SlideShare ist ein Scribd-Unternehmen logo
1 von 64
Downloaden Sie, um offline zu lesen
Great Expectations
Dr. Tom Leighton, Chief Executive Officer and Co-Founder
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

The Internet of Things

©2013 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

The Internet of Everything

©2013 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

The Hyperconnected World

©2013 AKAMAI | FASTER FORWARDTM
EVERYONE
AND EVERYTHING IS
GETTING CONNECTED
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

©2013 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

©2013 AKAMAI | FASTER FORWARDTM
ENORMOUS
EXPECTATIONS

Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

©2013 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

©2013 AKAMAI | FASTER FORWARDTM
The Web Fast, affordable
Instant Web The ultimate
must be IP access in the
performance
in video
secure
for any device, quality over
workplace and
anywhere
IP at scaleGrow revenue opportunities with fast, personalized
branch office
web experiences and manage complexity from peak
demand, mobile devices and data collection.

©2013 AKAMAI | FASTER FORWARDTM
GRAND CHALLENGE FOR PERFORMANCE
Instant Web performance for any device, anywhere

Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

©2013 AKAMAI | FASTER FORWARDTM
The Performance Challenge

Time to Download

$

User
Expectations

$$$
Heavier
Content

3rd Party
Content

Complex
Experiences

Chatty
Protocols

Mobile
Congestion
©2013 AKAMAI | FASTER FORWARDTM
What Mobile Users Want
Ability to Purchase
or Place an order
Product
Information
Store Directions or
Operating Hours
Sites Loading in
5 Seconds or Less

50%

61%

74%

81%

©2013 AKAMAI | FASTER FORWARDTM
Keynote Commerce Index: Desktop vs. Mobile
TOP 30 DESKTOP
COMMERCE SITES*

TOP 30 MOBILE
COMMERCE SITES*

Seconds
to load

Seconds
to load

WE HAVEN'T SEEN 8 SECONDS SINCE 2001!
* As of September 29, 2013, Keynote

©2013 AKAMAI | FASTER FORWARDTM
Speed Matters: Conversion Rate vs. Load Time
Population
Conversion Rate (%)

Conversion Rate (%)

0-1

1-2

2-3

3-4

4-5

5-6

6-7

7-8

8-9

9-10

10-11

11+

Page Load Time (Sec)

Page Performance & Site Conversion – Feb 2012
©2013 AKAMAI | FASTER FORWARDTM
Featured Akamai Solutions: Aqua Ion & Terra Alta

DSA & WAA

2012

2013

• Advanced Caching

• Enhanced Mobile Protocol

• Akamai Communication Protocols

• Dynamic Page Caching
Avoid data theft

• Akamai Routing
• Pre-Fetching
• Persistent Connections

• Front-End Optimization (FEO)

– by extending the
and downtimeWebP
– data-center and
• Akamai Instantperimeter outside the 3rd Party Decoupling
security
• IPv6 Adaptation
• EdgeStart
protect from increasing frequency, scale and
• SHUTR
• Real
sophistication of web attacks. User Monitoring (RUM)
• Origin Health Reporting

• Mobile Detection & Redirect

• Instant Config

• Device Characterization

• Adaptive Image Compression

• Cloud Balancer

©2013 AKAMAI | FASTER FORWARDTM
Featured Akamai Solutions: Aqua Ion & Terra Alta

DSA & WAA

2012

2013

• Advanced Caching

• Enhanced Mobile Protocol

• Akamai Communication Protocols

• Dynamic Page Caching
Avoid data theft

• Akamai Routing
• Pre-Fetching
• Persistent Connections

• Front-End Optimization (FEO)

– by extending the
and downtimeWebP
– data-center and
• Akamai Instantperimeter outside the 3rd Party Decoupling
security
• IPv6 Adaptation
• EdgeStart
protect from increasing frequency, scale and
• SHUTR
• Real
sophistication of web attacks. User Monitoring (RUM)
• Origin Health Reporting

• Mobile Detection & Redirect

• Instant Config

• Device Characterization

• Adaptive Image Compression

• Cloud Balancer

©2013 AKAMAI | FASTER FORWARDTM
RUM Data: Across the Akamai Intelligent Platform™
8

Seconds to onLoad

7

With Akamai DSA

6

With Aqua Ion
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.

5

50%

4
3

Faster With Aqua Ion

2
1
0
9/16

9/17

9/18

9/19

9/20

9/21

9/22

9/23

9/24

14.5 million data points plotted

©2013 AKAMAI | FASTER FORWARDTM
RUM Data for Cellular Users
9

With Akamai DSA

7

Seconds to onLoad

8

With Aqua Ion

6

Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.

69%

5
4
3

Faster With Aqua Ion

2
1
0
9/16

9/17

9/18

9/19

9/20

9/21

9/22

9/23

9/24

©2013 AKAMAI | FASTER FORWARDTM
RUM Data: Performance Improvement In-Country
7

With Akamai DSA
Seconds to onLoad

6

With Aqua Ion
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.

5

74%

4

3

Faster With Aqua Ion
2

1

Measurements taken from users
in Japan from origin in Tokyo

0

5/21

5/23

5/24

5/25

5/26

5/27

©2013 AKAMAI | FASTER FORWARDTM
Histogram from Real Users
With Akamai DSA

20%

With Aqua Ion
15%

% of Users

65k data points over 7 days

Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.

10%

5%

0%
0-1

1-2

2-3

3-4

4-5

5-6

6-7

7-8

8-9 9-10 10-11 11-12 12-13 13-14 14-15

Page Load Time (in Seconds)
©2013 AKAMAI | FASTER FORWARDTM
Histogram from Real Users
With Akamai DSA

20%

With Aqua Ion
15%

% of Users

65k data points over 7 days

Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.

10%

33%

5%

16%

0%
0-1

1-2

2-3

3-4

4-5

5-6

6-7

7-8

~1/2 as many
users over
8 seconds

8-9 9-10 10-11 11-12 12-13 13-14 14-15

Page Load Time (in Seconds)
©2013 AKAMAI | FASTER FORWARDTM
Histogram from Real Users
20%

With Akamai DSA
With Aqua Ion

% of Users

15%

65k data points over 7 days

Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.

49%
10%

~2x users
under 4 sec.

