SlideShare une entreprise Scribd logo
1  sur  14
| Intelligent Edge Security | © 2018Akamai1
EDGE SECURITY
A new paradigm for protecting
businesses from Internet-facing threats
| Intelligent Edge Security | © 2018Akamai2
TWO DECADES IN SECURITY
But security remains a persistent challenge
20172016201520142013201220101999 2003 20081998
Akamai founded
NOMINUM founded
Authoritative DNS
launched
Prolexic founded
Origin obfuscation
launched
Cloud Security
Intelligence developed
XEROCOLE founded
Integrated WAF +
DDoS launched
Curated WAF
ruleset developed
SOHA Systems founded
Managed WAF
service introduced
Bot management
introduced
Client Reputation launched
Credential abuse
mitigation Introduced
Secure application
access introduced
Malware & Phishing
Protection Introduced
Akamai introduces
first cloud WAF
| Intelligent Edge Security | © 2018Akamai3
20172016201520142013201220101999 2003 2008
NOMINUM founded
Origin obfuscation
launched
Cloud Security
Intelligence developed
Curated WAF
ruleset developed
Managed WAF
service introduced
Client Reputation launched
Secure application
access introduced
Authoritative DNS
launched
Prolexic founded
XEROCOLE founded
Integrated WAF +
DDoS launched
SOHA Systems founded
Bot management
introduced
Credential abuse
mitigation Introduced
Malware & Phishing
Protection Introduced
Akamai introduces
first cloud WAF
| Intelligent Edge Security | © 2018Akamai3
5M SQLi attacks / day
First SQLi attack
Akamai founded
TWO DECADES IN SECURITY
But security remains a persistent challenge
1998 2018
| Intelligent Edge Security | © 2018Akamai4
Process ToolsPeople
YOU
WHY IS SECURITY SO HARD?
Everything is changing faster than you can respond
| Intelligent Edge Security | © 2018Akamai5
Process ToolsPeople
YOU
| Intelligent Edge Security | © 2018Akamai5
WHY IS SECURITY SO HARD?
Everything is changing faster than you can respond
Changing threat landscape
Web attacks
Bot attacks
Malware
Web fraud
Network intrusion
DDoS attacks
Credential stuffing
Social / phishing
Shifting attack surface
More apps, changing faster
New technologies
3rd-party / open source code
Migration to APIs
Cloud computing
Dissolving perimeter
Changing workforce
Corporate M&A Industry mega-trends
Digital transformation
Mobile adoption
Cloud adoption
Regulatory compliance
Internet of Things
| Intelligent Edge Security | © 2018Akamai6
WHATTHAT MEANS FORYOU
Challenges to your security posture
INCREASED RISK
The probability and business impact
of cyber attack is higher, while
confidence in your ability to
respond is lower than ever before
Can’t keep up with the evolving
threat landscape
Can’t get to everything so
assets going unprotected
!
Potential impact of attacks on
apps and IT assets going up$
HIGH COMPLEXITY
Rapid and constant change in the
assets that you are responsible for
protecting is reducing your ability
to do so
Expanding but poorly
understood attack surface
Apps in multiple places with
inconsistent security posture
Not enough visibility into
everything that’s happening
LESS AGILITY
Ability of security organizations to
respond to the needs of business
partners is declining
Not moving as fast as the
business you support
Constantly responding to fires;
not being strategic
| Intelligent Edge Security | © 2018Akamai7
SECURITY SKILLS GAP
Why you cannot address those challenges
25%
of security leaders listed lack of trained
personnel as their top hinderance.
SOURCE: Cisco 2017 Annual Security Report
40%
of security leaders spend most of their
time focused on critical threats
Source: Dark Reading” Cybersecurity Staffing Shortage Tied to Cyberattacks, Data Breaches”
1.5 million
Frost & Sullivan estimated security
workforce shortage by 2020
SOURCE: Frost and Sullivan study
Biggest Skills Gaps
Ability to understand the
business
52%
Technical Skills
25%
Communications Skills
17%
46%
FEWERTHAN HALF
of leaders are confident
In their teams’ ability to handle anything
beyond simple cyber incidents
Source: Data science central
| Intelligent Edge Security | © 2018Akamai8
A NEW PARADIGM
What the edge offers for security
STRATEGIC PLATFORM
Surrounds your applications, infrastructure, and people and enforces
consistent security policy at a global scale
Industry’s largest capacity—over 80 Tbps
Massively distributed—2,400 global points of presence
Proven track record—instant mitigation of terabit-scale attacks
| Intelligent Edge Security | © 2018Akamai9
A NEW PARADIGM
What the edge offers for security
VISIBILITY into ATTACKS
Keeps up with the latest threats (so you don’t have to)
with visibility into billions of attacks daily
2 trillion DNS requests
1.3 billion client devices
178 billion application attacks
| Intelligent Edge Security | © 2018Akamai10
A NEW PARADIGM
What the edge offers for security
Protects your apps, infrastructure, and people anywhere—in
your offices and data centers, on the road, or in the cloud
ADAPTS to BUSINESS
140 countries around the world
On-premises, hybrid cloud, or multi-cloud
On-net or off-net
| Intelligent Edge Security | © 2018Akamai11
APPS & APIS
Protect Internet-facing apps and
APIs deployed anywhere—in your
data centers or in the public cloud
CREDENTIAL ABUSE
Protect customer accounts from
bot attacks and reduce fraud-
related financial losses
AKAMAI EDGE SECURITY
Protecting your business from the edge
DDoS protection
Web application firewall
ZEROTRUST
Control corporate application
access and protect users from
targeted threats
Identity management
Secure app access
DNS
Malware prevention
Bot management
Credential stuffing Web application firewall
API governance
Client reputation
| Intelligent Edge Security | © 2018Akamai12
DDoS protection
Web application firewall
Identity management
Secure app access
DNS
Malware prevention
Bot management
Credential stuffing Web application firewall
API governance
Client reputation
| Intelligent Edge Security | © 2018Akamai12
AKAMAI EDGE SECURITY
Security without compromise
APPS & APIS CREDENTIAL ABUSE ZEROTRUST
DDoS protection
Web application firewall
Identity management
Secure app access
DNS
Malware prevention
Bot management
Credential stuffing Web application firewall
API governance
Client reputation
Application acceleration
| Intelligent Edge Security | © 2018Akamai13
AKAMAI INTELLIGENT EDGE SECURITY
The market leader in edge-based security
z
PROTECT APPS &
APIs
MOVETO ZERO
TRUST
STOP CREDENTIAL
ABUSE
Akamai has had the strongest and broadest edge security offering for quite some
time…
- IDC
DDoS & WAF
LEADER
Bot Management
LEADER
Zero Trust eXtended Ecosystem
STRONG PERFORMER
| Intelligent Edge Security | © 2018Akamai14

