Your SlideShare is downloading. ×
Akamai Kona Security Solutions - RSA Conference 2013
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Akamai Kona Security Solutions - RSA Conference 2013

761
views

Published on

Designed to provide superior cloud computing security, prevent data theft and downtime and mitigate Denial of Service attacks by extending the security perimeter outside the data center, Kona Security …

Designed to provide superior cloud computing security, prevent data theft and downtime and mitigate Denial of Service attacks by extending the security perimeter outside the data center, Kona Security Solutions are part of an overall web security strategy. They deliver unmatched cloud security solutions and offer protection from increasingly large and sophisticated Web attacks including SQL injection and Distributed Denial of Service attacks (DDoS attacks). Learn more about Kona Security Solutions: http://www.akamai.com/html/solutions/kona-solutions.html

Learn more about Akamai's presence at RSA Conference 2013: http://www.akamai.com/html/ms/rsa_conference_2013.html

Published in: Technology

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
761
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
37
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Kona Security Solutions - OverviewRSA® Conference 2013
  • 2. The Akamai Intelligent PlatformPushing Optimization and Security to the Edge Massive Akamai Global Overlay Network Akamai Edge Server closest to or AT Origin Edge Server close Users Customer Origin to End User Web Server Akamai’s Intelligent Platform optimizes, Security embedded into Akamai conditions and controls Edge Servers at the edge the Internet ©2013 AKAMAI | FASTER FORWARDTM
  • 3. Hybrid Defense – the “new normal”DDoS Protection (Network and Application Layers);Web Application; Direct-to-Origin; and DNS attacks Web Web Application Network Application Server or Database Customer Firewall Firewall (Origin) Server Database Akamai Web Site Security Traditional Data Center Security Massively scalable solution Limited scalability Coordinated response Self-managed or MSSP Highly differentiated Off the shelf solution Proven ©2013 AKAMAI | FASTER FORWARDTM
  • 4. Akamai Kona Security Solutions Customer Origin with Akamai (Cloud) Datacenters End-User Origin Akamai Traffic Traffic10000 10000 1000 1000 100 100 10 10 1 1 ©2013 AKAMAI | FASTER FORWARDTM
  • 5. Expansive DDoS and Web Application DefensesKona Site Defender Components (Included)• DDoS mitigation • Adaptive Caching • Network & Application layers • Content served from Edge during • Massive scale attack • Offload to origin. • Site Failover• Web Application protection (WAF) • Access Control • Rate Controls • NetStorage • Application Layer controls • SQLi, XSS, etc. • Log Delivery Service • Custom Rules • Security Monitor• Cloak Customer Origin • Compliance Management • Prevent direct-to-Origin attacks • ISO Security Standard (27002) ©2013 AKAMAI | FASTER FORWARDTM
  • 6. Overview Moving the mouse over a graph line allows you to see the details of the data point selected. Stats by Geography Stats by Dimension The heat map can be used There are three windows to determine the geographic that allow you to select sources of the top specific dimensions (event attackers. This can be parameters) . viewed as a graph (shown here) or as a table. ©2013 AKAMAI | FASTER FORWARDTM
  • 7. ©2013 AKAMAI | FASTER FORWARDTM