5%

26%
0%
0-1

1-2

2-3

3-4

4-5

5-6

6-7

7-8

8-9 9-10 10-11 11-12 12-13 13-14 14-15

Page Load Time (in Seconds)
©2013 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
Assaf Kremer
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Product Manager,

Aqua Web Solutions

©2013 AKAMAI | FASTER FORWARDTM
Learn More
Who: Mike Afergan, Akamai
Aqua Web & Terra Enterprise
When: Thursday, 11:20AM – 12:00PM
Solutions: Transforming
Where: Woodrow Wilson
Your Business with
Amazing User-Experiences data theft and downtime by extending the
Avoid
on Any Device Anywhere
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.

Commerce Keynote:
The Evolution of Web
Performance Measurement
and Optimization

Who: Steve Lerner, eBay
When: Thursday, 2:10 – 3:00PM
Where: Baltimore 1 – 2

©2013 AKAMAI | FASTER FORWARDTM
GRAND CHALLENGE FOR MEDIA
The ultimate in video quality over IP anytime, anywhere

Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

©2013 AKAMAI | FASTER FORWARDTM
Quality Requires Bits
4K-UHD
HEVC/H.265
16,000-30,000
Kbps

50,000

COMPRESSED BIT RATE (Kbps)

8K-UHD
XEVC+?
50,000+ Kbps

40,000

30,000

20,000

QVGA
MPEG1
550
Kbps

VGA/SDTV
MPEG2-4
1,800 Kbps

Avoid data theft and downtime by extending the
HD-1080p
security perimeter outside the data-center and
AVC/H.264
7,500 Kbps
HD-720pprotect from increasing frequency, scale and
AVC/H.264
sophistication of web attacks.
3,500 Kbps

IP TODAY

10,000

0

2001

48%
CAGR

2004

25%
CAGR

2007

21%
CAGR

2011

75%
CAGR

2013

Future
©2013 AKAMAI | FASTER FORWARDTM
Future Demand

2.5B Primetime Viewers
x 10 Mbps
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.

~25,000 Tbps
©2013 AKAMAI | FASTER FORWARDTM
The Scalability Challenge

Cloud Data Centers

Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.

©2013 AKAMAI | FASTER FORWARDTM
The Scalability Challenge

100 Major Networks
X 5 Tbps

Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.

500 Tbps
©2013 AKAMAI | FASTER FORWARDTM
The Scalability Challenge

2%
=

100 Major Networks
500 Tbps
X 5 Tbps
of what
25,000 Tbps
500 we need!
Tbps
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.

©2013 AKAMAI | FASTER FORWARDTM
Akamai’s Strategy Today:
Over 137,000 Servers Inside 1,100 Networks

Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.

©2013 AKAMAI | FASTER FORWARDTM
Akamai’s Next-Gen Platform:
Multicast, Pre-Position Content and Client-Assisted Delivery
Akamai Software Moves into the Home

Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.

©2013 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
Kris Alexander
demand, mobile devices and data collection.

Chief Strategist,
Gaming and Devices

©2013 AKAMAI | FASTER FORWARDTM
Learn More

Learn
More
Connected

Home and 4K Demos
Avoid data theft and downtime by extending the

HAPPENING ALL WEEK security perimeter outside the data-center and
IN THE PARTNER PAVILION
protect from increasing frequency, scale and
sophistication of web attacks.

©2013 AKAMAI | FASTER FORWARDTM
Learn More
Who: Bill Wheaton, Akamai
Sola Media Solutions:
When: Thursday, 10:30 – 11:10AM
Making Quality Simple – for
Where: Annapolis 1 – 4
YOU! The Endless Pursuit of
Online Media Quality Avoid data theft and downtime by extending the

security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.

Media Keynote:
Strategies for Successful
Media Delivery in High-Growth
Emerging Markets

Who: Bernardo Gonzalez, Televisa
When: Thursday, 2:10 – 3:00PM
Where: Baltimore 3 – 4

©2013 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

©2013 AKAMAI | FASTER FORWARDTM
GRAND CHALLENGE FOR SECURITY
The Web must be secure

Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

©2013 AKAMAI | FASTER FORWARDTM
NO ONE
IS SAFE

Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

©2013 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

©2013 AKAMAI | FASTER FORWARDTM
Attacks on Akamai Customers
Typical Attack Size

Large Attack Size

100–200 Gbps
Attacks are originating from
all geographies and are
moving between geographies
during the attack

Number of Attacks

3–10 Gbps

768

800

600

510

400

220
200

0

14
2009

2010

2011

2012

©2013 AKAMAI | FASTER FORWARDTM
Attacks are Varied and Sophisticated
Predictable Resource
Location 2%
Cross-Site Forgery 2%
Stolen Credentials 2%
Brute Force 3%

• SQL Injection is the most
common attack type followed
by DoS attacks
• Attack tools such as LOIC,
HOIC and SlowLoris evolve
rapidly and are easily available

Clickjacking 1%

Banking Trojan 3%

Unreported

37%
Denial
of Service

23%

Top WHID
Attacks in
2011
SQL Injection

27%
Source: Trustwave, Web Hacking Incident DB – 2012 report
©2013 AKAMAI | FASTER FORWARDTM
Why?
Traditional Hackers: Glory Hounds

Political Hacktivism

Profit

State Sponsored

©2013 AKAMAI | FASTER FORWARDTM
Security is no longer “just an IT issue”

74%

31%

$8MM

Of companies
experienced one or
more cyber attacks
in the past year

Of these
attacks resulted
in service
disruption

Is what each
breach costs on
average, and some
can cost up to $1B

©2013 AKAMAI | FASTER FORWARDTM
Traditional Solutions Are Insufficient
Datacenter
Devices

Carrier
Filtering

Cloud
Washing

Sufficient Capacity
Packet Inspection
Proactive vs. Reactive
Maintain Performance

©2013 AKAMAI | FASTER FORWARDTM
Akamai Has a Solution – Kona Site Defender
(Cloud)
Datacenters

Origin
Traffic

Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
End User
sophistication of web attacks.

Akamai
Traffic

10000

10000

1000

1000

100

100

10

10

1

1

COVERED

©2013 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
John Summers
web experiences and manage complexity from peak
Vice President,
demand, mobile devices and data collection.

