SlideShare une entreprise Scribd logo
1  sur  24
Security without sacrificing performance
Konrad Kaczanowski & Rafał Jaskulski
©2013 AKAMAI | FASTER FORWARDTM
Agenda
1.State of the Internet
2.Why use protection?
3.Choose wisely – you get what you pay for
©2013 AKAMAI | FASTER FORWARDTM
The numbers of Akamai
• Average traffic levels of over 6 Tbps
• Peak traffic levels to date of ~10Tbps
• Handling ~20 million hits/second, on average
700+
Cities
2,000+
Locations
80
Countries
The Akamai Intelligent Platform
1,100+
Networks
130,000+
Servers
©2013 AKAMAI | FASTER FORWARDTM
90% of Internet
users are within one
network hop of an
Akamai server
Close to the edge of the internet
©2013 AKAMAI | FASTER FORWARDTM
State of the internet
• 5% average connection speed
increase
• 4.6% average peak speed
increase
• 2.4% increase in unique IP v4 addresses
©2013 AKAMAI | FASTER FORWARDTM
Where do attacks come from?
 Attacks coming from wide range of countries (117 unique countries in Q4 2012)
 Rise in attacks originating from China – now account for 41% of worldwide attack traffic
 Akamai's customers reported 758 DDoS attacks in 2012 (more than 3 times the amount seen in 2011)
©2013 AKAMAI | FASTER FORWARDTM
Attack trends
 Average attack bandwidth up 718 percent from 5.9 Gbps to 48.25
Gbps
 Average attack duration increased by 7.14 percent from 32.2 hours to
34.5 hours
 Regional distribution:
 56% Asia
 25% Europe
 18% North & South America
 1% Africa
©2013 AKAMAI | FASTER FORWARDTM
What's your favorite port?
©2013 AKAMAI | FASTER FORWARDTM
Fancy an attack?
©2013 AKAMAI | FASTER FORWARDTM
Value of a hacked machine
Courtesy of http://krebsonsecurity.com/
©2013 AKAMAI | FASTER FORWARDTM
Real life example
• Top 500 online retailer generating just under 100,000 USD per hour in
revenue
• Internationally coordinated DDoS attack
• Shifting attack sources
• Changing attack signatures
• Peak attack traffic at ~112 Gbps (over 10000 more than usually)
• Akamai absorbed the attack traffic
• Savings of ~10 million USD over a period of several days
©2013 AKAMAI | FASTER FORWARDTM
• Inhouse solutions
• Dedicated security services
1. Reactive (Scrubbers) – monitor the traffic on your own. In case of attack
direct incoming traffic to go through a ‘scrubbing centre’.
2. Proactive – always-on model, 24h protection, adjust only for new attack
vectors
What are my security choices?
©2013 AKAMAI | FASTER FORWARDTM
In house security
Network
Firewall
Web
Application
Firewall
Application
or Database
Server
Customer
Database
Web
Server
(Origin)
Traditional Data Center Security
Limited scalability
Self-managed or MSSP
Off the shelf solution
©2013 AKAMAI | FASTER FORWARDTM
Scrubbers
©2013 AKAMAI | FASTER FORWARDTM
Akamai
• Distributed Intelligent Platform
• Security and Acceleration capabilities
• Several attack types dropped by default
• „Always on” protection
• Full control over features and configuration
• Real-time monitoring
• Acceleration, caching and more
©2013 AKAMAI | FASTER FORWARDTM
Akamai Intelligent Platform basic protection levels
• TCP SYN flood attacks
• UDP flood
• ICMP flood
• Some HTTP response splitting attacks (when the split is in the URL
path)
• Malformed request
• Port scanning
• Some basic DDoS protection (due to caching)
©2013 AKAMAI | FASTER FORWARDTM
Akamai Security Portfolio
Enhanced DNS:
Attack against the DNS infrastructure
Attack against the TLD (customer.com)
BIND vulnerability exploits
Basic DNS poisoning attacks (TSIG)
Advanced DNS poisoning attacks
(DNSSEC)
SiteShield:
Any layer 4-7 attacks directly against the origin
Still a risk to over at the layer 3
GTM:
Data center failure (load balancing, failover)
Web Application Firewall:
IP/CIDR/Geo whitelisting/blacklisting
XSS, SQLi
Protocol violations, Encoding abuse
Layer 7 floods
Shopper Prioritization:
Flash crowd (real or DDoS)
©2013 AKAMAI | FASTER FORWARDTM
(Cloud)
Datacenters
End User
1
10
100
10000
Origin
Traffic
1000
Akamai
Traffic
1
10
100
10000
1000 COVERED
Web Application security with Akamai
©2013 AKAMAI | FASTER FORWARDTM
Comparison
In-house Scrubbers Akamai
Pricing model Whatever you are
willing to pay
Moderate Monthly Fee +
Processed Traffic
Monthly Fee + Traffic (Insurance
option)
Protection Depending on what
is installed
On request Always on
Monitoring Internal Limited - customer mostly Monitoring cockpits, InfoSec team
notifications on ongoing and
planned attacks
Integration None (Internal) For each attack: BGP route
modification, GRE tunnel
configuration
Once:
DNS entry modification
Ports - All 80 & 443
Performance Possible decrease Decrease when activated Increase due to accelerated
©2013 AKAMAI | FASTER FORWARDTM
Before DDoS hits you
DDoS cheat sheet
• Decision makers list
• Define escalation paths
• Who to call and when (emergency contact information)
©2013 AKAMAI | FASTER FORWARDTM
Check out our app
©2013 AKAMAI | FASTER FORWARDTM
Questions?
©2013 AKAMAI | FASTER FORWARDTM
Under attack? Call us!
www.ddos-hotline.com
©2013 AKAMAI | FASTER FORWARDTM
Thank you!
Visit our booth at

Contenu connexe

En vedette

Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeś
Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeśModele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeś
Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeśBeyond.pl
 
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...Bluerank
 
Búsqueda bibliografica en bases españolas
Búsqueda bibliografica en bases españolasBúsqueda bibliografica en bases españolas
Búsqueda bibliografica en bases españolasangmorrod
 
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...The New School
 
Una carta a los infelices y miserables de este pais
Una carta a los infelices y miserables de este paisUna carta a los infelices y miserables de este pais
Una carta a los infelices y miserables de este paisJesus Mejia
 

En vedette (6)

Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeś
Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeśModele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeś
Modele biznesowe na nowe czasy, czyli wzrost jakiego nie znałeś
 
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...
Wykorzystanie danych o użytkowniku do personalizacji procesu zakupowego ::: M...
 
BOMMA Certificado
BOMMA CertificadoBOMMA Certificado
BOMMA Certificado
 
Búsqueda bibliografica en bases españolas
Búsqueda bibliografica en bases españolasBúsqueda bibliografica en bases españolas
Búsqueda bibliografica en bases españolas
 
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...
The Internet in China: breakneck growth and activism: jell-o, push ups, alpac...
 
Una carta a los infelices y miserables de este pais
Una carta a los infelices y miserables de este paisUna carta a los infelices y miserables de este pais
Una carta a los infelices y miserables de este pais
 

Dernier

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

#IT fest 2013 - Security without sacrificing performance

  • 1. Security without sacrificing performance Konrad Kaczanowski & Rafał Jaskulski
  • 2. ©2013 AKAMAI | FASTER FORWARDTM Agenda 1.State of the Internet 2.Why use protection? 3.Choose wisely – you get what you pay for
  • 3. ©2013 AKAMAI | FASTER FORWARDTM The numbers of Akamai • Average traffic levels of over 6 Tbps • Peak traffic levels to date of ~10Tbps • Handling ~20 million hits/second, on average 700+ Cities 2,000+ Locations 80 Countries The Akamai Intelligent Platform 1,100+ Networks 130,000+ Servers
  • 4. ©2013 AKAMAI | FASTER FORWARDTM 90% of Internet users are within one network hop of an Akamai server Close to the edge of the internet
  • 5. ©2013 AKAMAI | FASTER FORWARDTM State of the internet • 5% average connection speed increase • 4.6% average peak speed increase • 2.4% increase in unique IP v4 addresses
  • 6. ©2013 AKAMAI | FASTER FORWARDTM Where do attacks come from?  Attacks coming from wide range of countries (117 unique countries in Q4 2012)  Rise in attacks originating from China – now account for 41% of worldwide attack traffic  Akamai's customers reported 758 DDoS attacks in 2012 (more than 3 times the amount seen in 2011)
  • 7. ©2013 AKAMAI | FASTER FORWARDTM Attack trends  Average attack bandwidth up 718 percent from 5.9 Gbps to 48.25 Gbps  Average attack duration increased by 7.14 percent from 32.2 hours to 34.5 hours  Regional distribution:  56% Asia  25% Europe  18% North & South America  1% Africa
  • 8. ©2013 AKAMAI | FASTER FORWARDTM What's your favorite port?
  • 9. ©2013 AKAMAI | FASTER FORWARDTM Fancy an attack?
  • 10. ©2013 AKAMAI | FASTER FORWARDTM Value of a hacked machine Courtesy of http://krebsonsecurity.com/
  • 11. ©2013 AKAMAI | FASTER FORWARDTM Real life example • Top 500 online retailer generating just under 100,000 USD per hour in revenue • Internationally coordinated DDoS attack • Shifting attack sources • Changing attack signatures • Peak attack traffic at ~112 Gbps (over 10000 more than usually) • Akamai absorbed the attack traffic • Savings of ~10 million USD over a period of several days
  • 12. ©2013 AKAMAI | FASTER FORWARDTM • Inhouse solutions • Dedicated security services 1. Reactive (Scrubbers) – monitor the traffic on your own. In case of attack direct incoming traffic to go through a ‘scrubbing centre’. 2. Proactive – always-on model, 24h protection, adjust only for new attack vectors What are my security choices?
  • 13. ©2013 AKAMAI | FASTER FORWARDTM In house security Network Firewall Web Application Firewall Application or Database Server Customer Database Web Server (Origin) Traditional Data Center Security Limited scalability Self-managed or MSSP Off the shelf solution
  • 14. ©2013 AKAMAI | FASTER FORWARDTM Scrubbers
  • 15. ©2013 AKAMAI | FASTER FORWARDTM Akamai • Distributed Intelligent Platform • Security and Acceleration capabilities • Several attack types dropped by default • „Always on” protection • Full control over features and configuration • Real-time monitoring • Acceleration, caching and more
  • 16. ©2013 AKAMAI | FASTER FORWARDTM Akamai Intelligent Platform basic protection levels • TCP SYN flood attacks • UDP flood • ICMP flood • Some HTTP response splitting attacks (when the split is in the URL path) • Malformed request • Port scanning • Some basic DDoS protection (due to caching)
  • 17. ©2013 AKAMAI | FASTER FORWARDTM Akamai Security Portfolio Enhanced DNS: Attack against the DNS infrastructure Attack against the TLD (customer.com) BIND vulnerability exploits Basic DNS poisoning attacks (TSIG) Advanced DNS poisoning attacks (DNSSEC) SiteShield: Any layer 4-7 attacks directly against the origin Still a risk to over at the layer 3 GTM: Data center failure (load balancing, failover) Web Application Firewall: IP/CIDR/Geo whitelisting/blacklisting XSS, SQLi Protocol violations, Encoding abuse Layer 7 floods Shopper Prioritization: Flash crowd (real or DDoS)
  • 18. ©2013 AKAMAI | FASTER FORWARDTM (Cloud) Datacenters End User 1 10 100 10000 Origin Traffic 1000 Akamai Traffic 1 10 100 10000 1000 COVERED Web Application security with Akamai
  • 19. ©2013 AKAMAI | FASTER FORWARDTM Comparison In-house Scrubbers Akamai Pricing model Whatever you are willing to pay Moderate Monthly Fee + Processed Traffic Monthly Fee + Traffic (Insurance option) Protection Depending on what is installed On request Always on Monitoring Internal Limited - customer mostly Monitoring cockpits, InfoSec team notifications on ongoing and planned attacks Integration None (Internal) For each attack: BGP route modification, GRE tunnel configuration Once: DNS entry modification Ports - All 80 & 443 Performance Possible decrease Decrease when activated Increase due to accelerated
  • 20. ©2013 AKAMAI | FASTER FORWARDTM Before DDoS hits you DDoS cheat sheet • Decision makers list • Define escalation paths • Who to call and when (emergency contact information)
  • 21. ©2013 AKAMAI | FASTER FORWARDTM Check out our app
  • 22. ©2013 AKAMAI | FASTER FORWARDTM Questions?
  • 23. ©2013 AKAMAI | FASTER FORWARDTM Under attack? Call us! www.ddos-hotline.com
  • 24. ©2013 AKAMAI | FASTER FORWARDTM Thank you! Visit our booth at