SlideShare a Scribd company logo
1 of 2
Download to read offline
KONA SECURITY SOLUTIONS: PRODUCT BRIEF




                   Site Defender
To be successful in today’s hyperconnected world, the enterprise needs to leverage
the capabilities of the Web and be ready to innovate without fear. Organizations
face great risk from increasingly frequent and sophisticated attempts to render
Web properties unavailable, steal intellectual property, and compromise personally
identifiable information.
Distributed Denial of Service (DDoS) and Web application attacks – along with attacks targeting
DNS infrastructure – represent some of the most critical threats to enterprises today. These attacks     BUSINESS BENEFITS
are increasingly brazen and targeted at a wide range of organizations. They can cause downtime,
                                                                                                         •	  educe risk of downtime, defacement
                                                                                                            R
drive up bandwidth costs, loss of confidential information and revenue, and severely impact an
                                                                                                           and data theft to protect revenue,
organization’s reputation.                                                                                 customer loyalty and brand equity

At Akamai, our security customers include some of the most well known brands in the world –              •	 mprove business continuity by reducing
                                                                                                            I
many of which are targeted for attack on a regular basis. In fact, the largest known DDoS attack           time-to-respond and by maintaining
(124 Gbps of application layer attack traffic) was successfully mitigated by Akamai.                       good performance in times of attack

                                                                                                         •	  educe costs associated with handling
                                                                                                            R
Akamai Kona Site Defender is our solution for defending against all types of DDoS attacks,
                                                                                                           spikes in attack traffic
as well as attacks against Web applications (SQL Injections, Cross Site Scripts, etc.) and direct-
                                                                                                         •	  educe capital expenditure on security
                                                                                                            R
to-origin attacks – and our optional Akamai eDNS solution is designed to protect against attacks
                                                                                                           hardware and software
on DNS infrastructure. Kona Site Defender is deployed across the Akamai Intelligent Platform™,
which consists of tens of thousands of servers deployed across over 1,000 networks in more
than 70 countries. No one handles more Web traffic than Akamai.                                          OPERATIONAL AND
                                                                                                         TECHNICAL BENEFITS
DDoS Mitigation
Kona Site Defender leverages the Akamai Intelligent Platform™ to thwart DDoS attacks by absorbing        •	  imple integration with existing IT
                                                                                                            S
DDoS traffic targeted at the application layer, deflecting all DDoS traffic targeted at the network        infrastructure

layer such as SYN Floods or UDP Floods, and authenticating valid traffic at the network edge.            •	  aximize uptime and availability
                                                                                                            M
                                                                                                           during DDoS attacks
This built-in protection is “always on”, and only Port 80 (HTTP) or Port 443 (HTTPS) traffic is
                                                                                                         •	 Defend Web application infrastructure
allowed. Bursting fees are capped so users are protected from DDoS traffic running up service
fees. And flexible caching maximizes offload from origin.                                                •	 Protect against direct-to-origin attacks

The Akamai Intelligent Platform™ is architected with worldwide distribution and massive scale            •	 mprove availability of DNS infrastructure
                                                                                                            I
to ensure our clients’ Web sites stay available. Akamai handles 5Tbps of traffic daily on average        •	  utomated, on-demand scaling elimi-
                                                                                                            A
and has handled peak traffic flows of over 8Tbps. And mitigation capabilities are implemented              nates the need for over-provisioning
natively in-path so protection is provided no more than a few network hops from the point
                                                                                                         •	  educe operational costs with
                                                                                                            R
of request – NOT at the customer origin.                                                                   access to best-in-class application
                                                                                                           security expertise
Application Layer Protection
Kona Site Defender incorporates a full featured Web Application Firewall (WAF) based upon
proprietary technology that provides customers with a highly scalable layer of protection against
application layer attacks. Implemented in-line across Akamai’s globally distributed platform of tens
of thousands of servers, Akamai’s WAF helps detect and deflect threats in HTTP and HTTPS traffic,
issuing alerts or blocking attack traffic closer to its source, before it reaches the customer origin.

Application Layer Controls include a collection of pre-defined yet configurable Web application
firewall rules for different types of attack categories. These rules also enable deep packet inspec-
tion of an HTTP/S Request/Response and its payload in order to identify and protect against
attacks such as SQL Injections, Cross-Site Scripting, etc.
Site Defender                                                                      KONA SECURITY SOLUTIONS: PRODUCT BRIEF


Network Layer Controls afford the ability to enforce customer-defined                      Other Features
IP whitelists and blacklists. List updates are propagated across Akamai’s                  Additional capabilities associated with Kona Site Defender include:
global network within minutes, enabling rapid response to attacks. Other                   adaptive caching, in which additional customer identified content is
features include the ability to restrict requests from specific IP addresses               served from the Edge during an attack, site failover, user access control,
to protect customer origin from application layer attacks, and implement                   log delivery service, the inclusion of Akamai NetStorage, and Akamai’s
geo blocking. Up to 10,000 CIDR entries are supported – including named                    compliance management toolset for ISO 27002.
lists such as Tor exit nodes.                                                              Kona Site Defender Service Management provides access to Akamai’s

Rate Controls provides protection against application layer DDoS attacks                   experienced professional services team for regular review of WAF log files

by monitoring and controlling the rate of requests against the Akamai                      and updates to WAF configuration.

servers and the customer origin. Rate categories can be incorporated                       DNS Infrastructure Protection is designed to ensure end users get
as WAF rules enabling the customer to dynamically alert and/or block                       direct to your Web sites. Aka­ ai’s Enhanced DNS is an outsourced DNS
                                                                                                                        m
clients exhibiting excessive request rate behaviors. Statistics are collected              solution that leverages the globally distributed Akamai Platform’s sec­
for three request phases: client request; forward request; and forward                     ondary authoritative name servers. It requires no change to existing DNS
response.                                                                                  administration processes and provides incredibly robust, reliable, scalable,
                                                                                           secure DNS resolution.
Custom Rules enable a user to create policy-based rules that are enforced
after the execution of the application layer controls. Custom rules serve
as “virtual patches” for new Web site vulnerabilities.

Origin Cloaking
Kona Site Defender also includes the ability to cloak (hide) a customer
origin from the public Internet. This adds an additional layer of security
protection without impeding the quick and reliable delivery of content,
regardless of end user location. It is designed to complement your existing
infrastructure and prevent direct-to-origin attacks.

Only a fixed subset of Akamai servers is allowed to communicate with
the customer origin, which acts as a parent for all other Akamai servers.
Mapping of Akamai servers to the customer origin is implemented as an
Access Control List (ACL) in the origin firewall – all other traffic is denied.
                                                                                           Akamai’s Security Monitor provides real time visibility into security events
Advanced Security Monitor                                                                  for alerting, analysis and forensics.
Kona Site Defender provides security professionals with real time visibility
into security events as well as the capability to drill down into attack
alerts to retrieve detailed information on who is attacking, what they are
attacking, and what defense capabilities triggered the attack declaration
and what specifically was seen in the requests that triggered site defenses.
Also of importance, archived log data is available for 90 days to aid in
post-attack forensics review.



The Akamai Difference
Akamai® is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the company’s
solutions is the Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities
of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai
is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com and follow @Akamai on Twitter.




Akamai Technologies, Inc.

U.S. Headquarters                       International Offices
8 Cambridge Center                      Unterfoehring, Germany           Bangalore, India
Cambridge, MA 02142                     Paris, France                    Sydney, Australia               ©2012 Akamai Technologies, Inc. All Rights Reserved. Reproduction in whole
                                                                                                         or in part in any form or medium without express written permission is prohibited.
Tel 617.444.3000                        Milan, Italy                     Beijing, China
                                                                                                         Akamai and the Akamai wave logo are registered trademarks. Other trademarks
Fax 617.444.3001                        London, England                  Tokyo, Japan                    contained herein are the property of their respective owners. Akamai believes
U.S. toll-free 877.4AKAMAI              Madrid, Spain                    Seoul, Korea                    that the information in this publication is accurate as of its publication date;
(877.425.2624)                          Stockholm, Sweden                Singapore                       such information is subject to change without notice.

www.akamai.com

More Related Content

What's hot

What's hot (20)

Packet Capture on AWS
Packet Capture on AWSPacket Capture on AWS
Packet Capture on AWS
 
Hybrid cloud overview and VCF on VxRAIL
Hybrid cloud overview and VCF on VxRAILHybrid cloud overview and VCF on VxRAIL
Hybrid cloud overview and VCF on VxRAIL
 
Proactive Threat Detection and Safeguarding of Data for Enhanced Cyber resili...
Proactive Threat Detection and Safeguarding of Data for Enhanced Cyber resili...Proactive Threat Detection and Safeguarding of Data for Enhanced Cyber resili...
Proactive Threat Detection and Safeguarding of Data for Enhanced Cyber resili...
 
