CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

Akamai

Akamai

Akamai Technologies

Akamai Info

Booth Number:F05

Akamai is a content delivery network and cloud service provider headquartered in Cambridge, Massachusetts, USA. It is one of the largest distributed edge computing platforms in the world, responsible for 15-30% of the worldwide web traffic to power and protect online life. The most innovative companies worldwide choose Akamai to secure and deliver their digital experiences - helping billions of people live, work, and play every day. With the world's largest and most trusted edge platform, Akamai keeps apps, code, and experiences closer to users - and threats farther away.                                                                                     Learn more about Akamai's security, content delivery, and edge compute products and services at www.akamai.com, blogs.akamai.com, or follow Akamai Technologies on Twitter and LinkedIn..


前往https://ccmsassets.ithome.com.tw/2022/3/18/6ffa80da-ef4a-48a2-894f-c715a8318c29.jpg

Products

Akamai App & API Protector
Akamai App & API Protector

Akamai App & API Protector

designed to protect all network and API assets, it provides comprehensive protection through automation and simplification designed for customers. The simplicity of Apps & API Protector is one of the most advanced security automation solutions on the market today. App & API Protector features a new adaptive security engine that integrates industry-leading core technologies such as web application firewall, bot mitigation, API security, and DDoS protection into a single, easy-to-use solution.

Web Application Firewall
Akamai Enterprise Threat Protector (ETP)
Akamai Enterprise Threat Protector (ETP)

Enterprise Threat Protector built on the global Akamai Intelligent Edge Platform and Akamai's carrier-grade recursive DNS service, Enterprise Threat Protector is a fast-configured and easy-to-deploy cloud-secured web gateway that requires no hardware to install and maintain. Featuring multiple layers of protection, Enterprise Threat Protector leverages real-time Akamai Cloud Security Intelligence and multiple static and dynamic malware detection engines to proactively identify and block targeted threats such as malware, ransomware, phishing, and DNS-based data exfiltration. Akamai's portal enables security teams to centrally create, deploy, and enforce unified security policies and acceptable use policies (AUPs) in minutes for all Internet-connected employees.



Secure Web Gateways
Akamai Enterprise Application Access (EAA)
Akamai Enterprise Application Access (EAA)

Secure, simple, and fast application access. Akamai's edge platform enables you to securely digitally transform. It gives you the scalability, visibility, and simplicity you need to align your business: get employees from M&A or newly acquired companies onboard quickly, conduct manufacturing and production activities in different markets or geographic regions, easily add and mobilise contractors to respond to changing business needs and cost-effectively migrate applications to the cloud without sacrificing security. Akamai's platform enables you to deploy IT staff to critical business initiatives rather than maintaining outdated legacy VPN security architectures.

Zero Trust Network
Akamai MFA
Akamai MFA

Akamai MFA is the next generation solution with phishing authentication factors. The service replaces physical security keys with a smartphone app (Akamai MFA), leveraging FIDO2, the strongest standards-based authentication method available. End-to-end encrypted and sealed challenge/response streams provides unparalled security. This approach makes the authentication process eliminates phishing attemps and maintains confidentiality. Akamai MFA combines this proven security with a familiar and smooth mobile push user experience—without the need for expensive and cumbersome hardware security keys. Deployed on the Akamai Intelligent Edge Platform, Akamai MFA is available through Enterprise Center with global resiliency and performance at scope and scale. It integrates with Akamai's Zero Trust Network Access (ZTNA) and Secure Web Gateway (SWG) products, providing the foundation for migrating to a Zero Trust security model.

Multi-Factor Authentication
Guardicore Centra
Guardicore Centra

Software-based network segmentation ensures security from the inside out. Guardicore Centra's visibility and network segmentation capabilities allow you to quickly prevent and block initial intrusions. Unauthorized lateral movement and other suspicious behaviors also provide alerts to help you detect malware early for immediate remediate and respond.


