Cloud SecurityCyber SafetyGovernance & Compliance

Akamai Selected As Strategic Cloud Computing Provider by One of the World’s Largest Technology Companies, With a Multi-Year Commitment To Spend Over $100M on Cloud Infrastructure Services

Akamai secures a multi-year, $100M+ cloud infrastructure deal with a leading global technology company, enhancing its position as a strategic cloud computing provider.

Akamai Technologies, Inc., the cybersecurity and cloud computing company that powers and protects business online, today announced it has closed a multi-year strategic usage agreement with one of the world’s largest technology companies. Under the terms of the deal, over $100M will be spent on Akamai’s full-stack cloud computing capabilities.

The customer will have the flexibility to leverage Akamai’s full portfolio to manage, deliver, and secure data to augment and improve its own infrastructure services.

“Technology platforms with a massive global presence require sophisticated and reliable cloud services,” said Akamai COO and GM, Cloud Technology Group, Adam Karon. “Akamai provides the scale this customer requires along with ultra-low latency performance to help ensure that every user has the best experience possible no matter where they are in the world.”

Akamai will deploy managed Kubernetes clusters in secured virtual private cloud (VPC) environments, load-balance user traffic, and apply integrated application and network security together on Akamai Cloud to enable optimal performance at more attractive cloud economics. These capabilities will help to ensure an excellent experience for users while enabling the customer to manage traffic and data locally.

CSA Editorial

Launched in Jan 2018, in partnership with Cyber Security Malaysia (an agency under MOSTI). CSA is a news and content platform focusing on key issues in cybersecurity in the region. CSA is targeted to serve the needs of cybersecurity professionals, IT professionals, Risk professionals and C-Levels who have an obligation to understand the impact of cyber threats.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *