CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

Akamai

Akamai

Akamai Technologies

Akamai Info

Booth Number:F05

Akamai is a content delivery network and cloud service provider headquartered in Cambridge, Massachusetts, USA. It is one of the largest distributed edge computing platforms in the world, responsible for 15-30% of the worldwide web traffic to power and protect online life. The most innovative companies worldwide choose Akamai to secure and deliver their digital experiences - helping billions of people live, work, and play every day. With the world's largest and most trusted edge platform, Akamai keeps apps, code, and experiences closer to users - and threats farther away.                                                                                     Learn more about Akamai's security, content delivery, and edge compute products and services at www.akamai.com, blogs.akamai.com, or follow Akamai Technologies on Twitter and LinkedIn..


前往https://ccmsassets.ithome.com.tw/2022/3/18/6ffa80da-ef4a-48a2-894f-c715a8318c29.jpg
Product Type
  • Web Application Firewall
  • Secure Web Gateways
  • Zero Trust Network
  • Multi-Factor Authentication

Products

Akamai App & API Protector
Akamai App & API Protector

Akamai App & API Protector

designed to protect all network and API assets, it provides comprehensive protection through automation and sim...

Web Application Firewall
Akamai Enterprise Threat Protector (ETP)
Akamai Enterprise Threat Protector (ETP)

Enterprise Threat Protector built on the global Akamai Intelligent Edge Platform and Akamai's carrier-grade recursive DNS service, Enterprise Threat P...

Secure Web Gateways
Akamai Enterprise Application Access (EAA)
Akamai Enterprise Application Access (EAA)

Secure, simple, and fast application access. Akamai's edge platform enables you to securely digitally transform. It gives you the scalability, visibil...

Zero Trust Network
Akamai MFA
Akamai MFA

Akamai MFA is the next generation solution with phishing authentication factors. The service replaces physical security keys with a smartphone app (Ak...

Multi-Factor Authentication
Guardicore Centra
Guardicore Centra

Software-based network segmentation ensures security from the inside out. Guardicore Centra's visibility and network segmentation capabilities allow y...

Solutions

Akamai Edge - Your Business, Protect Your Tray, Deliver Smoothly

Build your business on a global secure platform.

Akamai Edge Security solutions are deployed on global platforms that extend from applications and infrastructure to users. Akamai sits between you and a potential attacker, on the cloud, at the edge of the network, closer to the attacker, and blocks attacks before they can penetrate your applications and infrastructure, without compromising program access speed.

  1. At Scale - Leverage Akamai's unparalleled scale and global reach to block the largest direct attacks and avoid being the attack target of other customer's shortfall.
  2. Global Protection - Provides the support you need when your business deploys applications in your data center, public cloud, or even a multi-cloud environment anywhere in the world
  3. Immediate support - The integrated global security operations center (SOC) is the single point of contact for attack response support, and will also assist you in responding to information security incidents caused by various threats in real time. After an attack, it is not only necessary to refer to high-level dashboards, but also to carefully understand all conditions for post-attack forensics and root cause analysis. Outstanding global service and support backed by more than 1,900 experts, plus 24/7 proactive monitoring and responsive troubleshooting.
  4. Integrated Solutions - Improve mitigation and simplify security measures with solutions designed to work together, all managed through a single window.
  5. Improve attack visibility and manage multiple solutions through Akamai's web portal for complete visibility into attacks and policy controls. Start with high-level dashboards and then drill down to different areas of focus. Integrate with existing Information Security and Event Management (SIEM) tools to enhance security awareness across all security solutions.
  6. Simplified management using our managed security services, there is no need to deploy physical devices or software solutions yourself. Address ever-changing threats with Adaptive Threat Protection. Integrating the application development cycle with our management API allows Akamai solution configurations to automatically apply changes.
  7. Mitigate future risks and build a security infrastructure that will help address future threats. New security features and solutions are deployed seamlessly as they become available, without the application infrastructure having to stop functioning.

White Papers

Akamai Edge Security Solutions
Akamai Edge Security Solutions

Whether you sell products over the Internet, operate data centers around the world or in the cloud, or support employees on the move, you rely on the Internet to keep your business connected. Faced with a myriad of security threats and ever-changing enterprise requirements, it is especially pivotal to protect these connections.

Mobile communications. Cloud. DevOps. Akamai can help you. We understand the Internet and how you can use it to advance your business. We can identify how attackers can find weaknesses in your infrastructure and exploit them to compromise systems and cause damage; we also have robust and resilient platforms that protect open Internet-accessible infrastructure on multiple levels, defense increasing risk. Akamai is ready to mitigate your current security risks as well as new threats that may emerge in the future

With over two decades of security experience, Akamai brings together top security talent, threat intelligence and security technology.

We're committed to making it easier for you to provide the best and safest digital experience for your users, no matter where they are or what device they're using.

