Akamai Enterprise Application Access

Akamai Enterprise Application Access (EAA) provides secure application access using a Zero Trust Network Access (ZTNA) model, eliminating traditional VPNs.

Multi-Cloud Proprietary Cloud Service Only
Category Zero Trust Security
Last page update 19 days ago
Pricing Details Contact for pricing details.
Target Audience Enterprises looking for secure application access solutions.

Akamai Enterprise Application Access (EAA) addresses the complex challenge of securing application access in a distributed and dynamic environment by implementing a Zero Trust Network Access (ZTNA) model. This cloud-native solution eliminates the need for traditional VPNs and network access, instead using an identity-aware proxy to grant access based on real-time signals such as user identity, device posture, and threat indicators.

The technical architecture of EAA is built on Akamai's highly scalable performance edge platform, which integrates data path protection, identity and access management, application security, multi-factor authentication (MFA), and single sign-on (SSO) into a unified service. This approach allows for granular decision-making and adaptive access controls, ensuring that only authorized users and devices can access specific applications without exposing the entire network. EAA supports both clientless and client-required applications and integrates with various infrastructures, including on-premises, IaaS, SaaS, and web applications, using one-click integrations with Active Directory, SAML providers, CDNs, forward proxies, and SIEM tools.

From an operational standpoint, EAA simplifies administration through the Enterprise Center portal, which provides a unified experience for managing access controls, authentication settings, and MFA policies. The portal features streamlined navigation, advanced search capabilities, and the ability to deploy multiple changes in bulk, reducing administrative overhead. The solution also adopts DevOps practices to shorten release cycles, enabling faster delivery of new features and bug fixes.

Key technical details include the use of native SAML identity support, protocol support for Kerberos, NT LAN Manager, and Open ID Connect, and flexible MFA policies that can be configured at the application, directory, and group levels. The solution is highly scalable, with built-in high-availability server load balancing and automatic application routing, making it suitable for dynamic access needs across various user locations and application residences.

Improve this page