SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF
Billions of people, tens of billions of devices and countless petabytes of information are all connected
online. With rapid online innovation, new security threats are emerging with equal speed. The challenge
for companies is to innovate fearlessly and deliver the fast, fluid online experience consumers and
business users expect while protecting against threats that cause downtime, drive up costs and put
confidential information at risk. To succeed, companies need to continue to expand their online
offerings without constantly watching the door.
Some of the biggest brands in the world – many of which are targeted for attack on a regular basis,
trust Akamai’s web security solutions to protect their online presence.
Akamai’s Kona Site Defender
Akamai’s Kona Site Defender extends security beyond the data center while maintaining site
performance and availability in the face of fast-changing threats. It leverages the power of the
Akamai Intelligent Platform™ to detect, identify and mitigate Denial-of-Service (DoS) and
Distributed Denial-of-Service (DDoS) attacks before they ever reach the origin.
How it Works
Kona Site Defender thwarts DDoS attacks by deflecting network-layer DDoS traffic and absorbing
application-layer DDoS traffic at the network edge. Mitigation capabilities are implemented natively
in-path to protect against attacks in the cloud before they reach the customer origin. Kona Site
Defender also incorporates a highly scalable Web Application Firewall (WAF) that protects against
application-layer attacks in HTTP and HTPS traffic, such as SQL injections and cross-site
scripting (XSS).
BENEFITS TO YOUR BUSINESS
•	 Reduce downtime and business risk
with the scale to deflect/absorb the largest
DoS and DDoS attacks
•	 Reduce the risk of data theft with
a highly scalable Web Application Firewall
•	 Maintain performance during attacks
through Akamai’s globally distributed
architecture
•	 Reduce costs associated with web security
by leveraging Akamai’s globally distributed
web security platform
•	 Protect against new and evolving
threats with Kona Rules regularly updated
by Akamai’s Threat Intelligence Team
Kona Site Defender
Multi-layered defense to protect websites against the increasing threat, sophistication and scale of attacks
Attacker
Web
Applications
Customer
Datacenter
STOP
Unmatched web and application security delivered via an
intelligent platform with 137,000+ servers in 87+ countries STOP ATTACKS AT THE EDGE
• DDoS defense with unmatched scale
• Web application firewall
• Rate controls
• SQLi, cross-site scripting defenses
• Custom rules and ongoing updates
• DNS protection
• User validation
• Security monitor for attack visibility
We’re always planning for growth.
With Akamai we’re confidently positioned
to drive more site traffic and revenues while
safeguarding our brand and shoppers’
information.
— Jason Miller, VP of Technology,
Motorcycle Superstore
Kona Site Defender
©2014 Akamai Technologies, Inc. All Rights Reserved. Reproduction in whole or in part in any form or medium without express written permission is prohibited. Akamai and the Akamai wave logo are registered
trademarks. Other trademarks contained herein are the property of their respective owners. Akamai believes that the information in this publication is accurate as of its publication date; such information is subject
to change without notice. Published 06/14.
Akamai is headquartered in Cambridge, Massachusetts in the United States with operations in more than 40 offices around the world. Our services and renowned customer care
enable businesses to provide an unparalleled Internet experience for their customers worldwide. Addresses, phone numbers and contact information for all locations are listed on
www.akamai.com/locations.
Akamai®
is a leading provider of cloud services for delivering, optimizing and securing online content and business applications. At the core of the company’s solutions is the
Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the
increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace
of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter.
AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF
Key Capabilities
•	 Kona Rules: Akamai’s Threat Intelligence Team develops and updates
WAF rules continually to address new and emerging web application
attacks, such as SQL injections, cross-site scripting, remote file inclusion
and more. Scheduled reviews by the Akamai Professional Services team
analyze logs and recommend configuration tuning/optimization to
maintain an effective security posture even as applications change
and new threats emerge.
•	 Application-Layer Controls: A collection of pre-defined, configurable
application-layer firewall rules address categories such as Protocol
Violations, Request Limit Violations, HTTP Policy Violations and more.
You can also create policy-based rules enforced after the execution
of application layer controls.
•	 Adaptive Rate Controls: Automatically protect applications against
application-layer DDoS and other volumetric attacks by monitoring and
controlling the rate of requests against them. Set behavioral rules to
respond to bursts of requests in seconds, selectively alert/block attackers
based on IP address and other parameters, and mitigate slow POST
DDoS attacks.
•	 Network-Layer Controls: Automatically drop network-layer DDoS
attacks at the network edge. Define and enforce IP whitelists and
blacklists to allow/restrict requests from certain IP addresses
or geographical regions to protect your website.
•	 Site Shield: Cloak your origin from the public Internet to further
protect against direct-to-origin attacks without impeding quick, reliable
content delivery
•	 Security Monitor: Real-time visibility into security events and the
ability to drill down into attack alerts to learn what’s being attacked,
by whom, what defense capabilities triggered the attack declaration
and what specifically in the requests triggered site defenses
•	 Logging: Increase your threat posture awareness by integrating
WAF event logs with your security information and event management
(SIEM) or other reporting solution through Akamai’s Log Delivery
Service (LDS)
•	 Fast DNS: Leverage Akamai’s authoritative name servers to allow
your end users to quickly get to your websites. Fast DNS is designed
to improve the performance and availability of your DNS infrastructure
while also protecting against the threat of DDoS attack.
The Akamai Ecosystem
Akamai makes the Internet fast, reliable and secure. Our comprehensive
solutions are built on the globally distributed Akamai Intelligent Platform™,
managed through the unified, customizable Luna Control Center for
visibility and control, and supported by Professional Services experts
who get you up and running easily and inspire innovation as your
strategies evolve.
Akamai kept all sites of the 2012 London Olympics up through a 40x increase in attack traffic with 23 different attack
types including SQL injections and XSS.
We can use a content distribution network, so it’s very hard to launch a DDoS on us, because our front end is so dispersed.
— Gerry Pennell, CIO, London Games Organizing Committee