7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
AWS vs. Azure
AWS vs. AzureAWS vs. Azure
AWS vs. Azure
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
AWS Advanced Networking: Transit Gateway
AWS Advanced Networking: Transit GatewayAWS Advanced Networking: Transit Gateway
AWS Advanced Networking: Transit Gateway
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computing
 
Migrating Data and Databases to Azure
Migrating Data and Databases to AzureMigrating Data and Databases to Azure
Migrating Data and Databases to Azure
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM
 
On-premise to Microsoft Azure Cloud Migration.
 On-premise to Microsoft Azure Cloud Migration. On-premise to Microsoft Azure Cloud Migration.
On-premise to Microsoft Azure Cloud Migration.
 
[Azure Governance] Lesson 4 : Azure Policy
[Azure Governance] Lesson 4 : Azure Policy[Azure Governance] Lesson 4 : Azure Policy
[Azure Governance] Lesson 4 : Azure Policy
 
Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCP
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
 
A Deepdive into Azure Networking
A Deepdive into Azure NetworkingA Deepdive into Azure Networking
A Deepdive into Azure Networking
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
AWS Adoption in FSI
AWS Adoption in FSIAWS Adoption in FSI
AWS Adoption in FSI
 
AWS August Webinar Series - Services Overview
AWS August Webinar Series - Services Overview AWS August Webinar Series - Services Overview
AWS August Webinar Series - Services Overview
 

Similar to Kona Site Defender Product Brief - Multi-layered defense to protect websites against the increasing frequency, sophistication, and scale of attacks

The Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital TransformationThe Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital Transformation
Amazon Web Services
 

Similar to Kona Site Defender Product Brief - Multi-layered defense to protect websites against the increasing frequency, sophistication, and scale of attacks (20)

Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
 
Kona Web Application Firewall Product Brief - Application-layer defense to pr...
Kona Web Application Firewall Product Brief - Application-layer defense to pr...Kona Web Application Firewall Product Brief - Application-layer defense to pr...
Kona Web Application Firewall Product Brief - Application-layer defense to pr...
 
Akamai Korea - Tech Day (2015/03/11) DNS
Akamai Korea - Tech Day (2015/03/11) DNSAkamai Korea - Tech Day (2015/03/11) DNS
Akamai Korea - Tech Day (2015/03/11) DNS
 
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
Fast DNS DNS Product Brief - resolution that is fast, reliable and secure
Fast DNS DNS Product Brief - resolution that is fast, reliable and secureFast DNS DNS Product Brief - resolution that is fast, reliable and secure
Fast DNS DNS Product Brief - resolution that is fast, reliable and secure
 
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
 
Building Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSBuilding Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNS
 
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & AttacksJeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
 
Enterprise Private Cloud Computing
Enterprise Private Cloud ComputingEnterprise Private Cloud Computing
Enterprise Private Cloud Computing
 
The Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital TransformationThe Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital Transformation
 
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
 
Opsource managed hosting
Opsource managed hostingOpsource managed hosting
Opsource managed hosting
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
 
Solution Brief
Solution BriefSolution Brief
Solution Brief
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Alta Product Brief - Cloud-based application delivery platform for web applic...
Alta Product Brief - Cloud-based application delivery platform for web applic...Alta Product Brief - Cloud-based application delivery platform for web applic...
Alta Product Brief - Cloud-based application delivery platform for web applic...
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)
 

More from Akamai Technologies

More from Akamai Technologies (20)

Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Replacing recovery with resilience
Replacing recovery with resilienceReplacing recovery with resilience
Replacing recovery with resilience
 
Competitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven DifferentiationCompetitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven Differentiation
 
3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware
 
3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model
 
새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유새로운 원격 접속 모델이 필요한 3가지 이유
새로운 원격 접속 모델이 필요한 3가지 이유
 
更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由更新遠端存取模式的 3 大理由
更新遠端存取模式的 3 大理由
 
应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因应该采用全新远程访问模式的 3 大原因
应该采用全新远程访问模式的 3 大原因
 
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
3 つの理由 今こそ新しいリモート・アク セス・モデルを採用すべきと き
 
3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto3 razões chegou a hora de um novo modelo de acesso remoto
3 razões chegou a hora de um novo modelo de acesso remoto
 
3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto3 motivi per cui è necessario un nuovo modello di accesso remoto
3 motivi per cui è necessario un nuovo modello di accesso remoto
 
3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance3 raisons de changer votre modèle d'accès à distance
3 raisons de changer votre modèle d'accès à distance
 
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
3 motivos por los que ahora es el momento perfecto para adoptar un nuevo mode...
 