Security Business

©2013 AKAMAI | FASTER FORWARDTM
Learn More
Kona Security Solutions Demo:
See the attack demo presented
today in more detail

Who: Security Center of Excellence Team
When: All Week Long
Where: Kona Kiosk

Avoid data theft and downtime by extending the
security perimeter outside the data-center and
Who: Ronni Zehavi, Akamai
Web Security Solutions: protect from increasing frequency, scale and
When: Thursday, 11:20AM – 12:00PM
How Kona and Cloud Security
sophistication of Where: Annapolis 1 – 4
web attacks.
Intelligence Will Help You
Weather Cyber Storms

©2013 AKAMAI | FASTER FORWARDTM
Learn More

Learn
More

Security Keynote:
A Conversation with Bruce
Schneier

Security Panel Session:
Operation Ababil,
Anniversary
Panel – What We Have
Learned

Who: Bruce Schneier
When: Thursday, 2:10 – 3:00PM
Where: Annapolis 1 – 4

Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
Who: Andy Ellis, Akamai
When: Thursday, 4:20 – 5:00PM
Where: Annapolis 1 – 4

©2013 AKAMAI | FASTER FORWARDTM
GRAND CHALLENGE FOR ENTERPRISE
Fast, affordable IP access in the workplace and branch office

Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

©2013 AKAMAI | FASTER FORWARDTM
IN-BRANCH
CONNECTIVITY IS
SLOW & EXPENSIVE

Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

©2013 AKAMAI | FASTER FORWARDTM
In-Branch Networks Are Not Enabled for Speed
Remote Branch

16 hops
In-Branch
Wi-Fi

5 hops
Residential
Wi-Fi

WAN
(MPLS/VPN)

Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale Trombone
“The and
sophistication of web attacks. Effect” for MPLS

VS.

& VPN Branches
Enterprise
Data Center
Internet

SaaS Provider

Source: Akamai Research, Gartner

©2013 AKAMAI | FASTER FORWARDTM
Akamai is Moving into the Branch
Akamai optimizes bandwidth & speeds up
applications on
the corporate WAN

Remote Branch

Akamai offloads the
WAN for non-critical applications
Akamai optimizes bandwidth & speeds
up applications
in the cloud

AKAMAI
FUNCTIONALITY:
De-Deduplication
Local Caching
Prepositioning of Content
And everything else the Akamai
Intelligent Platform™ does!

WAN
(MPLS/VPN)

Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale Trombone
“The and
sophistication of web attacks. Effect” for MPLS

& VPN Branches
Enterprise
Data Center
SaaS Provider

Internet
©2013 AKAMAI | FASTER FORWARDTM
WAN Bandwidth Savings Over 1 Hour

% of Bandwidth Reduced

100%

80%

60%

Average
Bandwidth
Avoid data theft and downtime by extending the
Savings 62%
security perimeter outside the data-center and
Caching
protect from increasing frequency, scale and Savings
Up To 96%
sophistication of web attacks.

40%

Data Taken
From Actual
Customer
Branch in
Europe

20%

0%
14:20 14:25 14:30 14:35 14:40 14:45 14:50 14:55 15:00 15:05 15:10 15:15 15:20

©2013 AKAMAI | FASTER FORWARDTM
Andy Champagne

Grow revenue opportunities with fast, personalized
Chief Technology
web experiences and manage complexity from peak
Officer, Emerging
demand, mobile devices and data collection.

Products

©2013 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

©2013 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
Mark Lohmeyer
web experiences and manage complexity from peak
VP, Product
demand, mobile devices and data collection.

Management,
Enterprise Networking,
Cisco

©2013 AKAMAI | FASTER FORWARDTM
Cisco Enterprise Networking
Group

10MM
Routers
Deployed
Worldwide

Routing
Grow revenue opportunities with fast, personalized
Switching
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Wireless
85%
Network Services

Of Branches

©2013 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

SCALE

Technology
©2013 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

Best of Breed Web
Acceleration & Internet
Traffic Engineering

10MM Routers
Covering 85%
of Branches

©2013 AKAMAI | FASTER FORWARDTM
137,000 Servers in
87 Countries, Within
Over 1,150 Networks

Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

Leading WAN Optimization,
VPN, Firewall and
Web Security

©2013 AKAMAI | FASTER FORWARDTM
ISR-AX

Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.

©2013 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

akamai.com/cisco
cisco.com/go/iwan

Request More Info:
kborillo@akamai.com
©2013 AKAMAI | FASTER FORWARDTM
Learn More

Emerging Solutions: Akamai in the Branch –
Avoid data theft
Where Brick & Mortar and downtime Cloud
Meets the by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
Who: Willie Tejada, Akamai
sophistication – 11:10AM
When: Thursday, 10:30 of web attacks.

Where: Woodrow Wilson

©2013 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.

©2013 AKAMAI | FASTER FORWARDTM

Weitere ähnliche Inhalte

Was ist angesagt?

Akamai case master
Akamai case masterAkamai case master
Akamai case masterSko Den
 
Akamai Technologies - Company Overview
Akamai Technologies - Company OverviewAkamai Technologies - Company Overview
Akamai Technologies - Company OverviewAkamai Technologies
 
Akamai corporate presentation english
Akamai corporate presentation englishAkamai corporate presentation english
Akamai corporate presentation englishJonny Nässlander
 
Akamai -- Analysis and Recommendation
Akamai -- Analysis and RecommendationAkamai -- Analysis and Recommendation
Akamai -- Analysis and RecommendationRoss Andrew Simons
 
Responsive Web Demo with Akamai
Responsive Web Demo with AkamaiResponsive Web Demo with Akamai
Responsive Web Demo with AkamaiFran Albaladejo
 
Akamai strategic analysis
Akamai strategic analysisAkamai strategic analysis
Akamai strategic analysisAman Mehra
 
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the InternetVOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the InternetAkamai Technologies
 
Data is the soil khan smith create tech 2012
Data is the soil khan smith create tech 2012Data is the soil khan smith create tech 2012
Data is the soil khan smith create tech 2012Khan Smith
 
Media Content Delivery Product Brief - Globally distributed content delivery ...
Media Content Delivery Product Brief - Globally distributed content delivery ...Media Content Delivery Product Brief - Globally distributed content delivery ...
Media Content Delivery Product Brief - Globally distributed content delivery ...Akamai Technologies
 
CSS Corp at Silicon India
CSS Corp at Silicon IndiaCSS Corp at Silicon India
CSS Corp at Silicon IndiaMovate
 
