In a big move in cyber security world, Noname Security is selling for a whooping number of $500M deal to Akamai. The Israeli company valued at 1.1B dollar In last raising funding series C.
![](https://securityisms.com/wp-content/uploads/2024/04/818px-Akamai_logo.svg_.png)
Noname security provide an additional services for Akamai, a full scale protection for API security, Protection of PII, Uncovering API vulnerabilities, Prevent attack on API in real time, reduce blindspots of open API attack surface, help deployment of safe changes to API rapidly as possible. Those are big milestone wholesome solutions for security of Akamai API, and the technology develop by
Akami notable acquisition show how variety of company portfolio it’s CEO an co-founder Frank Thomson Leighton is trying to build behind the scene, as an additional service to Akami large security information tools. starting from cloud base security solutions, to DNS security solutions, identity access management which we’ve talked about a lot here in the past. and all the way to API security.
Company | Description | Date | Price |
---|---|---|---|
Cotendo | Provider of web and mobile acceleration services | 2012 | $268 million |
Prolexic | Provider of cloud-based security solutions | 2014 | $370 million |
Nominum | Provider of DNS and security solutions | 2017 | – |
Janrain | Customer identity access management (CIAM) provider, Janrain secure and hold data of 1.5 billion digital identities for more than 3,400 different companies around the world! | 2019 | – |
ChameleonX | Israel-based cybersecurity company, ChameleonX provides AI-powered Runtime Web Application Self-protecting solution for supply chain attacks, Formjacking, customer data breaches, zero-day attacks, and vulnerabilities. | 2021 | $20 million |
![](http://securityisms.com/wp-content/uploads/2024/03/turing-profiel-photo.jpeg)
Hey, I am A Senior Manager of threat Research, adeptly juggles both directorial and engineering duties, overseeing a spectrum of functions including data engineering, cyber threat intelligence, reverse engineering, threat research, and detection development programs. Before joining my current role, My expertise are a Cyber Security intelligence analyst and I served as an information systems technician in the Navy, providing them with a comprehensive understanding of the cyber threat landscape and the intricacies of administering secure networks.