100 likes | 496 Views
Kona Security Solutions - Overview. RSA ® Conference 2013. The Akamai Intelligent Platform Pushing Optimization and Security to the Edge. Massive Akamai Global Overlay Network. Akamai Edge Server closest to or AT Origin. Users . Edge Server close to End User. Customer Origin.
E N D
Kona Security Solutions - Overview • RSA® Conference 2013
The Akamai Intelligent PlatformPushing Optimization and Security to the Edge Massive Akamai Global Overlay Network Akamai Edge Server closest to or AT Origin Users Edge Server close to End User Customer Origin Web Server Akamai’s Intelligent Platform optimizes, conditions and controls the Internet Security embedded into Akamai Edge Servers at the edge
Hybrid Defense – the “new normal” • DDoS Protection (Network and Application Layers); Web Application; Direct-to-Origin; and DNS attacks Web Application Firewall Web Server (Origin) Application or Database Server Network Firewall Customer Database Traditional Data Center Security Akamai Web Site Security Limited scalability Self-managed or MSSP Off the shelf solution Massively scalable solution Coordinated response Highly differentiated Proven
Akamai Kona Security SolutionsCustomer Origin with Akamai (Cloud) Datacenters End-User Akamai Traffic Origin Traffic 10000 10000 1000 1000 100 100 10 10 1 1
Expansive DDoS and Web Application DefensesKona Site Defender Components (Included) • DDoS mitigation • Network & Application layers • Massive scale • Offload to origin. • Web Application protection (WAF) • Rate Controls • Application Layer controls • SQLi, XSS, etc. • Custom Rules • Cloak Customer Origin • Prevent direct-to-Origin attacks • Adaptive Caching • Content served from Edge during attack • Site Failover • Access Control • NetStorage • Log Delivery Service • Security Monitor • Compliance Management • ISO Security Standard (27002)
Moving the mouse over a graph line allows you to see the details of the data point selected. Overview Stats by Geography The heat map can be used to determine the geographic sources of the top attackers. This can be viewed as a graph (shown here) or as a table. Stats by Dimension There are three windows that allow you to select specific dimensions (event parameters) .