Building Cyber Resilience at the Speed of Business
-
Upload
rahul-neel-mani -
Category
Technology
-
view
250 -
download
0
Transcript of Building Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of Business
Sudeep CharlesProduct Marketing, Cloud Security SolutionsAkamai India
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.
OUR EXPECTATIONS ARE
ENORMOUS
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.
The goal must be to make businesses fast, reliable and secure.
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.
EVERYTHING DEPENDS ON THE WEB…
BankingGovernmentDefenseEducationAutomotiveRetailBusiness
HealthcareMediaInsuranceManufacturingGamingSocial MediaCommunications
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.
…CREATING A PERFECT STORM
BankingGovernmentDefenseEducationAutomotiveRetailBusiness
HealthcareMediaInsuranceManufacturingGamingSocial MediaCommunications
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.Growing over 25% every year
ANNUAL COST OF CYBER ATTACKS$575B
Source: Politico
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.
CYBER CRIMEPOLITICALHACKTIVISMGLORY HOUNDS
WHY?STATE-
SPONSORED
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.
PHISHING REFLECTION ATTACK
HOW?VULNERABILITIES
©2015 AKAMAI | FASTER FORWARDTM
Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks.
Major Attacks on Akamai Customers
Typical Attack Size10s of Gbps
Attacks are originating from all geographies
and are moving between geographies
during the attack
Large Attack Size100s of Gbps
Number of DDoS Attacks PROTECTED
2010 2011 2012 2013 2014
9911317
2002
2936
4316
0
1000
2000
3000
4000
5000
©2015 AKAMAI | FASTER FORWARDTM
Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks.
Key Attack Trends
©2015 AKAMAI | FASTER FORWARDTM
Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks.
The Indian Threat Landscape
©2015 AKAMAI | FASTER FORWARDTM
Traditional Solutions Are Insufficient
Sufficient Capacity
Packet Inspection
Proactive vs. Reactive
Maintain Performance
Data Center Level Defense
Data Center Devices
Carrier Filtering Cloud Based Solutions
©2015 AKAMAI | FASTER FORWARDTM
Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks.
The Cloud Based Solutions
(Cloud) Data Centers
End User
1
10
100
10000
Origin Traffic
1000
Edge Traffic
1
10
100
10000
1000
✔✔
✔
✔
✔✔✔
COVERED
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.
Client Reputation
Analyze user activity across the platform
Score bad clients based on past behavior
Policy enforcement on the edge based on risk score and your business needs
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.
Analyze bot activity across the platform
Real-time identification of bots by type
Policy enforcement on the edge based on bot type and your business needs
Over 1,200 types
We see over 10 billion requests from over 60 million bots daily
Bot Management
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.
Making the internet fast, reliable and secure
for theuser
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.
THE GOAL
Protecting the user from undesirable content
GAMBLING
PHISHING
MALWARE
PORNOGRAPHY
DRUGS & ALCOHOL
WEAPONS & VIOLENCE
CYBER BULLYING
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.
Our Expectations Are
ENORMOUS…SPEED • QUALITY • RELIABILITY • SCALE • SECURITY • AGILITY • AFFORDABILITY
…But Achievable
©2015 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.
STATEOFTHEINTERNET.COM
Learn more and download the latest security report