Kona Security Solutions - Overview

Slides:



Advertisements
Similar presentations
Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
Advertisements

CTS IT Security Enhancement Projects December 10, 2014.
Is your website ready for traffic spike?
Akamai DNS Offerings RSA © Conference ©2013 AKAMAI | FASTER FORWARD TM Akamai DNS Solutions Enhanced DNS (eDNS) Scalable, outsourced, DNS solution.
Protecting Commercial and Government Web Sites: The Role of Content Delivery Networks Bruce Maggs VP for Research, Akamai Technologies.
Netflix Content Delivery RIPE – April 2012 – David Temkin 1.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Barracuda Web Application Firewall
19 Historical overview Main challenge: How to distribute content in high quality over the Internet cost-effectively? • Traditional “Best-effort” model:
Unified Logs and Reporting for Hybrid Centralized Management
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
Jak zwiększyć bezpieczeństwo i wysoką dostępność aplikacji wg
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
1 Cost-Effective Strategies for Countering Security Threats: IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
Content Networking - CON Content Overlay Network Vishal Kumar Singh Eilon Yardeni April, 28 th 2005.
© 2013 Imperva, Inc. All rights reserved. Imperva Incapsula Confidential1 Doug Smith, Region Sales Mgr
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Beyond DDoS: Case Studies on Attack Mitigation for Financial Services Mike Kun and Patrick Laverty, Akamai CSIRT.
The Role of Content Delivery Networks in Protecting Web Sites from Attacks Bruce Maggs VP for Research, Akamai Technologies.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
F5’s BIG-IP Blade Controller - The Essential Software for Blade Server Systems May 2002 John Bigelow Vice President & General Manager, Software Business.
Performance and Security of Internet Applications John Buten Manager, Enterprise Industries
Global NetWatch Copyright © 2003 Global NetWatch, Inc. Factors Affecting Web Performance Getting Maximum Performance Out Of Your Web Server.
Akamai vs. Flash Crowds and Distributed Denial of Service Akamai Technologies & Carnegie Mellon Bruce Maggs.
Web Application Firewall (WAF) RSA ® Conference 2013.
Akamai Technologies - Overview RSA ® Conference 2013.
Deploying XenApp and XenDesktop with BIG-IP Brent Imhoff – Field Systems Engineer Gary Zaleski – Solutions Architect Michael Koyfman – Solutions Architect.
UnitedLayer Managed Private Cloud Saad Saleem Director of Customer Engineering.
The benefits of externalizing Web DMZ-as-a-Service in the Cloud James Smith, Sr. Security Sentrix
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Webinar Monday October 6, 2014 aiScaler software is installed on servers to create private point of presence (PoPs) – much like a CDN endpoint. They cache.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Akamai capabilities overview and it’s impact on Iowa.Gov and selected web pages.
Overlay Networks: An Akamai Perspective Ramesh K. Sitaraman, mangesh kasbekar, Woody Lichtenstein, and Manish Jain Akamai Technologies Inc Univerisy of.
Globally Distributed Content Delivery Presenter: Baoning Wu 03/25/2003.
Overlay Networks : An Akamai Perspective
Microsoft Cloud Solution.  What is the cloud?  Windows Azure  What services does it offer?  How does it all work?  How to go about using it  Further.
Hello Cloud… Mike Benkovich
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
V2 January © 2015 Citrix | Confidential – Content in this presentation is under NDA. NetScaler Pitch Deck One solution for all apps.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
WINDOWS AZURE AND THE HYBRID CLOUD. Hybrid Concepts and Cloud Services.
Improve the Performance, Scalability, and Reliability of Applications in the Cloud with jetNEXUS Load Balancer for Microsoft Azure MICROSOFT AZURE ISV.
Content Delivery Cloud A Better Alternative To Your Content Delivery Network (CDN) ©2013 Riverbed Technology Confidential and Proprietary.
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
Journey to the Cloud DIFFERENTIATION AGILITY COST SaaS Solutions Higher-level services Cloud Infrastructure.
Clouding with Microsoft Azure
IoT Security Part 2, The Malware
Barracuda Web Security Flex
Barracuda Firewall The Next-Generation Firewall for Everyone
Cloud Increases Publishing Software Availability and Makes Access Efficient Around the World MINI-CASE STUDY “The flexibility and efficiency within Azure.
Securing the Network Perimeter with ISA 2004
A10 Networks vThunder Leverages the Powerful Microsoft Azure Cloud Platform to Offer Advanced Layer 4-7 Networking, Security on a Global Scale MICROSOFT.
Microsoft SharePoint Server 2016
1. Public Network - Each Rackspace Cloud Server has two networks
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
practice-questions.html If you Are Thinking about your dumps? Introduction:
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
NGAGE Intelligence Leverages Microsoft Azure Platform to Provide Essential Analytics for Hybrid SharePoint Server/Office 365 Environments MICROSOFT AZURE.
AKAMAI INTELLIGENT PLATFORM™
Partner Logo Reblaze Utilizes Microsoft Azure Cloud Technology to Provide Web Assets with a Comprehensive, Robust, Protective Shield Against Internet Threats.
Welcome and thank you for choosing SharkGate
Managing Chaos: Data Movement in 2014 Steve Jordan
A single identity for the modern user
Engineering a Content Delivery Network
Engineering a Content Delivery Network
Presentation transcript:

Kona Security Solutions - Overview RSA® Conference 2013 NOTE: You can click on the black bars and adjust the length to fit your text. If your main title goes beyond one line, please remember to move the subtitle bar down a bit in order to keep some space between it and the main title bar. If you do not need a subtitle, you can delete that bar entirely.

The Akamai Intelligent Platform Pushing Optimization and Security to the Edge Massive Akamai Global Overlay Network Akamai Edge Server closest to or AT Origin Users Edge Server close to End User Customer Origin Web Server Akamai’s Intelligent Platform optimizes, conditions and controls the Internet Security embedded into Akamai Edge Servers at the edge

Hybrid Defense – the “new normal” DDoS Protection (Network and Application Layers); Web Application; Direct-to-Origin; and DNS attacks Web Application Firewall Web Server (Origin) Application or Database Server Network Firewall Customer Database Akamai Web Site Security Traditional Data Center Security Massively scalable solution Coordinated response Highly differentiated Proven Limited scalability Self-managed or MSSP Off the shelf solution

Akamai Kona Security Solutions Customer Origin with Akamai (Cloud) Datacenters End-User Origin Traffic Akamai Traffic 10000 10000 1000 1000 100 100 10 10 1 1

Expansive DDoS and Web Application Defenses Kona Site Defender Components (Included) DDoS mitigation Network & Application layers Massive scale Offload to origin. Web Application protection (WAF) Rate Controls Application Layer controls SQLi, XSS, etc. Custom Rules Cloak Customer Origin Prevent direct-to-Origin attacks Adaptive Caching Content served from Edge during attack Site Failover Access Control NetStorage Log Delivery Service Security Monitor Compliance Management ISO Security Standard (27002) We can currently deliver logs via Log Delivery Service (slow way – 2-3 hour latency with 24 hour guarantee) or; We can delivery via Real Time Reporting Service (RTR – Fast Way) We will soon support an API for real-time reporting, and; SYSLOG feeds We protect against slow GET requests by buffering the GET request in memory until it is complete. We can protect against slow POST requests (starting with KSD v2.0) by buffering POST requests in memory rather than using the default ghost "pump" path. This feature, cache:post-caching, was developed to enable other features. The goal is to protect customer origin servers from resource exhaustion when clients send POST requests very slowly. Slow POST is a feature under Rate Controls as such the option for Slow POST enablement shall show up in Rate Policies interface.

Overview Moving the mouse over a graph line allows you to see the details of the data point selected. Stats by Geography The heat map can be used to determine the geographic sources of the top attackers. This can be viewed as a graph (shown here) or as a table. Stats by Dimension There are three windows that allow you to select specific dimensions (event parameters) .

Close on the brand message – you can use the following sample text to speak to this closing brand slide. (Akamai is making your media more mobile, enabling “Any experience, any device, anywhere.” Our goal is to ultimately help you accelerate your business. [Corey]) (Today's best online experiences have been Akamaized. We’re here to help you reach mobile workforces, and 24/7 consumers with any experience on any device, anywhere. And to ultimately help you accelerate your business. [Ravi]) (Akamai’s Application & Cloud Performance Solutions enable you to control your applications, control your costs, and control your cloud, offering you the agility that you need to accelerate your business. [Willie]) (Akamai offers you solutions to revolutionize your media strategy and engage users with any experience, on any device, anywhere, to grow your audience and grow your business. [Bill]) (Mobilize, optimize, and monetize your business, providing a high performance experience to your 24/7 consumers so that you can accelerate your online retail strategies. [Pedro]) (Block threats, not performance, in this ever-evolving hyperconnected world. Securely reach your users on any device, anywhere so you can accelerate your business. [John]) (Akamai helps you connect to users on any device, anywhere, removing the complexities of privacy, security, and rights management, while also allowing businesses to spend advertising dollars more effectively. [Khan])