Generational shiftsRedefining Customer Experience And The Way To Insure
Generational shiftsRedefining Customer Experience And The Way To InsureGenerational shiftsRedefining Customer Experience And The Way To Insure
Generational shiftsRedefining Customer Experience And The Way To InsureAmazon Web Services
 
How LTE is Enabling Non-Stop Connectivity for SD-WAN Deployments
How LTE is Enabling Non-Stop Connectivity for SD-WAN DeploymentsHow LTE is Enabling Non-Stop Connectivity for SD-WAN Deployments
How LTE is Enabling Non-Stop Connectivity for SD-WAN DeploymentsEnterprise Management Associates
 
AWS e SAP - Il futuro delle Enterprise Applications
AWS e SAP - Il futuro delle Enterprise ApplicationsAWS e SAP - Il futuro delle Enterprise Applications
AWS e SAP - Il futuro delle Enterprise ApplicationsAmazon Web Services
 
Improving mobile performance
Improving mobile performanceImproving mobile performance
Improving mobile performanceBhagirath Gaonkar
 
The Quantification of South Africa SME Cloud Market
 The Quantification of South Africa SME Cloud Market  The Quantification of South Africa SME Cloud Market
The Quantification of South Africa SME Cloud Market BSP Media Group
 
Building the framework for business transformation session sponsored by int...
Building the framework for business transformation   session sponsored by int...Building the framework for business transformation   session sponsored by int...
Building the framework for business transformation session sponsored by int...Amazon Web Services
 
Applications of Internet of Things (IoT), Big Data and Cloud Services in 4G-b...
Applications of Internet of Things (IoT), Big Data and Cloud Services in 4G-b...Applications of Internet of Things (IoT), Big Data and Cloud Services in 4G-b...
Applications of Internet of Things (IoT), Big Data and Cloud Services in 4G-b...Ali Saghaeian
 
Accelerated Transformation through Training
Accelerated Transformation through TrainingAccelerated Transformation through Training
Accelerated Transformation through TrainingAmazon Web Services
 

Was ist angesagt? (20)

Akamai case master
Akamai case masterAkamai case master
Akamai case master
 
Akamai Technologies - Company Overview
Akamai Technologies - Company OverviewAkamai Technologies - Company Overview
Akamai Technologies - Company Overview
 
Akamai corporate presentation english
Akamai corporate presentation englishAkamai corporate presentation english
Akamai corporate presentation english
 
Akamai -- Analysis and Recommendation
Akamai -- Analysis and RecommendationAkamai -- Analysis and Recommendation
Akamai -- Analysis and Recommendation
 
Responsive Web Demo with Akamai
Responsive Web Demo with AkamaiResponsive Web Demo with Akamai
Responsive Web Demo with Akamai
 
Akamai strategic analysis
Akamai strategic analysisAkamai strategic analysis
Akamai strategic analysis
 
DESAYUNO DE TRABAJO AKAMAI
DESAYUNO DE TRABAJO AKAMAIDESAYUNO DE TRABAJO AKAMAI
DESAYUNO DE TRABAJO AKAMAI
 
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the InternetVOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the Internet
 
Data is the soil khan smith create tech 2012
Data is the soil khan smith create tech 2012Data is the soil khan smith create tech 2012
Data is the soil khan smith create tech 2012
 
Media Content Delivery Product Brief - Globally distributed content delivery ...
Media Content Delivery Product Brief - Globally distributed content delivery ...Media Content Delivery Product Brief - Globally distributed content delivery ...
Media Content Delivery Product Brief - Globally distributed content delivery ...
 
CSS Corp at Silicon India
CSS Corp at Silicon IndiaCSS Corp at Silicon India
CSS Corp at Silicon India
 
Generational shiftsRedefining Customer Experience And The Way To Insure
Generational shiftsRedefining Customer Experience And The Way To InsureGenerational shiftsRedefining Customer Experience And The Way To Insure
Generational shiftsRedefining Customer Experience And The Way To Insure
 
How LTE is Enabling Non-Stop Connectivity for SD-WAN Deployments
How LTE is Enabling Non-Stop Connectivity for SD-WAN DeploymentsHow LTE is Enabling Non-Stop Connectivity for SD-WAN Deployments
How LTE is Enabling Non-Stop Connectivity for SD-WAN Deployments
 
AWS e SAP - Il futuro delle Enterprise Applications
AWS e SAP - Il futuro delle Enterprise ApplicationsAWS e SAP - Il futuro delle Enterprise Applications
AWS e SAP - Il futuro delle Enterprise Applications
 
Improving mobile performance
Improving mobile performanceImproving mobile performance
Improving mobile performance
 
The Quantification of South Africa SME Cloud Market
 The Quantification of South Africa SME Cloud Market  The Quantification of South Africa SME Cloud Market
The Quantification of South Africa SME Cloud Market
 
Building the framework for business transformation session sponsored by int...
Building the framework for business transformation   session sponsored by int...Building the framework for business transformation   session sponsored by int...
Building the framework for business transformation session sponsored by int...
 
Applications of Internet of Things (IoT), Big Data and Cloud Services in 4G-b...
Applications of Internet of Things (IoT), Big Data and Cloud Services in 4G-b...Applications of Internet of Things (IoT), Big Data and Cloud Services in 4G-b...
Applications of Internet of Things (IoT), Big Data and Cloud Services in 4G-b...
 
