Building Cyber Resilience at the Speed of Business

27
Building Cyber Resilience at the Speed of Business Sudeep Charles Product Marketing, Cloud Security Solutions Akamai India

Transcript of Building Cyber Resilience at the Speed of Business

Building Cyber Resilience at the Speed of Business

Sudeep CharlesProduct Marketing, Cloud Security SolutionsAkamai India

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

OUR EXPECTATIONS ARE

ENORMOUS

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

The goal must be to make businesses fast, reliable and secure.

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

EVERYTHING DEPENDS ON THE WEB…

BankingGovernmentDefenseEducationAutomotiveRetailBusiness

HealthcareMediaInsuranceManufacturingGamingSocial MediaCommunications

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

…CREATING A PERFECT STORM

BankingGovernmentDefenseEducationAutomotiveRetailBusiness

HealthcareMediaInsuranceManufacturingGamingSocial MediaCommunications

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.Growing over 25% every year

ANNUAL COST OF CYBER ATTACKS$575B

Source: Politico

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

CYBER CRIMEPOLITICALHACKTIVISMGLORY HOUNDS

WHY?STATE-

SPONSORED

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

PHISHING REFLECTION ATTACK

HOW?VULNERABILITIES

©2015 AKAMAI | FASTER FORWARDTM

Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks.

Major Attacks on Akamai Customers

Typical Attack Size10s of Gbps

Attacks are originating from all geographies

and are moving between geographies

during the attack

Large Attack Size100s of Gbps

Number of DDoS Attacks PROTECTED

2010 2011 2012 2013 2014

9911317

2002

2936

4316

0

1000

2000

3000

4000

5000

©2015 AKAMAI | FASTER FORWARDTM

Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks.

Key Attack Trends

©2015 AKAMAI | FASTER FORWARDTM

Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks.

The Indian Threat Landscape

©2015 AKAMAI | FASTER FORWARDTM

Traditional Solutions Are Insufficient

Sufficient Capacity

Packet Inspection

Proactive vs. Reactive

Maintain Performance

Data Center Level Defense

Data Center Devices

Carrier Filtering Cloud Based Solutions

©2015 AKAMAI | FASTER FORWARDTM

Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks.

The Cloud Based Solutions

(Cloud) Data Centers

End User

1

10

100

10000

Origin Traffic

1000

Edge Traffic

1

10

100

10000

1000

✔✔

✔✔✔

COVERED

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

Client Reputation

Analyze user activity across the platform

Score bad clients based on past behavior

Policy enforcement on the edge based on risk score and your business needs

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

Analyze bot activity across the platform

Real-time identification of bots by type

Policy enforcement on the edge based on bot type and your business needs

Over 1,200 types

We see over 10 billion requests from over 60 million bots daily

Bot Management

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

Making the internet fast, reliable and secure

for theuser

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

THE GOAL

Protecting the user from undesirable content

GAMBLING

PHISHING

MALWARE

PORNOGRAPHY

DRUGS & ALCOHOL

WEAPONS & VIOLENCE

CYBER BULLYING

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

Our Expectations Are

ENORMOUS…SPEED • QUALITY • RELIABILITY • SCALE • SECURITY • AGILITY • AFFORDABILITY

…But Achievable

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

STATEOFTHEINTERNET.COM

Learn more and download the latest security report

©2015 AKAMAI | FASTER FORWARDTM

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

Thank You