7
Kona Security Solutions - Overview RSA ® Conference 2013

Akamai Kona Security Solutions - RSA Conference 2013

Embed Size (px)

DESCRIPTION

Designed to provide superior cloud computing security, prevent data theft and downtime and mitigate Denial of Service attacks by extending the security perimeter outside the data center, Kona Security Solutions are part of an overall web security strategy. They deliver unmatched cloud security solutions and offer protection from increasingly large and sophisticated Web attacks including SQL injection and Distributed Denial of Service attacks (DDoS attacks). Learn more about Kona Security Solutions: http://www.akamai.com/html/solutions/kona-solutions.html Learn more about Akamai's presence at RSA Conference 2013: http://www.akamai.com/html/ms/rsa_conference_2013.html

Citation preview

Page 1: Akamai Kona Security Solutions - RSA Conference 2013

Kona Security Solutions - Overview

RSA® Conference 2013

Page 2: Akamai Kona Security Solutions - RSA Conference 2013

©2013 AKAMAI | FASTER FORWARDTM

The Akamai Intelligent Platform Pushing Optimization and Security to the Edge

Customer Origin Users

Akamai Edge Server closest to or AT Origin

Akamai’s Intelligent Platform optimizes,

conditions and controls the Internet

Massive Akamai Global Overlay Network

Edge Server close to End User

Web Server

Security embedded into Akamai Edge Servers at the edge

Page 3: Akamai Kona Security Solutions - RSA Conference 2013

©2013 AKAMAI | FASTER FORWARDTM

Hybrid Defense – the “new normal”

Akamai Web Site Security

Network Firewall

Web Application

Firewall

Application or Database

Server Customer Database

Web Server (Origin)

Traditional Data Center Security

Massively scalable solution Coordinated response Highly differentiated

Proven

Limited scalability Self-managed or MSSP

Off the shelf solution

DDoS Protection (Network and Application Layers); Web Application; Direct-to-Origin; and DNS attacks

Page 4: Akamai Kona Security Solutions - RSA Conference 2013

©2013 AKAMAI | FASTER FORWARDTM

(Cloud) Datacenters

1

10

100

10000

Origin Traffic

1000

Akamai Traffic

1

10

100

10000

1000

End-User

Akamai Kona Security Solutions Customer Origin with Akamai

Page 5: Akamai Kona Security Solutions - RSA Conference 2013

©2013 AKAMAI | FASTER FORWARDTM

Expansive DDoS and Web Application Defenses Kona Site Defender Components (Included)

• DDoS mitigation • Network & Application layers • Massive scale • Offload to origin.

• Web Application protection (WAF) • Rate Controls • Application Layer controls

• SQLi, XSS, etc. • Custom Rules

• Cloak Customer Origin • Prevent direct-to-Origin attacks

• Adaptive Caching • Content served from Edge during attack

• Site Failover

• Access Control

• NetStorage

• Log Delivery Service

• Security Monitor

• Compliance Management • ISO Security Standard (27002)

Page 6: Akamai Kona Security Solutions - RSA Conference 2013

©2013 AKAMAI | FASTER FORWARDTM

Overview Moving the mouse over a graph line allows you to see the details of the data point selected.

Stats by Dimension There are three windows that allow you to select specific dimensions (event parameters) .

Stats by Geography The heat map can be used to determine the geographic sources of the top attackers. This can be viewed as a graph (shown here) or as a table.

Page 7: Akamai Kona Security Solutions - RSA Conference 2013

©2013 AKAMAI | FASTER FORWARDTM