CIAM, can help you better leverage customer identities to improve your customer experience.

    Make sure you also register for the live 'Ask-Me-Anything' session here: https://www.brighttalk.com/webinar/ama-live-for-all-your-security-questions
  • Troy Hunt - 'Rise of the Breaches' Recorded: Jun 13 2019 48 mins
    Troy Hunt, Security Researcher & Creator of 'Have I Been Pwned'
    Data breaches are the new normal. We’ve created ecosystems with so many moving parts and so many complex units, it’s little wonder that we so frequently see them go wrong. A combination of more systems, more people, more devices and more ways than ever of producing and publishing data stack the odds in favour of attackers breaching more systems than ever.

    In this talk by Troy Hunt, you’ll get a look inside the world of data breaches based on his experiences dealing with billions of breached records. You’ll see what’s motivating hackers, how they’re gaining access to data and how organisations are dealing with the aftermath of attacks. Most importantly, it will help you contextualise these incidents and understand both what these attacks actually look like and how to defend against them in your organisation.

    This session also includes the Q&A segment from the live event.

    Make sure you also register for the live 'Ask-Me-Anything' session here: https://www.brighttalk.com/webinar/ama-live-for-all-your-security-questions
  • Moving Beyond Perimeter Security - Zero Trust, Does It Really Work? Recorded: Jun 13 2019 25 mins
    Nick Hawkins, Senior Director, Enterprise Program Management, Akamai
    The “trust but verify” security model is no longer effective as new business models and processes move users, devices, applications and data beyond the traditional enterprise perimeter.

    The surge in new attack surfaces demands a new approach to security in the form of a zero trust model. Find out the four steps to start a zero trust security journey and immediately improve defences:
    - Move to a least-privilege application access model
    - Proactive protection against zero-day malware
    - Eliminate traditional VPN for specific user groups
    - Enable a Zero Trust architecture model

    Make sure you also register for the live 'Ask-Me-Anything' session here: https://www.brighttalk.com/webinar/ama-live-for-all-your-security-questions
  • Designing for Doomsday: Effective API Security Approaches from the Edge Recorded: Jun 13 2019 25 mins
    Fernando Serto, Akamai – Head of Security Technology & Strategy, Asia Pacific, Akamai
    API security has emerged as the single biggest challenge organizations face to securing their threat surface. In this session we will review real-world examples of how application and API design patterns expose businesses to risks ranging from misuse to outright abuse, and highlight why it's so challenging for businesses to detect and mitigate their exposure. By looking at threat intelligence data gleaned from billions of device and API interactions, we will show how to detect, defend, and ultimately design for doomsday so that you can stop the ticking clock and get back to business.​

    This session also includes an onstage demo of Akamai Bot Manager.

    Make sure you also register for the live 'Ask-Me-Anything' session here: https://www.brighttalk.com/webinar/ama-live-for-all-your-security-questions
  • Intelligent Security Starts at the Edge Recorded: Jun 13 2019 27 mins
    Ari Weil, Vice President of Product Marketing, Akamai
    Learn how Akamai makes the Internet fast, reliable and secure for customers the world over.

    Find out how our cloud delivery platform -- the world’s largest and most trusted -- empowers our customers to provide the best and most secure digital experiences on any device, anytime, anywhere.

    We'll share an overview of our security solution portfolio and our Adaptive Threat Protection for digital enterprises.

    Make sure you also register for the live 'Ask-Me-Anything' session here: https://www.brighttalk.com/webinar/ama-live-for-all-your-security-questions
  • Defining Security Posture in a Zero Trust World Recorded: May 22 2019 63 mins
    Nick Hawkins, Senior Director, Product Management, Enterprise; Johnny Yeo, Senior Enterprise Security Architect, Akamai
    It is generally agreed that there are three key pillars of a zero trust approach - Access, Identity and Posture. In previous webinars we have explored how an identity driven approach can be used with a cloud proxy to better secure access to internal applications. In the first part of this webinar we will dive deeper into the third pillar – posture- understand what it means to a user and their devices and see how it can be integrated into a zero trust architecture. The second part will look at the mitigation aspect of posture. We’ll cover the API attack trends – how attacks are moving from web into API with the explosive growth of apps – and the lifecycle of credential fraud.

    Join Akamai Technologies and (ISC)² on May 22 to learn how to define security posture in a zero trust world.

    Presenter: Nick Hawkins, Senior Director, Product Management, Enterprise, Akamai Technologies
    Presenter: Johnny Yeo, Senior Enterprise Security Architect, Akamai Technologies
    Moderator: Kawin Boonyapredee, CISSP, Executive Security Advisor, IBM Security
  • How to manage performance like a product Recorded: May 9 2019 53 mins
    Benjamin Francis, Senior Pre-Sales Engineer, Akamai; Vaishali Sangtani Product Marketing Manager, Akamai
    As the world become increasingly connected, digital performance greatly impacts business success & revenue. But how do we ensure that the effort and budget spent on performance optimization are allocated to the right part of the business, rather than just making the slowest pages faster?

    By using data to identify and prioritize the most impactful business areas you are able to optimize the most beneficial business areas.

    Join this webinar to learn:

    - How to apply product management strategies to succeed in performance management

    - Best practices in performance management
  • Access Denied! Decoding Identity Aware Proxies Recorded: Mar 6 2019 63 mins
    Nick Hawkins, Senior Director, Product Management, Enterprise; Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai
    Previously, we covered how identity is a key factor in a security plan when protecting your organization internally and externally. We heard your requests and hence, this upcoming webinar will be a deeper technical discussion on how to:

    • Protect your public-facing applications against malicious Javascript skimmer code such as Magecart credit card stealer. We’ll outline the common vectors used by such attackers and how organizations can protect their websites and customers.

    • Enhance your enterprise security perimeter and reduce your attack surface, minimizing the chance of an attack. Picking up from our previous webinar, we’ll do a deep dive on Identity Aware Proxies and examine how their architecture helps improve your security posture.

    Join Akamai Technologies and (ISC)² on Mar 6, 2019 (Wed) at 13:00 (GMT +8) to learn how to decode identity aware proxies.

    Presenter: Nick Hawkins, Senior Director, Product Management, Enterprise, Akamai Technologies
    Presenter: Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai Technologies
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
The pioneering leader of the intelligent edge
Top brands globally rely on Akamai to help them realize competitive advantage through agile solutions that extend the power of their multi-cloud world.

Our globally distributed intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart, and secure. Akamai keeps decisions, apps, and experiences closer to users than anyone — and attacks and threats far away.

Akamai’s portfolio of edge security, web and mobile performance, and OTT solutions is supported by unmatched customer service and 24/7/365 monitoring.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to manage performance like a product
  • Live at: May 9 2019 5:00 am
  • Presented by: Benjamin Francis, Senior Pre-Sales Engineer, Akamai; Vaishali Sangtani Product Marketing Manager, Akamai
  • From:
Your email has been sent.
or close