Solutions

Akamai Edge - Your Business, Protect Your Tray, Deliver Smoothly

Build your business on a global secure platform.

Akamai Edge Security solutions are deployed on global platforms that extend from applications and infrastructure to users. Akamai sits between you and a potential attacker, on the cloud, at the edge of the network, closer to the attacker, and blocks attacks before they can penetrate your applications and infrastructure, without compromising program access speed.

  1. At Scale - Leverage Akamai's unparalleled scale and global reach to block the largest direct attacks and avoid being the attack target of other customer's shortfall.
  2. Global Protection - Provides the support you need when your business deploys applications in your data center, public cloud, or even a multi-cloud environment anywhere in the world
  3. Immediate support - The integrated global security operations center (SOC) is the single point of contact for attack response support, and will also assist you in responding to information security incidents caused by various threats in real time. After an attack, it is not only necessary to refer to high-level dashboards, but also to carefully understand all conditions for post-attack forensics and root cause analysis. Outstanding global service and support backed by more than 1,900 experts, plus 24/7 proactive monitoring and responsive troubleshooting.
  4. Integrated Solutions - Improve mitigation and simplify security measures with solutions designed to work together, all managed through a single window.
  5. Improve attack visibility and manage multiple solutions through Akamai's web portal for complete visibility into attacks and policy controls. Start with high-level dashboards and then drill down to different areas of focus. Integrate with existing Information Security and Event Management (SIEM) tools to enhance security awareness across all security solutions.
  6. Simplified management using our managed security services, there is no need to deploy physical devices or software solutions yourself. Address ever-changing threats with Adaptive Threat Protection. Integrating the application development cycle with our management API allows Akamai solution configurations to automatically apply changes.
  7. Mitigate future risks and build a security infrastructure that will help address future threats. New security features and solutions are deployed seamlessly as they become available, without the application infrastructure having to stop functioning.

White Papers

Akamai Edge Security Solutions
Akamai Edge Security Solutions

Whether you sell products over the Internet, operate data centers around the world or in the cloud, or support employees on the move, you rely on the Internet to keep your business connected. Faced with a myriad of security threats and ever-changing enterprise requirements, it is especially pivotal to protect these connections.

Mobile communications. Cloud. DevOps. Akamai can help you. We understand the Internet and how you can use it to advance your business. We can identify how attackers can find weaknesses in your infrastructure and exploit them to compromise systems and cause damage; we also have robust and resilient platforms that protect open Internet-accessible infrastructure on multiple levels, defense increasing risk. Akamai is ready to mitigate your current security risks as well as new threats that may emerge in the future

With over two decades of security experience, Akamai brings together top security talent, threat intelligence and security technology.

We're committed to making it easier for you to provide the best and safest digital experience for your users, no matter where they are or what device they're using.

  • Protection and Effectiveness - When you run your business online, you can't be effective without protection
  • History of Security Innovation - Since our inception, we have continued to protect our customers against some of the largest DDoS attacks ever, including the largest DDoS attack ever mitigated by Akamai, at a transfer rate of up to 1.3 Tbps. In addition, we built the first cloud-based WAF and the first DDoS protection service
  • Continued investment in security - we are committed to helping you address your growing security needs and changing threat landscape 
  • The largest and most trusted cloud delivery platform - trusted by all top business websites, 80% of top multinational banks and 70 % Trusted by the world's top airlines and other companies.
下載
The right WAF at the right time
The right WAF at the right time

Akamai was named a Leader in the 2020 Gartner Magic Quadrant for Web Application Firewalls for two of Akamai's WAF products: Kona Site Defender and Web ApplicationProtector. A summary description of the features:

Kona Site Defender: Provides multi-layered defense against increasingly sophisticated and large-scale attacks Kona Site Defender provides application security capabilities at the edge (closer to attackers and further from applications). Elastic protection mechanisms help fully protect your application footprint and dramatically reduce administrative burdens in response to changing business needs such as API and cloud migration.

