The cybersecurity landscape shifted this week. A new class of AI capability was announced in the industry, one that can autonomously discover and exploit software vulnerabilities at a pace and depth that no human team, regardless of skill, could match. This capability can identify thousands of zero-day vulnerabilities, many of them critical, collectively representing every major operating system and every major web browser, along with a range of other important pieces of software.
For our customers, partners, and the market at large, a fair question follows: Does this kind of capability threaten Akamai's business, or does it make what we do more important?
Our answer is unambiguous: This makes what Akamai does more important, not less. Here's why.
We are always actively evolving
Akamai is closely following the developments of these new models, actively leveraging AI tools to assist in identifying vulnerabilities within our own systems, and taking appropriate remediation steps. This is consistent with how we've always operated. Akamai has maintained dedicated security research teams for more than two decades, and we treat any tool that helps us find and fix weaknesses faster as an asset to our customers, not as a risk to our business model.
These AI-powered vulnerability discovery capabilities could reshape the cybersecurity sector, and giving defenders a head start — before models with similar capabilities proliferate — is critical.
Why vulnerability discovery makes runtime protection more valuable
There is a tendency to conflate finding vulnerabilities with preventing attacks. They are two related, but fundamentally different, activities. AI-powered vulnerability discovery accelerates the first. Akamai's core business accelerates the second.
Consider what happens when AI-powered tools discover thousands of new vulnerabilities across critical software. The immediate effect is not that those vulnerabilities disappear; rather, the backlog of known-but-unpatched vulnerabilities grows substantially.
The patching cycle for operating systems, browsers, network equipment, and enterprise applications can take weeks, months, or, in some cases, years. During that entire window, organizations need runtime protection — and that is exactly what Akamai provides.
Our web application firewall, bot management, API security, account protection, and distributed denial-of-service (DDoS) protection products operate at the point of attack. Our segmentation platform empowers our customers to significantly reduce their attack surface and scale Zero Trust initiatives by automatically discovering application behavior, generating and explaining segmentation policies at scale, simulating the impact, and validating policy readiness before enforcement, which collectively reduces manual effort and operational risk.
Our products don't wait for a patch to be developed, tested, and deployed. They apply policy enforcement in real time, at the edge, across every request that traverses the Akamai network, and extends to our customers’ networks and code. When a new vulnerability is disclosed and a patch is not yet available, Akamai's security products become the primary line of defense. We believe that increased vulnerability discovery will drive demand for the protection we deliver during the gap between disclosure and remediation.
The moat is the data + experience + tuning at planetary scale
Even with the sophistication that these new AI models immediately provide, the real moat for a company like Akamai is not any single detection technique or algorithm. It is the breadth of our network and the scale of our customer base, which together provide the data and intelligence that populate our data lakes and power our security products.
Akamai processes more than 5 trillion requests per day across a network of over 4,400 points of presence. We have more than two decades of accumulated intelligence on content delivery patterns, user behavior, adversarial behavior, bot signatures, API abuse patterns, credential stuffing campaigns, and how adversaries attempt to compromise network workloads. This data enables us to build a security model that goes beyond point-in-time indicators of compromise to one grounded in the context necessary to understand what the data signifies and translate it into effective policy, as recognized by independent third-party benchmarks.
Context is what separates raw signal from actionable protection; it is the difference between detecting an anomalous API call and understanding whether that call is part of a credential stuffing campaign, a misconfigured integration, or a novel attack vector that has never been cataloged. Deriving that context requires not just data at scale, but the experience to interpret it and the expertise to act on it.
Our threat researchers, security operations staff, and incident response teams continuously refine the AI models that work in concert across our platform, training them on real-world attack patterns observed in production, not in simulation. This is a feedback loop that compounds over time: Every attack we detect improves the models that detect the next one.
Third-party models, including the most advanced frontier models, do not have visibility into this operational intelligence. Most of these AI models are trained on code repositories and can reason about software architecture. That is remarkable and genuinely useful for vulnerability discovery. They can reason about code and architecture. They cannot observe the 300 billion daily bot requests traversing our network, the behavioral fingerprints of specific threat actors targeting our customers right now, or the traffic patterns that distinguish a legitimate surge from a coordinated attack.