Contenu connexe

Tendances

Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
Akamai Technologies - Company Overview
Akamai Technologies - Company OverviewAkamai Technologies - Company Overview
Akamai Technologies - Company OverviewAkamai Technologies
 
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdfAryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdfKlausSchwegler
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)danb02
 
Kona Site Defender Product Brief - Multi-layered defense to protect websites ...
Kona Site Defender Product Brief - Multi-layered defense to protect websites ...Kona Site Defender Product Brief - Multi-layered defense to protect websites ...
Kona Site Defender Product Brief - Multi-layered defense to protect websites ...Akamai Technologies
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsSagar Joshi
 
Siem ppt
Siem pptSiem ppt
Siem pptkmehul
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptxaungyekhant1
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...Amazon Web Services
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise Management Associates
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk M sharifi
 
SASE Future Proof sdwan 20 Sep2020 v2.1 BA
SASE Future Proof sdwan 20 Sep2020 v2.1 BASASE Future Proof sdwan 20 Sep2020 v2.1 BA
SASE Future Proof sdwan 20 Sep2020 v2.1 BAbourhan88100
 
Workshop Trend Micro
Workshop Trend MicroWorkshop Trend Micro
Workshop Trend MicroAymen Mami
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 

Tendances (20)

Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Understanding SASE
Understanding SASE Understanding SASE
Understanding SASE
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
What is SASE
What is SASEWhat is SASE
What is SASE
 
Akamai Technologies - Company Overview
Akamai Technologies - Company OverviewAkamai Technologies - Company Overview
Akamai Technologies - Company Overview
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
 