Contenu connexe

Plus de Akamai Technologies

Plus de Akamai Technologies (20)

Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Replacing recovery with resilience
Replacing recovery with resilienceReplacing recovery with resilience
Replacing recovery with resilience
 
Competitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven DifferentiationCompetitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven Differentiation
 
3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware
 
3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model
 
새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유
 
更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由
 
应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因
 
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
 
3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto
 
3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto
 
3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance
 
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
 
3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs
 
Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2
 
Chicago Tech Day Jan 2015: RWD
Chicago Tech Day Jan 2015: RWDChicago Tech Day Jan 2015: RWD
Chicago Tech Day Jan 2015: RWD
 
Chicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden FeaturesChicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden Features
 
Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015
 
Edge 2014: Bypass Surgery - Akamai's Heartbleed Response Case Study
Edge 2014: Bypass Surgery - Akamai's Heartbleed Response Case StudyEdge 2014: Bypass Surgery - Akamai's Heartbleed Response Case Study
Edge 2014: Bypass Surgery - Akamai's Heartbleed Response Case Study
 
Edge 2014: MPEG DASH – Tomorrow's Format Today
Edge 2014: MPEG DASH – Tomorrow's Format TodayEdge 2014: MPEG DASH – Tomorrow's Format Today
Edge 2014: MPEG DASH – Tomorrow's Format Today
 

Dernier

Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 

Dernier (20)

What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 

Kona Site Defender Product Brief - Multi-layered defense to protect websites against the increasing frequency, sophistication, and scale of attacks

  • 1. AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Billions of people, tens of billions of devices and countless petabytes of information are all connected online. With rapid online innovation, new security threats are emerging with equal speed. The challenge for companies is to innovate fearlessly and deliver the fast, fluid online experience consumers and business users expect while protecting against threats that cause downtime, drive up costs and put confidential information at risk. To succeed, companies need to continue to expand their online offerings without constantly watching the door. Some of the biggest brands in the world – many of which are targeted for attack on a regular basis, trust Akamai’s web security solutions to protect their online presence. Akamai’s Kona Site Defender Akamai’s Kona Site Defender extends security beyond the data center while maintaining site performance and availability in the face of fast-changing threats. It leverages the power of the Akamai Intelligent Platform™ to detect, identify and mitigate Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks before they ever reach the origin. How it Works Kona Site Defender thwarts DDoS attacks by deflecting network-layer DDoS traffic and absorbing application-layer DDoS traffic at the network edge. Mitigation capabilities are implemented natively in-path to protect against attacks in the cloud before they reach the customer origin. Kona Site Defender also incorporates a highly scalable Web Application Firewall (WAF) that protects against application-layer attacks in HTTP and HTPS traffic, such as SQL injections and cross-site scripting (XSS). BENEFITS TO YOUR BUSINESS • Reduce downtime and business risk with the scale to deflect/absorb the largest DoS and DDoS attacks • Reduce the risk of data theft with a highly scalable Web Application Firewall • Maintain performance during attacks through Akamai’s globally distributed architecture • Reduce costs associated with web security by leveraging Akamai’s globally distributed web security platform • Protect against new and evolving threats with Kona Rules regularly updated by Akamai’s Threat Intelligence Team Kona Site Defender Multi-layered defense to protect websites against the increasing threat, sophistication and scale of attacks Attacker Web Applications Customer Datacenter STOP Unmatched web and application security delivered via an intelligent platform with 137,000+ servers in 87+ countries STOP ATTACKS AT THE EDGE • DDoS defense with unmatched scale • Web application firewall • Rate controls • SQLi, cross-site scripting defenses • Custom rules and ongoing updates • DNS protection • User validation • Security monitor for attack visibility We’re always planning for growth. With Akamai we’re confidently positioned to drive more site traffic and revenues while safeguarding our brand and shoppers’ information. — Jason Miller, VP of Technology, Motorcycle Superstore
  • 2. Kona Site Defender ©2014 Akamai Technologies, Inc. All Rights Reserved. Reproduction in whole or in part in any form or medium without express written permission is prohibited. Akamai and the Akamai wave logo are registered trademarks. Other trademarks contained herein are the property of their respective owners. Akamai believes that the information in this publication is accurate as of its publication date; such information is subject to change without notice. Published 06/14. Akamai is headquartered in Cambridge, Massachusetts in the United States with operations in more than 40 offices around the world. Our services and renowned customer care enable businesses to provide an unparalleled Internet experience for their customers worldwide. Addresses, phone numbers and contact information for all locations are listed on www.akamai.com/locations. Akamai® is a leading provider of cloud services for delivering, optimizing and securing online content and business applications. At the core of the company’s solutions is the Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter. AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Key Capabilities • Kona Rules: Akamai’s Threat Intelligence Team develops and updates WAF rules continually to address new and emerging web application attacks, such as SQL injections, cross-site scripting, remote file inclusion and more. Scheduled reviews by the Akamai Professional Services team analyze logs and recommend configuration tuning/optimization to maintain an effective security posture even as applications change and new threats emerge. • Application-Layer Controls: A collection of pre-defined, configurable application-layer firewall rules address categories such as Protocol Violations, Request Limit Violations, HTTP Policy Violations and more. You can also create policy-based rules enforced after the execution of application layer controls. • Adaptive Rate Controls: Automatically protect applications against application-layer DDoS and other volumetric attacks by monitoring and controlling the rate of requests against them. Set behavioral rules to respond to bursts of requests in seconds, selectively alert/block attackers based on IP address and other parameters, and mitigate slow POST DDoS attacks. • Network-Layer Controls: Automatically drop network-layer DDoS attacks at the network edge. Define and enforce IP whitelists and blacklists to allow/restrict requests from certain IP addresses or geographical regions to protect your website. • Site Shield: Cloak your origin from the public Internet to further protect against direct-to-origin attacks without impeding quick, reliable content delivery • Security Monitor: Real-time visibility into security events and the ability to drill down into attack alerts to learn what’s being attacked, by whom, what defense capabilities triggered the attack declaration and what specifically in the requests triggered site defenses • Logging: Increase your threat posture awareness by integrating WAF event logs with your security information and event management (SIEM) or other reporting solution through Akamai’s Log Delivery Service (LDS) • Fast DNS: Leverage Akamai’s authoritative name servers to allow your end users to quickly get to your websites. Fast DNS is designed to improve the performance and availability of your DNS infrastructure while also protecting against the threat of DDoS attack. The Akamai Ecosystem Akamai makes the Internet fast, reliable and secure. Our comprehensive solutions are built on the globally distributed Akamai Intelligent Platform™, managed through the unified, customizable Luna Control Center for visibility and control, and supported by Professional Services experts who get you up and running easily and inspire innovation as your strategies evolve. Akamai kept all sites of the 2012 London Olympics up through a 40x increase in attack traffic with 23 different attack types including SQL injections and XSS. We can use a content distribution network, so it’s very hard to launch a DDoS on us, because our front end is so dispersed. — Gerry Pennell, CIO, London Games Organizing Committee