  • Protection and Effectiveness - When you run your business online, you can't be effective without protection
  • History of Security Innovation - Since our inception, we have continued to protect our customers against some of the largest DDoS attacks ever, including the largest DDoS attack ever mitigated by Akamai, at a transfer rate of up to 1.3 Tbps. In addition, we built the first cloud-based WAF and the first DDoS protection service
  • Continued investment in security - we are committed to helping you address your growing security needs and changing threat landscape 
  • The largest and most trusted cloud delivery platform - trusted by all top business websites, 80% of top multinational banks and 70 % Trusted by the world's top airlines and other companies.
下載
The right WAF at the right time
The right WAF at the right time

Akamai was named a Leader in the 2020 Gartner Magic Quadrant for Web Application Firewalls for two of Akamai's WAF products: Kona Site Defender and Web ApplicationProtector. A summary description of the features:

Kona Site Defender: Provides multi-layered defense against increasingly sophisticated and large-scale attacks Kona Site Defender provides application security capabilities at the edge (closer to attackers and further from applications). Elastic protection mechanisms help fully protect your application footprint and dramatically reduce administrative burdens in response to changing business needs such as API and cloud migration.

This solution is designed to help you:

  • Reduce downtime and business risk
  • Reduce the risk of data theft
  • Maintain effectiveness during attacks
  • Reduce costs associated with cybersecurity
  • Defend against new and evolving threats
下載
DDoS Defense in the Hybrid Cloud Era
DDoS Defense in the Hybrid Cloud Era

Akamai's DDoS mitigation solutions are designed to block DDoS directly in the cloud, preventing attacks from reaching applications, data centers, and infrastructure.

  • Edge defense

Akamai Edge (CDN) utilizes HTTP and HTTPS protocols to deliver and accelerate website traffic. Each Akamai edge servers all operate as reverse proxies, forwarding legitimate HTTP/S traffic on ports 80 and 443 and discarding all other traffic at the edge of the network. This means that every Akamai customer gets instant mitigation of DDoS attacks at the full network layer, built directly into the customer's website delivery service.

  • DNS defense

The same technique applies to Akamai's authoritative DNS service: Edge DNS. This service instantly interrupts all non-port 53 traffic. A big difference between Edge DNS and other DNS solutions is that Akamai is designed not only for performance, but also for availability and resilience against DDoS attacks, as well as multi-architecture redundancy, including name servers, network connection points, network , or even a split IP Anycast cloud.

  • Cloud traffic purification defense

Prolexic is a battle-proven cloud-based traffic scrubbing service that protects the entire data center and connected Internet infrastructure from DDoS attacks across all ports and protocols. By routing both legitimate and malicious traffic to Prolexic, we can establish both positive and negative security models to proactively and instantly mitigate DDoS attacks with high accuracy. The experts at Akamai's Security Operations Command Center (SOCC) become an extension of the client's incident response team, balancing automated detection and response with human response.

下載
Ransomware attack chain
Ransomware attack chain

Ransomware is not spread by hacking a single computer or device. Cybercriminals use this malware a kind of variant that encrypts everything on the web as much as possible to ensure that the victim company pays the ransom.

To stop ransomware from spreading you need a security solution that can detect threats in lateral traffic between data centers and block lateral movement.

  • Be prepared

By identifying every application and asset running in the IT environment.

  • Prevention

Establish rules to block common ransomware distribution methods.

  • Detection

Receive alerts to keep track of all access attempts to segmented applications and backup data.

  • Remedy

Threat blocking and isolation mechanisms are activated when an attack is detected.

  • Recovery

Use features that are visual and support staged recovery strategies.

下載
Software Network Segmentation
Software Network Segmentation

Did you know? 60% of security professionals say their legacy firewalls does not protect against cyberattacks targeting business-critical and cloud-based applications.

But even with problems, expensive and immobile, and a lack of visibility, the reality is that old firewalls aren't going away anytime soon. They remain important at the network perimeter, controlling on-stream traffic and providing a surface layer of protection for the enterprise. But firewalls cannot manage lateral traffic between the company's internal data centers and the cloud.

This job must be left to the software network segment.

Software-based network segmentation can easily coexist with existing firewalls, and can be adjusted according to the situation. Using software network segmentation, you can change the environment, data center and network according to the actual situation, and set the principle. And workloads and principles can be used anywhere, whether in the cloud, data center, or elsewhere. In addition, no network changes are required and no system downtime is required to apply and adjust security principles.

Flip the focus and introduce software-based network segmentation and Zero Trust architecture to give you the visibility and control you need to detect and block lateral movement, apply fine-tuned and adjustable principles, and block networks such as ransomware Attacks spread across your network.


下載

Videos

Big Idea -Why Akamai

The Internet is becoming more chaotic every second due to growing traffic and cyber threats, Akamai protects life online, enabling people to do what they need to do and what they love with unparalleled capacity reach and visibility into what's happening on the Internet. At the same time, it ensures the safety of customers and enterprises, and makes online life unimpeded.