Customer pres 3 technical overviews_at&t mobility
Customer pres 3 technical overviews_at&t  mobilityCustomer pres 3 technical overviews_at&t  mobility
Customer pres 3 technical overviews_at&t mobility
 
Accelerated Transformation through Training
Accelerated Transformation through TrainingAccelerated Transformation through Training
Accelerated Transformation through Training
 

Ähnlich wie Great Expectations - Dr. Tom Leighton, Akamai

게임 서비스를 위한 클라우드 네트워크 활용
게임 서비스를 위한 클라우드 네트워크 활용게임 서비스를 위한 클라우드 네트워크 활용
게임 서비스를 위한 클라우드 네트워크 활용Seung Heun Noh
 
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)Colin Bendell
 
Holiday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For PeakHoliday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For PeakG3 Communications
 
Closing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Closing the Loop on Web Application Vulnerabilities - John Dilley, AkamaiClosing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Closing the Loop on Web Application Vulnerabilities - John Dilley, AkamaiAkamai Technologies
 
Future of CDN - Next 10 Years - Ahmet Ozalp, Akamai Technologies - DigiWorld ...
Future of CDN - Next 10 Years - Ahmet Ozalp, Akamai Technologies - DigiWorld ...Future of CDN - Next 10 Years - Ahmet Ozalp, Akamai Technologies - DigiWorld ...
Future of CDN - Next 10 Years - Ahmet Ozalp, Akamai Technologies - DigiWorld ...IDATE DigiWorld
 
DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...
DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...
DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...IDATE DigiWorld
 
Networks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To DrinkNetworks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To DrinkReadWrite
 
Rise of The Hyper Connected Shopper
Rise of The Hyper Connected ShopperRise of The Hyper Connected Shopper
Rise of The Hyper Connected ShoppereTailing India
 
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiAtmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiPROIDEA
 
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...PROIDEA
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected worldmagda3695
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected worldmagda3695
 
Alta Product Brief - Cloud-based application delivery platform for web applic...
Alta Product Brief - Cloud-based application delivery platform for web applic...Alta Product Brief - Cloud-based application delivery platform for web applic...
Alta Product Brief - Cloud-based application delivery platform for web applic...Akamai Technologies
 
IoT Deep Dive - Be an IoT Developer for an Hour
IoT Deep Dive - Be an IoT Developer for an HourIoT Deep Dive - Be an IoT Developer for an Hour
IoT Deep Dive - Be an IoT Developer for an HourTaisuke Yamada
 
eTail Keynote from Akamai CEO Tom Leighton
eTail Keynote from Akamai CEO Tom LeightoneTail Keynote from Akamai CEO Tom Leighton
eTail Keynote from Akamai CEO Tom LeightonAkamai Technologies
 
Best Practices: Tuning Performance, Offload, and Operational Efficiency with ...
Best Practices: Tuning Performance, Offload, and Operational Efficiency with ...Best Practices: Tuning Performance, Offload, and Operational Efficiency with ...
Best Practices: Tuning Performance, Offload, and Operational Efficiency with ...Akamai Developers & Admins
 
Cloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to SophisticatedCloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to SophisticatedAkamai Developers & Admins
 
Hans Nipshagen (Akamai) | TU - Hack & Attacks
Hans Nipshagen (Akamai) | TU - Hack & AttacksHans Nipshagen (Akamai) | TU - Hack & Attacks
Hans Nipshagen (Akamai) | TU - Hack & AttacksMedia Perspectives
 
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & AttacksJeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & AttacksMedia Perspectives
 
Building Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessBuilding Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessRahul Neel Mani
 

Ähnlich wie Great Expectations - Dr. Tom Leighton, Akamai (20)

게임 서비스를 위한 클라우드 네트워크 활용
게임 서비스를 위한 클라우드 네트워크 활용게임 서비스를 위한 클라우드 네트워크 활용
게임 서비스를 위한 클라우드 네트워크 활용
 
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
 
Holiday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For PeakHoliday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For Peak
 
Closing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Closing the Loop on Web Application Vulnerabilities - John Dilley, AkamaiClosing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Closing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
 
Future of CDN - Next 10 Years - Ahmet Ozalp, Akamai Technologies - DigiWorld ...
Future of CDN - Next 10 Years - Ahmet Ozalp, Akamai Technologies - DigiWorld ...Future of CDN - Next 10 Years - Ahmet Ozalp, Akamai Technologies - DigiWorld ...
Future of CDN - Next 10 Years - Ahmet Ozalp, Akamai Technologies - DigiWorld ...
 
DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...
DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...
DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...
 
Networks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To DrinkNetworks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To Drink
 
Rise of The Hyper Connected Shopper
Rise of The Hyper Connected ShopperRise of The Hyper Connected Shopper
Rise of The Hyper Connected Shopper
 
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiAtmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
 
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected world
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected world
 
Alta Product Brief - Cloud-based application delivery platform for web applic...
Alta Product Brief - Cloud-based application delivery platform for web applic...Alta Product Brief - Cloud-based application delivery platform for web applic...
Alta Product Brief - Cloud-based application delivery platform for web applic...
 
IoT Deep Dive - Be an IoT Developer for an Hour
IoT Deep Dive - Be an IoT Developer for an HourIoT Deep Dive - Be an IoT Developer for an Hour
IoT Deep Dive - Be an IoT Developer for an Hour
 
eTail Keynote from Akamai CEO Tom Leighton
eTail Keynote from Akamai CEO Tom LeightoneTail Keynote from Akamai CEO Tom Leighton
eTail Keynote from Akamai CEO Tom Leighton
 
Best Practices: Tuning Performance, Offload, and Operational Efficiency with ...
Best Practices: Tuning Performance, Offload, and Operational Efficiency with ...Best Practices: Tuning Performance, Offload, and Operational Efficiency with ...
Best Practices: Tuning Performance, Offload, and Operational Efficiency with ...
 
Cloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to SophisticatedCloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to Sophisticated
 
Hans Nipshagen (Akamai) | TU - Hack & Attacks
Hans Nipshagen (Akamai) | TU - Hack & AttacksHans Nipshagen (Akamai) | TU - Hack & Attacks
Hans Nipshagen (Akamai) | TU - Hack & Attacks
 
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & AttacksJeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
 
Building Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessBuilding Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of Business
 

Mehr von Akamai Technologies

Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Technologies
 
Replacing recovery with resilience
Replacing recovery with resilienceReplacing recovery with resilience
Replacing recovery with resilienceAkamai Technologies
 
Competitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven DifferentiationCompetitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven DifferentiationAkamai Technologies
 
3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against MalwareAkamai Technologies
 
3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access ModelAkamai Technologies
 
새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유Akamai Technologies
 
更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由Akamai Technologies
 
应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因Akamai Technologies
 
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと きAkamai Technologies
 
3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remotoAkamai Technologies
 
3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remotoAkamai Technologies
 
3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distanceAkamai Technologies
 
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...Akamai Technologies
 
3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des RemotezugriffsAkamai Technologies
 
Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2Akamai Technologies
 
Chicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden FeaturesChicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden FeaturesAkamai Technologies
 
Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015Akamai Technologies
 
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEAEdge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEAAkamai Technologies
 
