skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration

Introduction

Content delivery network (CDN) and web and application security provider Akamai is adding technology to address the growing threat to websites of compromised third-party content.

Highlights

  • This content can be for purposes of payments, performance analytics, or supplementary information provision.

Features and Benefits

  • Describes how third-party content attacks work.
  • Explains why Akamai opted for a behavioral analysis approach to the problem.

Key questions answered

  • What other tech approaches did Akamai consider for this and why were they rejected?
  • Are there any other major players in this market?

Table of contents

Ovum view

  • Summary
  • Third-party content is now the norm on e-commerce websites
  • Akamai deems blacklists and whitelists unsuitable
  • Call-flow charts provide behavioral data for analysis
  • Most players in this space are startups

Appendix

  • Author

Recommended Articles

;

Have any questions? Speak to a Specialist

Europe, Middle East & Africa team: +44 7771 980316


Asia-Pacific team: +61 (0)3 960 16700

US team: +1 212-652-5335

Email us at ClientServices@ovum.com

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Email us at pr@ovum.com

Contact marketing - 
marketingdepartment@ovum.com

Already an Ovum client? Login to the Knowledge Center now