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdfAryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
SIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security ArsenalSIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security Arsenal
 
Kona Site Defender Product Brief - Multi-layered defense to protect websites ...
Kona Site Defender Product Brief - Multi-layered defense to protect websites ...Kona Site Defender Product Brief - Multi-layered defense to protect websites ...
Kona Site Defender Product Brief - Multi-layered defense to protect websites ...
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the Basics
 
Siem ppt
Siem pptSiem ppt
Siem ppt
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
SASE Future Proof sdwan 20 Sep2020 v2.1 BA
SASE Future Proof sdwan 20 Sep2020 v2.1 BASASE Future Proof sdwan 20 Sep2020 v2.1 BA
SASE Future Proof sdwan 20 Sep2020 v2.1 BA
 
Workshop Trend Micro
Workshop Trend MicroWorkshop Trend Micro
Workshop Trend Micro
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 

Similaire à Akamai Intelligent Edge Security

Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersCloudflare
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCSA Argentina
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentationixiademandgen
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinarZscaler
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
Info sec for startups
Info sec for startupsInfo sec for startups
Info sec for startupsKesava Reddy
 
TechFai.com.pdf
TechFai.com.pdfTechFai.com.pdf
TechFai.com.pdfTechFai
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudAmazon Web Services
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applicationsForcepoint LLC
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check PointHarry Gunns
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyCloudflare
 

Similaire à Akamai Intelligent Edge Security (20)

Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Info sec for startups
Info sec for startupsInfo sec for startups
Info sec for startups
 
TechFai.com.pdf
TechFai.com.pdfTechFai.com.pdf
TechFai.com.pdf
 
Information Security
Information SecurityInformation Security
Information Security
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 
Trust No One - Zero Trust on the Akamai Platform
Trust No One - Zero Trust on the Akamai PlatformTrust No One - Zero Trust on the Akamai Platform
Trust No One - Zero Trust on the Akamai Platform
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
 
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdfUNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
 

Plus de Akamai Technologies

Replacing recovery with resilience
Replacing recovery with resilienceReplacing recovery with resilience
Replacing recovery with resilienceAkamai Technologies
 
Competitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven DifferentiationCompetitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven DifferentiationAkamai Technologies
 
3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against MalwareAkamai Technologies
 
3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access ModelAkamai Technologies
 
새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유Akamai Technologies
 
更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由Akamai Technologies
 
应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因Akamai Technologies
 
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと きAkamai Technologies
 
3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remotoAkamai Technologies
 
3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remotoAkamai Technologies
 
3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distanceAkamai Technologies
 
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...Akamai Technologies
 
3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des RemotezugriffsAkamai Technologies
 
Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2Akamai Technologies
 
Chicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden FeaturesChicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden FeaturesAkamai Technologies
 
Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015Akamai Technologies
 
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEAEdge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEAAkamai Technologies
 
Edge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBayEdge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBayAkamai Technologies
 
Edge 2014: Bypass Surgery - Akamai's Heartbleed Response Case Study
Edge 2014: Bypass Surgery - Akamai's Heartbleed Response Case StudyEdge 2014: Bypass Surgery - Akamai's Heartbleed Response Case Study
Edge 2014: Bypass Surgery - Akamai's Heartbleed Response Case StudyAkamai Technologies
 

Plus de Akamai Technologies (20)

Replacing recovery with resilience
Replacing recovery with resilienceReplacing recovery with resilience
Replacing recovery with resilience
 
Competitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven DifferentiationCompetitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven Differentiation
 
3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware
 
3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model
 
새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유
 
更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由
 
应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因
 
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
 
3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto
 
3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto
 
3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance
 
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
 
3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs
 
Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2
 
Chicago Tech Day Jan 2015: RWD
Chicago Tech Day Jan 2015: RWDChicago Tech Day Jan 2015: RWD
Chicago Tech Day Jan 2015: RWD
 
Chicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden FeaturesChicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden Features
 
Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015
 
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEAEdge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
 
Edge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBayEdge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBay
 
Edge 2014: Bypass Surgery - Akamai's Heartbleed Response Case Study
Edge 2014: Bypass Surgery - Akamai's Heartbleed Response Case StudyEdge 2014: Bypass Surgery - Akamai's Heartbleed Response Case Study
Edge 2014: Bypass Surgery - Akamai's Heartbleed Response Case Study
 