Edge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBayEdge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBayAkamai Technologies
 

Mehr von Akamai Technologies (20)

Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Replacing recovery with resilience
Replacing recovery with resilienceReplacing recovery with resilience
Replacing recovery with resilience
 
Competitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven DifferentiationCompetitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven Differentiation
 
3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware
 
3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model
 
새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유
 
更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由
 
应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因
 
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
 
3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto
 
3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto
 
3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance
 
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
 
3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs
 
Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2
 
Chicago Tech Day Jan 2015: RWD
Chicago Tech Day Jan 2015: RWDChicago Tech Day Jan 2015: RWD
Chicago Tech Day Jan 2015: RWD
 
Chicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden FeaturesChicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden Features
 
Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015
 
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEAEdge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
 
Edge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBayEdge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBay
 

Kürzlich hochgeladen

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Kürzlich hochgeladen (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Great Expectations - Dr. Tom Leighton, Akamai

  • 1. Great Expectations Dr. Tom Leighton, Chief Executive Officer and Co-Founder
  • 2. Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. The Internet of Things ©2013 AKAMAI | FASTER FORWARDTM
  • 3. Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. The Internet of Everything ©2013 AKAMAI | FASTER FORWARDTM
  • 4. Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. The Hyperconnected World ©2013 AKAMAI | FASTER FORWARDTM
  • 5. EVERYONE AND EVERYTHING IS GETTING CONNECTED Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. ©2013 AKAMAI | FASTER FORWARDTM
  • 6. Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. ©2013 AKAMAI | FASTER FORWARDTM
  • 7. ENORMOUS EXPECTATIONS Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. ©2013 AKAMAI | FASTER FORWARDTM
  • 8. Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. ©2013 AKAMAI | FASTER FORWARDTM
  • 9. The Web Fast, affordable Instant Web The ultimate must be IP access in the performance in video secure for any device, quality over workplace and anywhere IP at scaleGrow revenue opportunities with fast, personalized branch office web experiences and manage complexity from peak demand, mobile devices and data collection. ©2013 AKAMAI | FASTER FORWARDTM
  • 10. GRAND CHALLENGE FOR PERFORMANCE Instant Web performance for any device, anywhere Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. ©2013 AKAMAI | FASTER FORWARDTM
  • 11. The Performance Challenge Time to Download $ User Expectations $$$ Heavier Content 3rd Party Content Complex Experiences Chatty Protocols Mobile Congestion ©2013 AKAMAI | FASTER FORWARDTM
  • 12. What Mobile Users Want Ability to Purchase or Place an order Product Information Store Directions or Operating Hours Sites Loading in 5 Seconds or Less 50% 61% 74% 81% ©2013 AKAMAI | FASTER FORWARDTM
  • 13. Keynote Commerce Index: Desktop vs. Mobile TOP 30 DESKTOP COMMERCE SITES* TOP 30 MOBILE COMMERCE SITES* Seconds to load Seconds to load WE HAVEN'T SEEN 8 SECONDS SINCE 2001! * As of September 29, 2013, Keynote ©2013 AKAMAI | FASTER FORWARDTM
  • 14. Speed Matters: Conversion Rate vs. Load Time Population Conversion Rate (%) Conversion Rate (%) 0-1 1-2 2-3 3-4 4-5 5-6 6-7 7-8 8-9 9-10 10-11 11+ Page Load Time (Sec) Page Performance & Site Conversion – Feb 2012 ©2013 AKAMAI | FASTER FORWARDTM
  • 15. Featured Akamai Solutions: Aqua Ion & Terra Alta DSA & WAA 2012 2013 • Advanced Caching • Enhanced Mobile Protocol • Akamai Communication Protocols • Dynamic Page Caching Avoid data theft • Akamai Routing • Pre-Fetching • Persistent Connections • Front-End Optimization (FEO) – by extending the and downtimeWebP – data-center and • Akamai Instantperimeter outside the 3rd Party Decoupling security • IPv6 Adaptation • EdgeStart protect from increasing frequency, scale and • SHUTR • Real sophistication of web attacks. User Monitoring (RUM) • Origin Health Reporting • Mobile Detection & Redirect • Instant Config • Device Characterization • Adaptive Image Compression • Cloud Balancer ©2013 AKAMAI | FASTER FORWARDTM
  • 16. Featured Akamai Solutions: Aqua Ion & Terra Alta DSA & WAA 2012 2013 • Advanced Caching • Enhanced Mobile Protocol • Akamai Communication Protocols • Dynamic Page Caching Avoid data theft • Akamai Routing • Pre-Fetching • Persistent Connections • Front-End Optimization (FEO) – by extending the and downtimeWebP – data-center and • Akamai Instantperimeter outside the 3rd Party Decoupling security • IPv6 Adaptation • EdgeStart protect from increasing frequency, scale and • SHUTR • Real sophistication of web attacks. User Monitoring (RUM) • Origin Health Reporting • Mobile Detection & Redirect • Instant Config • Device Characterization • Adaptive Image Compression • Cloud Balancer ©2013 AKAMAI | FASTER FORWARDTM
  • 17. RUM Data: Across the Akamai Intelligent Platform™ 8 Seconds to onLoad 7 With Akamai DSA 6 With Aqua Ion Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. 5 50% 4 3 Faster With Aqua Ion 2 1 0 9/16 9/17 9/18 9/19 9/20 9/21 9/22 9/23 9/24 14.5 million data points plotted ©2013 AKAMAI | FASTER FORWARDTM
