AKAMAI INTELLIGENT PLATFORM™

Slides:



Advertisements
Similar presentations
Cloud computing is used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication.
Advertisements

Stonesoft Roadmap WHAT FEATURES WILL COME IN
Akamai DNS Offerings RSA © Conference ©2013 AKAMAI | FASTER FORWARD TM Akamai DNS Solutions Enhanced DNS (eDNS) Scalable, outsourced, DNS solution.
The Way to Protect The Smartest Way to Protect Websites and Web Apps from Attacks.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Arbor Multi-Layer Cloud DDoS Protection
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
CONFIDENTIAL & PROPRIETARY 1 WAF and Identity and Access Management Integration The Next Step in the Evolution of Application Security Best Practices Jan.
© 2013 Imperva, Inc. All rights reserved. Imperva Incapsula Confidential1 Doug Smith, Region Sales Mgr
Beyond DDoS: Case Studies on Attack Mitigation for Financial Services Mike Kun and Patrick Laverty, Akamai CSIRT.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
Web Application Firewall (WAF) RSA ® Conference 2013.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Akamai Technologies - Overview RSA ® Conference 2013.
INTERNATIONAL NETWORKS At Indiana University Hans Addleman TransPAC Engineer, International Networks University Information Technology Services Indiana.
The benefits of externalizing Web DMZ-as-a-Service in the Cloud James Smith, Sr. Security Sentrix
Kona Security Solutions - Overview
Hello Cloud… Mike Benkovich
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Blue Coat Cloud Continuum
Software Defined Networking BY RAVI NAMBOORI. Overview  Origins of SDN.  What is SDN ?  Original Definition of SDN.  What = Why We need SDN ?  Conclusion.
DISA Cyclops Program.
Accelerating Your Journey to a Safe Cloud
Denial of Service Mitigation with OpenFlow using SciPass
BUILD SECURE PRODUCTS AND SERVICES
Market Engagement – security update
IoT Security Part 2, The Malware
OIT Security Operations
Cloud App Security vs. O365 Advanced Security Management
Scaling Network Load Balancing Clusters
Use Case for Distributed Data Center in SUPA
Internal Security Threats
DNS Operation And Security Protection
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Hybrid Management and Security
Real-time protection for web sites and web apps against ATTACKS
Cloud Adoption Framework
Securing the Network Perimeter with ISA 2004
Announcing DDoS Protection preview for Azure
Practical Censorship Evasion Leveraging Content Delivery Networks
Rules of Thumb to Mathematical Rule- A Cyber Security Journey
Basic Policy Overview Palo Alto.
A10 Networks vThunder Leverages the Powerful Microsoft Azure Cloud Platform to Offer Advanced Layer 4-7 Networking, Security on a Global Scale MICROSOFT.
State of the Internet Security – Q2 2017
1. Public Network - Each Rackspace Cloud Server has two networks
The NPD Group - Enterprise DC Agenda
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
Sana Tariq Sr. Architect Service Orchestration March 26th, 2018
Jon Peppler, Menlo Security Channels
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Is Your Online Security Intelligent? Internet Performance Management
Server-to-Client Remote Access and DirectAccess
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Partner Logo Reblaze Utilizes Microsoft Azure Cloud Technology to Provide Web Assets with a Comprehensive, Robust, Protective Shield Against Internet Threats.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Обзор Windows Azure Connect
Goals Introduce the Windows Server 2003 family of operating systems
Azure Cloud Solution Enables a More Powerful, Robust Multilayer Security for Client Web Assets “Microsoft Azure’s cloud technologies allow us to provide.
Protect Microsoft Azure Apps from the Risks of Defacement, Data Leakage and Identity Theft “Microsoft Azure is the obvious platform to deploy your cloud.
AWS Cloud Computing Masaki.
Defending high value targets in the cloud using IP Reputation
Ron Carovano Manager, Business Development F5 Networks
F5 Networks Solutions Silverline Silverline
Content Delivery and Remote DNS services
LOAD BALANCING INSTANCE GROUP APPLICATION #1 INSTANCE GROUP Overview
A - E Cloud Enterprise Symbols
Route web traffic using Azure CLI
Office 365 – How NOT to do it UKNOF43.
서비스 아이콘 및 활용 예시.
Presentation transcript:

AKAMAI INTELLIGENT PLATFORM™ Akamai Cloud Security – Protection for Websites and Internet-Facing Applications AKAMAI INTELLIGENT PLATFORM™ 200,000+ servers │ 7 scrubbing centers KEY: Fast DNS Security Operations Center Cloud Security Intelligence SIEM integration Luna portal w/Security Monitor Scrubbing Center Detection Identification Orchestration Mitigation Network Applications Other data center infrastructure B A 2 E 6 1 DATA CENTER 5 3 Web server Load balancer Storage Database Origin cloaking Site Shield Edge Server APPLICATION ORIGIN CLIENTS 4a DDoS protection Web app firewall Bot management IP reputation 4b C 4c 4d D 1. Client requests URL – request made to Akamai DNS service with global scale and segmented architecture to absorb the largest DDoS attacks 2. DNS resolves to the optimal Akamai Edge server with fewer lookups using zone apex mapping 3. Client connects and sends request to designated Edge server 4. Edge server inspects and takes action on malicious or bot requests: a. Adaptive rate controls automatically respond within seconds to block requests when the rate exceeds customer-defined thresholds. Also, IP blacklists and geo-blocking block requests from clients as defined b. Web Application Firewall inspects requests for malicious patterns and blocks based on anomaly risk score. Proprietary Kona Rule Set and nightly WAF testing maintains low false positives and false negatives. c. Bot Manager blocks or takes advanced management actions on requests generated by different types of automated bots, based on customer-defined bot categories d. Client Reputation leverages Akamai’s Cloud Security Intelligence big- data analysis engine to block requests from IP addresses that Akamai has observed attacking other Akamai customers 5. For cloud environments or smaller data centers without a /24, customers can configure origin ACLs to only allow communication from Akamai Site Shield servers and “cloak” the origin from attackers 6. For larger data centers with a /24, customers can route all network traffic (for both web and non-web applications) through an Akamai scrubbing center, where the Akamai SOC will inspect for and block any DDoS attack traffic