Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Akamai acquires identity management company Janrain
2 min Security

Akamai acquires identity management company Janrain

Floris Hulshoff PolJanuary 8, 2019 10:59 amSeptember 8, 2019
Akamai acquires identity management company Janrain

2019 has barely begun, but security and content delivery specialist Akamai has already taken a first step. Akamai announces this week that it has taken over the identity management company Janrain.

With the acquisition, the security and content delivery specialist will become a player that helps organisations manage users’ access rights to their online services. It has not been announced how much Akamai has finally paid for Janrain.

Identity Cloud Platform

The Janrain Identity Cloud cloud-based solution provides customers with tools for processing account registrations and logins, among other things. In addition, Janrain also provides a cloud-based portal for organising the profile data of users of online services.

The security and content delivery specialist is also particularly interested in the security applications Janrain uses for his tools. Among other things, the Identity Cloud application ensures that it verifies end users, by analysing their location and device when they are seeking access to an application or other forms of data. For example, if someone wants to log into an account from a new mobile phone at an abnormal time, Janrain’s software platform can ensure that access is blocked until more proof of identity is provided.

Integration into Akamai’s Intelligent Edge Platform

Akamai wants to integrate the Janrain Identity Cloud into its Intelligent Edge Platform. Users of this security platform should therefore benefit from improved identity management and threat intelligence through, among other things, the Bot Manager solution.

In the first instance, this will allow them to benefit from improved access control and reduce the risks of bots with unsolicited access requests. With more information on threats, you can better decide which users should have access to registration and login pages. This is based on reputations that are based on previous online behaviour.

This news article was automatically translated from Dutch to give Techzine.eu a head start. All news articles after September 1, 2019 are written in native English and NOT translated. All our background stories are written in native English as well. For more information read our launch article.

Tags:

access / Akamai / identity management / Janrain / Login / threat intelligence

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Qualys expands ETM security platform with identity security and better insight into threats

Ping Identity launches Just-in-Time access security

Tonic Security emerges from stealth mode to offer AI-driven exposure management

Zscaler acquires Red Canary for AI-driven security operations

Editor picks

Massive wave of Amazon layoffs as 14,000 jobs get cut

Amazon has announced that it will be laying off approximately 14,000 ...

How attackers use Microsoft agents to steal OAuth tokens

AI agents are proving to be extremely resourceful. Among their discov...

Huawei lays the foundation for Europe’s intelligence and sustainable era

Huawei is ramping up efforts to support and accelerate the technologi...

Nvidia acquires significant stake in Nokia to accelerate 5G and 6G

Nvidia is paying $1 billion (€860 million) for a 2.9 percent stake ...

Techzine.tv

Infor's industry-specific ERP strategy and Velocity Suite deep dive

Infor's industry-specific ERP strategy and Velocity Suite deep dive

Why your SOC needs a ROC, according to Qualys

Why your SOC needs a ROC, according to Qualys

Oracle Database @ AWS: best of both worlds?

Oracle Database @ AWS: best of both worlds?

SAP Business Network: $6.5 trillion B2B collaboration platform

SAP Business Network: $6.5 trillion B2B collaboration platform

Read more on Security

Palo Alto Cortex AgentiX gives SOAR much-needed AI update
Top story

Palo Alto Cortex AgentiX gives SOAR much-needed AI update

Cortex Cloud and Prisma AIRS get version 2.0

Sander Almekinders October 28, 2025
EU diplomats targeted by Chinese attackers via Windows exploit

EU diplomats targeted by Chinese attackers via Windows exploit

The Chinese cyber threat UNC6384 was already known to target diplomats in Southeast Asia. Now it appears that...

Erik van Klinken 1 day ago
Why your SOC needs a ROC
Top story

Why your SOC needs a ROC

Qualys CEO Sumedh Thakar dives into vulnerability, risk and the ROC

Sander Almekinders 1 day ago
Docker fixes serious vulnerabilities in Compose and Desktop Installer

Docker fixes serious vulnerabilities in Compose and Desktop Installer

Docker has fixed two serious vulnerabilities in its software. A bug in Docker Compose allowed writing files o...

Mels Dees 2 days ago

Expert Talks

Three Ways Secure Modern Networks Unlock the True Power of AI

Three Ways Secure Modern Networks Unlock the True Power of AI

AI is rapidly becoming the main driver of innovation for businesses, ...

Data Governance in the Cloud: Balancing Innovation and Regulation

Data Governance in the Cloud: Balancing Innovation and Regulation

The cloud has become the backbone of modern business, enabling rapid ...

How to Safeguard and Prepare Exchange Server against Natural Disasters?

It is critical to make sure that the Exchange Server is protected fro...

Minimizing liability is not the same as security: Lessons learned from Collin’s Aerospace cyberattack

Key points: A ransomware attack targeting the ARINC vMUSE syste...

Tech calendar

Discover Why Northern Europe Chooses Redgate Monitor

November 13, 2025

Dell Technologies Forum

November 13, 2025 Nieuwegein

BrickCon The Databricks Community Conference

December 3, 2025 Orlando, Florida

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Dutch PHP Conference

March 10, 2026 Amsterdam

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2025 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement