Presentation is loading. Please wait.

Presentation is loading. Please wait.

Kona Security Solutions - Overview

Similar presentations


Presentation on theme: "Kona Security Solutions - Overview"— Presentation transcript:

1 Kona Security Solutions - Overview
RSA® Conference 2013 NOTE: You can click on the black bars and adjust the length to fit your text. If your main title goes beyond one line, please remember to move the subtitle bar down a bit in order to keep some space between it and the main title bar. If you do not need a subtitle, you can delete that bar entirely.

2 The Akamai Intelligent Platform Pushing Optimization and Security to the Edge
Massive Akamai Global Overlay Network Akamai Edge Server closest to or AT Origin Users Edge Server close to End User Customer Origin Web Server Akamai’s Intelligent Platform optimizes, conditions and controls the Internet Security embedded into Akamai Edge Servers at the edge

3 Hybrid Defense – the “new normal”
DDoS Protection (Network and Application Layers); Web Application; Direct-to-Origin; and DNS attacks Web Application Firewall Web Server (Origin) Application or Database Server Network Firewall Customer Database Akamai Web Site Security Traditional Data Center Security Massively scalable solution Coordinated response Highly differentiated Proven Limited scalability Self-managed or MSSP Off the shelf solution

4 Akamai Kona Security Solutions Customer Origin with Akamai
(Cloud) Datacenters End-User Origin Traffic Akamai Traffic 10000 10000 1000 1000 100 100 10 10 1 1

5 Expansive DDoS and Web Application Defenses Kona Site Defender Components (Included)
DDoS mitigation Network & Application layers Massive scale Offload to origin. Web Application protection (WAF) Rate Controls Application Layer controls SQLi, XSS, etc. Custom Rules Cloak Customer Origin Prevent direct-to-Origin attacks Adaptive Caching Content served from Edge during attack Site Failover Access Control NetStorage Log Delivery Service Security Monitor Compliance Management ISO Security Standard (27002) We can currently deliver logs via Log Delivery Service (slow way – 2-3 hour latency with 24 hour guarantee) or; We can delivery via Real Time Reporting Service (RTR – Fast Way) We will soon support an API for real-time reporting, and; SYSLOG feeds We protect against slow GET requests by buffering the GET request in memory until it is complete. We can protect against slow POST requests (starting with KSD v2.0) by buffering POST requests in memory rather than using the default ghost "pump" path. This feature, cache:post-caching, was developed to enable other features. The goal is to protect customer origin servers from resource exhaustion when clients send POST requests very slowly. Slow POST is a feature under Rate Controls as such the option for Slow POST enablement shall show up in Rate Policies interface.

6 Overview Moving the mouse over a graph line allows you to see the details of the data point selected. Stats by Geography The heat map can be used to determine the geographic sources of the top attackers. This can be viewed as a graph (shown here) or as a table. Stats by Dimension There are three windows that allow you to select specific dimensions (event parameters) .

7 Close on the brand message – you can use the following sample text to speak to this closing brand slide. (Akamai is making your media more mobile, enabling “Any experience, any device, anywhere.” Our goal is to ultimately help you accelerate your business. [Corey]) (Today's best online experiences have been Akamaized. We’re here to help you reach mobile workforces, and 24/7 consumers with any experience on any device, anywhere. And to ultimately help you accelerate your business. [Ravi]) (Akamai’s Application & Cloud Performance Solutions enable you to control your applications, control your costs, and control your cloud, offering you the agility that you need to accelerate your business. [Willie]) (Akamai offers you solutions to revolutionize your media strategy and engage users with any experience, on any device, anywhere, to grow your audience and grow your business. [Bill]) (Mobilize, optimize, and monetize your business, providing a high performance experience to your 24/7 consumers so that you can accelerate your online retail strategies. [Pedro]) (Block threats, not performance, in this ever-evolving hyperconnected world. Securely reach your users on any device, anywhere so you can accelerate your business. [John]) (Akamai helps you connect to users on any device, anywhere, removing the complexities of privacy, security, and rights management, while also allowing businesses to spend advertising dollars more effectively. [Khan])


Download ppt "Kona Security Solutions - Overview"

Similar presentations


Ads by Google