  • 18. RUM Data for Cellular Users 9 With Akamai DSA 7 Seconds to onLoad 8 With Aqua Ion 6 Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. 69% 5 4 3 Faster With Aqua Ion 2 1 0 9/16 9/17 9/18 9/19 9/20 9/21 9/22 9/23 9/24 ©2013 AKAMAI | FASTER FORWARDTM
  • 19. RUM Data: Performance Improvement In-Country 7 With Akamai DSA Seconds to onLoad 6 With Aqua Ion Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. 5 74% 4 3 Faster With Aqua Ion 2 1 Measurements taken from users in Japan from origin in Tokyo 0 5/21 5/23 5/24 5/25 5/26 5/27 ©2013 AKAMAI | FASTER FORWARDTM
  • 20. Histogram from Real Users With Akamai DSA 20% With Aqua Ion 15% % of Users 65k data points over 7 days Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. 10% 5% 0% 0-1 1-2 2-3 3-4 4-5 5-6 6-7 7-8 8-9 9-10 10-11 11-12 12-13 13-14 14-15 Page Load Time (in Seconds) ©2013 AKAMAI | FASTER FORWARDTM
  • 21. Histogram from Real Users With Akamai DSA 20% With Aqua Ion 15% % of Users 65k data points over 7 days Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. 10% 33% 5% 16% 0% 0-1 1-2 2-3 3-4 4-5 5-6 6-7 7-8 ~1/2 as many users over 8 seconds 8-9 9-10 10-11 11-12 12-13 13-14 14-15 Page Load Time (in Seconds) ©2013 AKAMAI | FASTER FORWARDTM
  • 22. Histogram from Real Users 20% With Akamai DSA With Aqua Ion % of Users 15% 65k data points over 7 days Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. 49% 10% ~2x users under 4 sec. 5% 26% 0% 0-1 1-2 2-3 3-4 4-5 5-6 6-7 7-8 8-9 9-10 10-11 11-12 12-13 13-14 14-15 Page Load Time (in Seconds) ©2013 AKAMAI | FASTER FORWARDTM
  • 23. Grow revenue opportunities with fast, personalized Assaf Kremer web experiences and manage complexity from peak demand, mobile devices and data collection. Product Manager, Aqua Web Solutions ©2013 AKAMAI | FASTER FORWARDTM
  • 24. Learn More Who: Mike Afergan, Akamai Aqua Web & Terra Enterprise When: Thursday, 11:20AM – 12:00PM Solutions: Transforming Where: Woodrow Wilson Your Business with Amazing User-Experiences data theft and downtime by extending the Avoid on Any Device Anywhere security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Commerce Keynote: The Evolution of Web Performance Measurement and Optimization Who: Steve Lerner, eBay When: Thursday, 2:10 – 3:00PM Where: Baltimore 1 – 2 ©2013 AKAMAI | FASTER FORWARDTM
  • 25. GRAND CHALLENGE FOR MEDIA The ultimate in video quality over IP anytime, anywhere Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. ©2013 AKAMAI | FASTER FORWARDTM
  • 26. Quality Requires Bits 4K-UHD HEVC/H.265 16,000-30,000 Kbps 50,000 COMPRESSED BIT RATE (Kbps) 8K-UHD XEVC+? 50,000+ Kbps 40,000 30,000 20,000 QVGA MPEG1 550 Kbps VGA/SDTV MPEG2-4 1,800 Kbps Avoid data theft and downtime by extending the HD-1080p security perimeter outside the data-center and AVC/H.264 7,500 Kbps HD-720pprotect from increasing frequency, scale and AVC/H.264 sophistication of web attacks. 3,500 Kbps IP TODAY 10,000 0 2001 48% CAGR 2004 25% CAGR 2007 21% CAGR 2011 75% CAGR 2013 Future ©2013 AKAMAI | FASTER FORWARDTM
  • 27. Future Demand 2.5B Primetime Viewers x 10 Mbps Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. ~25,000 Tbps ©2013 AKAMAI | FASTER FORWARDTM
  • 28. The Scalability Challenge Cloud Data Centers Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. ©2013 AKAMAI | FASTER FORWARDTM
  • 29. The Scalability Challenge 100 Major Networks X 5 Tbps Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. 500 Tbps ©2013 AKAMAI | FASTER FORWARDTM
  • 30. The Scalability Challenge 2% = 100 Major Networks 500 Tbps X 5 Tbps of what 25,000 Tbps 500 we need! Tbps Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. ©2013 AKAMAI | FASTER FORWARDTM
  • 31. Akamai’s Strategy Today: Over 137,000 Servers Inside 1,100 Networks Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. ©2013 AKAMAI | FASTER FORWARDTM
  • 32. Akamai’s Next-Gen Platform: Multicast, Pre-Position Content and Client-Assisted Delivery Akamai Software Moves into the Home Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. ©2013 AKAMAI | FASTER FORWARDTM
  • 33. Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak Kris Alexander demand, mobile devices and data collection. Chief Strategist, Gaming and Devices ©2013 AKAMAI | FASTER FORWARDTM
  • 34. Learn More Learn More Connected Home and 4K Demos Avoid data theft and downtime by extending the HAPPENING ALL WEEK security perimeter outside the data-center and IN THE PARTNER PAVILION protect from increasing frequency, scale and sophistication of web attacks. ©2013 AKAMAI | FASTER FORWARDTM
  • 35. Learn More Who: Bill Wheaton, Akamai Sola Media Solutions: When: Thursday, 10:30 – 11:10AM Making Quality Simple – for Where: Annapolis 1 – 4 YOU! The Endless Pursuit of Online Media Quality Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Media Keynote: Strategies for Successful Media Delivery in High-Growth Emerging Markets Who: Bernardo Gonzalez, Televisa When: Thursday, 2:10 – 3:00PM Where: Baltimore 3 – 4 ©2013 AKAMAI | FASTER FORWARDTM
  • 36. Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. ©2013 AKAMAI | FASTER FORWARDTM
  • 37. GRAND CHALLENGE FOR SECURITY The Web must be secure Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. ©2013 AKAMAI | FASTER FORWARDTM
  • 38. NO ONE IS SAFE Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. ©2013 AKAMAI | FASTER FORWARDTM
  • 39. Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. ©2013 AKAMAI | FASTER FORWARDTM
  • 40. Attacks on Akamai Customers Typical Attack Size Large Attack Size 100–200 Gbps Attacks are originating from all geographies and are moving between geographies during the attack Number of Attacks 3–10 Gbps 768 800 600 510 400 220 200 0 14 2009 2010 2011 2012 ©2013 AKAMAI | FASTER FORWARDTM
  • 41. Attacks are Varied and Sophisticated Predictable Resource Location 2% Cross-Site Forgery 2% Stolen Credentials 2% Brute Force 3% • SQL Injection is the most common attack type followed by DoS attacks • Attack tools such as LOIC, HOIC and SlowLoris evolve rapidly and are easily available Clickjacking 1% Banking Trojan 3% Unreported 37% Denial of Service 23% Top WHID Attacks in 2011 SQL Injection 27% Source: Trustwave, Web Hacking Incident DB – 2012 report ©2013 AKAMAI | FASTER FORWARDTM