That observational advantage, earned over decades of protecting the world's most trafficked digital properties, is what powers the intellectual property embedded in Akamai's security platform. And the operational advantage of Akamai's extensive network capacity enables us to apply our security models to identify, absorb, and mitigate massive DDoS and other sophisticated attacks at planetary scale. This operational advantage is not optional, it is structural.
A web application firewall deployed in a single data center, no matter how sophisticated its rules or how advanced its underlying AI models, will be overwhelmed by a volumetric attack before it can do any good. The attack traffic saturates the network links, exhausts the compute resources, and renders the security logic irrelevant, not because the policy was wrong, but because the infrastructure could not survive long enough to enforce it.
This is a problem that cannot be solved with better software alone, and the solution cannot be generated with AI. Mitigating DDoS attacks at modern scale requires the ability to intercept attack traffic across thousands of locations before it coalesces on a target by absorbing and filtering it at the points of ingress rather than at the point of impact. That requires a globally distributed architecture with integrated runtime security at every node, not a centralized appliance sitting behind a single network pipe.
Akamai's platform was purpose-built for this: Distributing security enforcement so that attacks are fragmented and neutralized across the network fabric itself, preserving the availability and performance of the applications and infrastructure behind it.
The industry shift we've been preparing for
We view these new AI models as a further step in the rapid, AI-driven transformation of the vulnerability identification and penetration testing ecosystem. This transformation has been underway for some time: AI-assisted fuzzing, static analysis, and automated exploit generation have been advancing steadily. These new capabilities represent an evolution in capability, not a fundamentally new category of risk.
Akamai has been investing in AI-powered security capabilities across our portfolio. Akamai Firewall for AI protects AI applications and large language model (LLM) endpoints from prompt injection and abuse. Akamai API Security uses machine learning to discover and map API endpoints and detect anomalous behavior. Akamai Bot Manager employs behavioral analysis and device fingerprinting to distinguish legitimate automation from malicious bots. Each of these products benefits from AI advances, and each of them is powered by the same operational data advantage that no model or foundation AI company can independently replicate.
The capabilities of these AI models emerge as a downstream consequence of general improvements in code and reasoning versus from explicit cybersecurity training. This means that the competitive landscape for vulnerability discovery tools will evolve rapidly as other model providers develop similar capabilities. What will not be easily replicated is the operational platform. Akamai’s edge network, data, customer relationships, and our runtime enforcement capabilities turn vulnerability awareness into actual protection.
Our commitment to transparency
As AI-powered vulnerability discovery scales, the volume and velocity of disclosures will increase. Our processes will evolve to stay relevant as the AI security ecosystem matures, including how we communicate with customers about newly identified risks and how we prioritize protective rulesets within our products. And our commitment to ensuring transparency in customer communication and vulnerability disclosure will persist.
We view industry and community collaboration as key to addressing this rapidly evolving space, and we are open to discussing any specific questions or concerns our customers or partners may have regarding these developments.
If you are an Akamai customer or partner with questions about how findings related to AI-powered vulnerability scanning may affect your environment, please reach out to your account team.
The bottom line
AI that finds vulnerabilities faster does not diminish the need for security at the edge. It amplifies it. Every new vulnerability discovered is a vulnerability that needs to be protected against in production until a patch is deployed.
Akamai's network, data, and runtime enforcement capabilities are the bridge between vulnerability discovery and actual security, and that bridge has never been more critical than it is today.
Forward-looking statements
This blog post contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. These statements include, but are not limited to, statements regarding the expected impact of AI-powered vulnerability discovery on demand for Akamai’s security products, the competitive advantages of Akamai’s platform, and our plans and strategies for product development and market positioning. Words such as “believe,” “will,” “expect,” and similar expressions are intended to identify forward-looking statements. These statements are based on current expectations and assumptions and are subject to risks and uncertainties that could cause actual results to differ materially, including: changes in the competitive landscape for cybersecurity services; the pace of AI capability development by third parties; customer adoption rates; the effectiveness of our products against newly discovered vulnerabilities; general economic and market conditions; and other factors described in our SEC filings, including our most recent Annual Report on Form 10-K. We undertake no obligation to update any forward-looking statement to reflect events or circumstances after the date of this post.
Tags