This solution is designed to help you:

  • Reduce downtime and business risk
  • Reduce the risk of data theft
  • Maintain effectiveness during attacks
  • Reduce costs associated with cybersecurity
  • Defend against new and evolving threats
下載
DDoS Defense in the Hybrid Cloud Era
DDoS Defense in the Hybrid Cloud Era

Akamai's DDoS mitigation solutions are designed to block DDoS directly in the cloud, preventing attacks from reaching applications, data centers, and infrastructure.

  • Edge defense

Akamai Edge (CDN) utilizes HTTP and HTTPS protocols to deliver and accelerate website traffic. Each Akamai edge servers all operate as reverse proxies, forwarding legitimate HTTP/S traffic on ports 80 and 443 and discarding all other traffic at the edge of the network. This means that every Akamai customer gets instant mitigation of DDoS attacks at the full network layer, built directly into the customer's website delivery service.

  • DNS defense

The same technique applies to Akamai's authoritative DNS service: Edge DNS. This service instantly interrupts all non-port 53 traffic. A big difference between Edge DNS and other DNS solutions is that Akamai is designed not only for performance, but also for availability and resilience against DDoS attacks, as well as multi-architecture redundancy, including name servers, network connection points, network , or even a split IP Anycast cloud.

  • Cloud traffic purification defense

Prolexic is a battle-proven cloud-based traffic scrubbing service that protects the entire data center and connected Internet infrastructure from DDoS attacks across all ports and protocols. By routing both legitimate and malicious traffic to Prolexic, we can establish both positive and negative security models to proactively and instantly mitigate DDoS attacks with high accuracy. The experts at Akamai's Security Operations Command Center (SOCC) become an extension of the client's incident response team, balancing automated detection and response with human response.

下載
Ransomware attack chain
Ransomware attack chain

Ransomware is not spread by hacking a single computer or device. Cybercriminals use this malware a kind of variant that encrypts everything on the web as much as possible to ensure that the victim company pays the ransom.

To stop ransomware from spreading you need a security solution that can detect threats in lateral traffic between data centers and block lateral movement.

  • Be prepared

By identifying every application and asset running in the IT environment.

  • Prevention

Establish rules to block common ransomware distribution methods.

  • Detection

Receive alerts to keep track of all access attempts to segmented applications and backup data.

  • Remedy

Threat blocking and isolation mechanisms are activated when an attack is detected.

  • Recovery

Use features that are visual and support staged recovery strategies.

下載
Software Network Segmentation
Software Network Segmentation

Did you know? 60% of security professionals say their legacy firewalls does not protect against cyberattacks targeting business-critical and cloud-based applications.

But even with problems, expensive and immobile, and a lack of visibility, the reality is that old firewalls aren't going away anytime soon. They remain important at the network perimeter, controlling on-stream traffic and providing a surface layer of protection for the enterprise. But firewalls cannot manage lateral traffic between the company's internal data centers and the cloud.

This job must be left to the software network segment.

Software-based network segmentation can easily coexist with existing firewalls, and can be adjusted according to the situation. Using software network segmentation, you can change the environment, data center and network according to the actual situation, and set the principle. And workloads and principles can be used anywhere, whether in the cloud, data center, or elsewhere. In addition, no network changes are required and no system downtime is required to apply and adjust security principles.

Flip the focus and introduce software-based network segmentation and Zero Trust architecture to give you the visibility and control you need to detect and block lateral movement, apply fine-tuned and adjustable principles, and block networks such as ransomware Attacks spread across your network.


下載

Videos

Big Idea -Why Akamai

The Internet is becoming more chaotic every second due to growing traffic and cyber threats, Akamai protects life online, enabling people to do what they need to do and what they love with unparalleled capacity reach and visibility into what's happening on the Internet. At the same time, it ensures the safety of customers and enterprises, and makes online life unimpeded.