Dernier

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Dernier (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Akamai Intelligent Edge Security

  • 1. | Intelligent Edge Security | © 2018Akamai1 EDGE SECURITY A new paradigm for protecting businesses from Internet-facing threats
  • 2. | Intelligent Edge Security | © 2018Akamai2 TWO DECADES IN SECURITY But security remains a persistent challenge 20172016201520142013201220101999 2003 20081998 Akamai founded NOMINUM founded Authoritative DNS launched Prolexic founded Origin obfuscation launched Cloud Security Intelligence developed XEROCOLE founded Integrated WAF + DDoS launched Curated WAF ruleset developed SOHA Systems founded Managed WAF service introduced Bot management introduced Client Reputation launched Credential abuse mitigation Introduced Secure application access introduced Malware & Phishing Protection Introduced Akamai introduces first cloud WAF
  • 3. | Intelligent Edge Security | © 2018Akamai3 20172016201520142013201220101999 2003 2008 NOMINUM founded Origin obfuscation launched Cloud Security Intelligence developed Curated WAF ruleset developed Managed WAF service introduced Client Reputation launched Secure application access introduced Authoritative DNS launched Prolexic founded XEROCOLE founded Integrated WAF + DDoS launched SOHA Systems founded Bot management introduced Credential abuse mitigation Introduced Malware & Phishing Protection Introduced Akamai introduces first cloud WAF | Intelligent Edge Security | © 2018Akamai3 5M SQLi attacks / day First SQLi attack Akamai founded TWO DECADES IN SECURITY But security remains a persistent challenge 1998 2018
  • 4. | Intelligent Edge Security | © 2018Akamai4 Process ToolsPeople YOU WHY IS SECURITY SO HARD? Everything is changing faster than you can respond
  • 5. | Intelligent Edge Security | © 2018Akamai5 Process ToolsPeople YOU | Intelligent Edge Security | © 2018Akamai5 WHY IS SECURITY SO HARD? Everything is changing faster than you can respond Changing threat landscape Web attacks Bot attacks Malware Web fraud Network intrusion DDoS attacks Credential stuffing Social / phishing Shifting attack surface More apps, changing faster New technologies 3rd-party / open source code Migration to APIs Cloud computing Dissolving perimeter Changing workforce Corporate M&A Industry mega-trends Digital transformation Mobile adoption Cloud adoption Regulatory compliance Internet of Things
  • 6. | Intelligent Edge Security | © 2018Akamai6 WHATTHAT MEANS FORYOU Challenges to your security posture INCREASED RISK The probability and business impact of cyber attack is higher, while confidence in your ability to respond is lower than ever before Can’t keep up with the evolving threat landscape Can’t get to everything so assets going unprotected ! Potential impact of attacks on apps and IT assets going up$ HIGH COMPLEXITY Rapid and constant change in the assets that you are responsible for protecting is reducing your ability to do so Expanding but poorly understood attack surface Apps in multiple places with inconsistent security posture Not enough visibility into everything that’s happening LESS AGILITY Ability of security organizations to respond to the needs of business partners is declining Not moving as fast as the business you support Constantly responding to fires; not being strategic
  • 7. | Intelligent Edge Security | © 2018Akamai7 SECURITY SKILLS GAP Why you cannot address those challenges 25% of security leaders listed lack of trained personnel as their top hinderance. SOURCE: Cisco 2017 Annual Security Report 40% of security leaders spend most of their time focused on critical threats Source: Dark Reading” Cybersecurity Staffing Shortage Tied to Cyberattacks, Data Breaches” 1.5 million Frost & Sullivan estimated security workforce shortage by 2020 SOURCE: Frost and Sullivan study Biggest Skills Gaps Ability to understand the business 52% Technical Skills 25% Communications Skills 17% 46% FEWERTHAN HALF of leaders are confident In their teams’ ability to handle anything beyond simple cyber incidents Source: Data science central
  • 8. | Intelligent Edge Security | © 2018Akamai8 A NEW PARADIGM What the edge offers for security STRATEGIC PLATFORM Surrounds your applications, infrastructure, and people and enforces consistent security policy at a global scale Industry’s largest capacity—over 80 Tbps Massively distributed—2,400 global points of presence Proven track record—instant mitigation of terabit-scale attacks
  • 9. | Intelligent Edge Security | © 2018Akamai9 A NEW PARADIGM What the edge offers for security VISIBILITY into ATTACKS Keeps up with the latest threats (so you don’t have to) with visibility into billions of attacks daily 2 trillion DNS requests 1.3 billion client devices 178 billion application attacks
  • 10. | Intelligent Edge Security | © 2018Akamai10 A NEW PARADIGM What the edge offers for security Protects your apps, infrastructure, and people anywhere—in your offices and data centers, on the road, or in the cloud ADAPTS to BUSINESS 140 countries around the world On-premises, hybrid cloud, or multi-cloud On-net or off-net
  • 11. | Intelligent Edge Security | © 2018Akamai11 APPS & APIS Protect Internet-facing apps and APIs deployed anywhere—in your data centers or in the public cloud CREDENTIAL ABUSE Protect customer accounts from bot attacks and reduce fraud- related financial losses AKAMAI EDGE SECURITY Protecting your business from the edge DDoS protection Web application firewall ZEROTRUST Control corporate application access and protect users from targeted threats Identity management Secure app access DNS Malware prevention Bot management Credential stuffing Web application firewall API governance Client reputation
  • 12. | Intelligent Edge Security | © 2018Akamai12 DDoS protection Web application firewall Identity management Secure app access DNS Malware prevention Bot management Credential stuffing Web application firewall API governance Client reputation | Intelligent Edge Security | © 2018Akamai12 AKAMAI EDGE SECURITY Security without compromise APPS & APIS CREDENTIAL ABUSE ZEROTRUST DDoS protection Web application firewall Identity management Secure app access DNS Malware prevention Bot management Credential stuffing Web application firewall API governance Client reputation Application acceleration
  • 13. | Intelligent Edge Security | © 2018Akamai13 AKAMAI INTELLIGENT EDGE SECURITY The market leader in edge-based security z PROTECT APPS & APIs MOVETO ZERO TRUST STOP CREDENTIAL ABUSE Akamai has had the strongest and broadest edge security offering for quite some time… - IDC DDoS & WAF LEADER Bot Management LEADER Zero Trust eXtended Ecosystem STRONG PERFORMER
  • 14. | Intelligent Edge Security | © 2018Akamai14

