1 / 7

Kona Security Solutions - Overview

Kona Security Solutions - Overview. RSA ® Conference 2013. The Akamai Intelligent Platform Pushing Optimization and Security to the Edge. Massive Akamai Global Overlay Network. Akamai Edge Server closest to or AT Origin. Users . Edge Server close to End User. Customer Origin.

ekram
Télécharger la présentation

Kona Security Solutions - Overview

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Kona Security Solutions - Overview • RSA® Conference 2013

  2. The Akamai Intelligent PlatformPushing Optimization and Security to the Edge Massive Akamai Global Overlay Network Akamai Edge Server closest to or AT Origin Users Edge Server close to End User Customer Origin Web Server Akamai’s Intelligent Platform optimizes, conditions and controls the Internet Security embedded into Akamai Edge Servers at the edge

  3. Hybrid Defense – the “new normal” • DDoS Protection (Network and Application Layers); Web Application; Direct-to-Origin; and DNS attacks Web Application Firewall Web Server (Origin) Application or Database Server Network Firewall Customer Database Traditional Data Center Security Akamai Web Site Security Limited scalability Self-managed or MSSP Off the shelf solution Massively scalable solution Coordinated response Highly differentiated Proven

  4. Akamai Kona Security SolutionsCustomer Origin with Akamai (Cloud) Datacenters End-User Akamai Traffic Origin Traffic 10000 10000 1000 1000 100 100 10 10 1 1

  5. Expansive DDoS and Web Application DefensesKona Site Defender Components (Included) • DDoS mitigation • Network & Application layers • Massive scale • Offload to origin. • Web Application protection (WAF) • Rate Controls • Application Layer controls • SQLi, XSS, etc. • Custom Rules • Cloak Customer Origin • Prevent direct-to-Origin attacks • Adaptive Caching • Content served from Edge during attack • Site Failover • Access Control • NetStorage • Log Delivery Service • Security Monitor • Compliance Management • ISO Security Standard (27002)

  6. Moving the mouse over a graph line allows you to see the details of the data point selected. Overview Stats by Geography The heat map can be used to determine the geographic sources of the top attackers. This can be viewed as a graph (shown here) or as a table. Stats by Dimension There are three windows that allow you to select specific dimensions (event parameters) .

More Related