© 2026 Akamai Technologies
Akamai acquires Fermyon to combine WebAssembly function-as-a-service (FaaS) with Akamai’s globally distributed platform.
Read news
Login
Back
Login
Close
Back
Login
Close
-
Why Akamai
Back Why Akamai Close
-
Products
Back Products Close
- Cloud Computing
- Cybersecurity
- Content Delivery
- Global Services
- All Products
Back Cloud Computing Close- ARTIFICIAL INTELLIGENCE (AI)
- Akamai Inference Cloud
- Databases
- Managed Databases
- Storage
- Block Storage
- Object Storage
- Backups
- Networking
- Cloud Firewall
- DNS Manager
- NodeBalancers
- Private Networking
- PRICING
- Pricing List
Back Cybersecurity Close- app and api security
- API Security
- App & API Protector
- Firewall for AI
- Client-Side Protection & Compliance
- BOT & ABUSE PROTECTION
- Account Protector
- Content Protector
- Brand Protector
- Bot Manager
- Infrastructure Security
- Edge DNS
- Prolexic
- IP Accelerator
- DNS Posture Management
Back Content Delivery Close- APPLICATION PERFORMANCE
- Ion
- API Acceleration
- IP Accelerator
- Media Delivery
- Adaptive Media Delivery
- Download Delivery
- MONITORING, REPORTING, AND TESTING
- DataStream
- mPulse
- CloudTest
-
Solutions
Back Solutions Close
- content delivery
- App and API Performance
- Media Delivery
- Edge Compute
-
Resources
Back Resources Close
- Cybersecurity Research
- Akamai Security Intelligence Group (SIG)
- State of the Internet (SOTI) reports
- cloud developers
- Developer hub
- Guides and tutorials
- Cloud docs
- Community Q&A
- Beta program
- Start-up programs
- What’s new
- Akamai blog
- Events and workshops
-
Partners
Back Partners Close
- Channel Partners
- Program overview
- Join Akamai Partner Connect
- Partner resources
- Partner Portal
- technology partners
- Program overview
- find a partner
- Channel Partner Directory
- Technology Partner Directory
- Partner stories
- cloud marketplace
- Developer apps
Login
Back
Login
Close
Back
Login
Close
Zero Trust Security: Reference Architecture
A Zero Trust security architecture minimizes the risk of malicious actors penetrating the perimeter, moving laterally, and exfiltrating data.