Notes de l'éditeur

  1. What is the change in the world around you that necessitates YOU to change? Typically focus on the changing threat landscape Web DDoS Application attacks Bots Credential stuffing Web fraud Network Malware Network intrusion Social Phishing Changing attack surface Applications More applications changing faster Complexity – new functionality, microservices Move to APIs Third-party / open source code Zero day vulnerabilities Infrastructure Cloud computing Dissolving perimeter People Changing people Corporate M&A Mega trends Consumers Digital transformation Mobile Infrstrucutre Cloud adoption IoT Compliance
  2. What is the change in the world around you that necessitates YOU to change? Typically focus on the changing threat landscape Web DDoS Application attacks Bots Credential stuffing Web fraud Network Malware Network intrusion Social Phishing Changing attack surface Applications More applications changing faster Complexity – new functionality, microservices Move to APIs Third-party / open source code Zero day vulnerabilities Infrastructure Cloud computing Dissolving perimeter People Changing people Corporate M&A Mega trends Consumers Digital transformation Mobile Infrstrucutre Cloud adoption IoT Compliance
  3. Increased risk More threats to worry about every day, can’t keep up with the threat landscape Can’t get to everything, so things are going unprotected Applications and data increasingly valuable, so the impact of a breach goes up High complexity More application complexity means it’s becoming harder to protect them every day Applications are being deployed in more places, with varying degrees of control over them or secureness of perimeter Things keep moving; you don’t even have visibility into everything you need Less agility You’re not moving as fast as the business around you; how are you supposed to protect them? You’re constantly responding to fires instead of putting in place a strategic plan to support the buseinss
  4. All stats daily
  5. Isolate on-prem and cloud infrastructure ETP
  6. Built on the Akamai intelligent edge, all of our security solutions come with application acceleration built in (including our new Zero Trust package for 2019 that includes Ion and IPA)
  7. Isolate on-prem and cloud infrastructure ETP