  • 42. Why? Traditional Hackers: Glory Hounds Political Hacktivism Profit State Sponsored ©2013 AKAMAI | FASTER FORWARDTM
  • 43. Security is no longer “just an IT issue” 74% 31% $8MM Of companies experienced one or more cyber attacks in the past year Of these attacks resulted in service disruption Is what each breach costs on average, and some can cost up to $1B ©2013 AKAMAI | FASTER FORWARDTM
  • 44. Traditional Solutions Are Insufficient Datacenter Devices Carrier Filtering Cloud Washing Sufficient Capacity Packet Inspection Proactive vs. Reactive Maintain Performance ©2013 AKAMAI | FASTER FORWARDTM
  • 45. Akamai Has a Solution – Kona Site Defender (Cloud) Datacenters Origin Traffic Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and End User sophistication of web attacks. Akamai Traffic 10000 10000 1000 1000 100 100 10 10 1 1 COVERED ©2013 AKAMAI | FASTER FORWARDTM
  • 46. Grow revenue opportunities with fast, personalized John Summers web experiences and manage complexity from peak Vice President, demand, mobile devices and data collection. Security Business ©2013 AKAMAI | FASTER FORWARDTM
  • 47. Learn More Kona Security Solutions Demo: See the attack demo presented today in more detail Who: Security Center of Excellence Team When: All Week Long Where: Kona Kiosk Avoid data theft and downtime by extending the security perimeter outside the data-center and Who: Ronni Zehavi, Akamai Web Security Solutions: protect from increasing frequency, scale and When: Thursday, 11:20AM – 12:00PM How Kona and Cloud Security sophistication of Where: Annapolis 1 – 4 web attacks. Intelligence Will Help You Weather Cyber Storms ©2013 AKAMAI | FASTER FORWARDTM
  • 48. Learn More Learn More Security Keynote: A Conversation with Bruce Schneier Security Panel Session: Operation Ababil, Anniversary Panel – What We Have Learned Who: Bruce Schneier When: Thursday, 2:10 – 3:00PM Where: Annapolis 1 – 4 Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Who: Andy Ellis, Akamai When: Thursday, 4:20 – 5:00PM Where: Annapolis 1 – 4 ©2013 AKAMAI | FASTER FORWARDTM
  • 49. GRAND CHALLENGE FOR ENTERPRISE Fast, affordable IP access in the workplace and branch office Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. ©2013 AKAMAI | FASTER FORWARDTM
  • 50. IN-BRANCH CONNECTIVITY IS SLOW & EXPENSIVE Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. ©2013 AKAMAI | FASTER FORWARDTM
  • 51. In-Branch Networks Are Not Enabled for Speed Remote Branch 16 hops In-Branch Wi-Fi 5 hops Residential Wi-Fi WAN (MPLS/VPN) Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale Trombone “The and sophistication of web attacks. Effect” for MPLS VS. & VPN Branches Enterprise Data Center Internet SaaS Provider Source: Akamai Research, Gartner ©2013 AKAMAI | FASTER FORWARDTM
  • 52. Akamai is Moving into the Branch Akamai optimizes bandwidth & speeds up applications on the corporate WAN Remote Branch Akamai offloads the WAN for non-critical applications Akamai optimizes bandwidth & speeds up applications in the cloud AKAMAI FUNCTIONALITY: De-Deduplication Local Caching Prepositioning of Content And everything else the Akamai Intelligent Platform™ does! WAN (MPLS/VPN) Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale Trombone “The and sophistication of web attacks. Effect” for MPLS & VPN Branches Enterprise Data Center SaaS Provider Internet ©2013 AKAMAI | FASTER FORWARDTM
  • 53. WAN Bandwidth Savings Over 1 Hour % of Bandwidth Reduced 100% 80% 60% Average Bandwidth Avoid data theft and downtime by extending the Savings 62% security perimeter outside the data-center and Caching protect from increasing frequency, scale and Savings Up To 96% sophistication of web attacks. 40% Data Taken From Actual Customer Branch in Europe 20% 0% 14:20 14:25 14:30 14:35 14:40 14:45 14:50 14:55 15:00 15:05 15:10 15:15 15:20 ©2013 AKAMAI | FASTER FORWARDTM
  • 54. Andy Champagne Grow revenue opportunities with fast, personalized Chief Technology web experiences and manage complexity from peak Officer, Emerging demand, mobile devices and data collection. Products ©2013 AKAMAI | FASTER FORWARDTM
  • 55. Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. ©2013 AKAMAI | FASTER FORWARDTM
  • 56. Grow revenue opportunities with fast, personalized Mark Lohmeyer web experiences and manage complexity from peak VP, Product demand, mobile devices and data collection. Management, Enterprise Networking, Cisco ©2013 AKAMAI | FASTER FORWARDTM
  • 57. Cisco Enterprise Networking Group 10MM Routers Deployed Worldwide Routing Grow revenue opportunities with fast, personalized Switching web experiences and manage complexity from peak demand, mobile devices and data collection. Wireless 85% Network Services Of Branches ©2013 AKAMAI | FASTER FORWARDTM
  • 58. Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. SCALE Technology ©2013 AKAMAI | FASTER FORWARDTM
  • 59. Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Best of Breed Web Acceleration & Internet Traffic Engineering 10MM Routers Covering 85% of Branches ©2013 AKAMAI | FASTER FORWARDTM
  • 60. 137,000 Servers in 87 Countries, Within Over 1,150 Networks Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Leading WAN Optimization, VPN, Firewall and Web Security ©2013 AKAMAI | FASTER FORWARDTM
  • 61. ISR-AX Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. ©2013 AKAMAI | FASTER FORWARDTM
  • 62. Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. akamai.com/cisco cisco.com/go/iwan Request More Info: kborillo@akamai.com ©2013 AKAMAI | FASTER FORWARDTM
  • 63. Learn More Emerging Solutions: Akamai in the Branch – Avoid data theft Where Brick & Mortar and downtime Cloud Meets the by extending the security perimeter outside the data-center and protect from increasing frequency, scale and Who: Willie Tejada, Akamai sophistication – 11:10AM When: Thursday, 10:30 of web attacks. Where: Woodrow Wilson ©2013 AKAMAI | FASTER FORWARDTM
  • 64. Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. ©2013 AKAMAI | FASTER FORWARDTM