3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs3 Gründe für eine neue Art des Remotezugriffs
3 Gründe für eine neue Art des Remotezugriffs
 
Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2Chicago Tech Day Jan 2015: Foundry - HTTP2
Chicago Tech Day Jan 2015: Foundry - HTTP2
 
Chicago Tech Day Jan 2015: RWD
Chicago Tech Day Jan 2015: RWDChicago Tech Day Jan 2015: RWD
Chicago Tech Day Jan 2015: RWD
 
Chicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden FeaturesChicago Tech Day Jan 2015: Hidden Features
Chicago Tech Day Jan 2015: Hidden Features
 
Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015Customer Technology Day Chicago 2015
Customer Technology Day Chicago 2015
 
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEAEdge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
Edge 2014: Maintaining the Balance: Getting the Most of Your CDN with IKEA
 
Edge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBayEdge 2014: Increasing Control with Property Manager with eBay
Edge 2014: Increasing Control with Property Manager with eBay
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Kona Site Defender Product Brief - Multi-layered defense to protect websites against the increasing frequency, sophistication, and scale of attacks

  • 1. KONA SECURITY SOLUTIONS: PRODUCT BRIEF Site Defender To be successful in today’s hyperconnected world, the enterprise needs to leverage the capabilities of the Web and be ready to innovate without fear. Organizations face great risk from increasingly frequent and sophisticated attempts to render Web properties unavailable, steal intellectual property, and compromise personally identifiable information. Distributed Denial of Service (DDoS) and Web application attacks – along with attacks targeting DNS infrastructure – represent some of the most critical threats to enterprises today. These attacks BUSINESS BENEFITS are increasingly brazen and targeted at a wide range of organizations. They can cause downtime, • educe risk of downtime, defacement R drive up bandwidth costs, loss of confidential information and revenue, and severely impact an and data theft to protect revenue, organization’s reputation. customer loyalty and brand equity At Akamai, our security customers include some of the most well known brands in the world – • mprove business continuity by reducing I many of which are targeted for attack on a regular basis. In fact, the largest known DDoS attack time-to-respond and by maintaining (124 Gbps of application layer attack traffic) was successfully mitigated by Akamai. good performance in times of attack • educe costs associated with handling R Akamai Kona Site Defender is our solution for defending against all types of DDoS attacks, spikes in attack traffic as well as attacks against Web applications (SQL Injections, Cross Site Scripts, etc.) and direct- • educe capital expenditure on security R to-origin attacks – and our optional Akamai eDNS solution is designed to protect against attacks hardware and software on DNS infrastructure. Kona Site Defender is deployed across the Akamai Intelligent Platform™, which consists of tens of thousands of servers deployed across over 1,000 networks in more than 70 countries. No one handles more Web traffic than Akamai. OPERATIONAL AND TECHNICAL BENEFITS DDoS Mitigation Kona Site Defender leverages the Akamai Intelligent Platform™ to thwart DDoS attacks by absorbing • imple integration with existing IT S DDoS traffic targeted at the application layer, deflecting all DDoS traffic targeted at the network infrastructure layer such as SYN Floods or UDP Floods, and authenticating valid traffic at the network edge. • aximize uptime and availability M during DDoS attacks This built-in protection is “always on”, and only Port 80 (HTTP) or Port 443 (HTTPS) traffic is • Defend Web application infrastructure allowed. Bursting fees are capped so users are protected from DDoS traffic running up service fees. And flexible caching maximizes offload from origin. • Protect against direct-to-origin attacks The Akamai Intelligent Platform™ is architected with worldwide distribution and massive scale • mprove availability of DNS infrastructure I to ensure our clients’ Web sites stay available. Akamai handles 5Tbps of traffic daily on average • utomated, on-demand scaling elimi- A and has handled peak traffic flows of over 8Tbps. And mitigation capabilities are implemented nates the need for over-provisioning natively in-path so protection is provided no more than a few network hops from the point • educe operational costs with R of request – NOT at the customer origin. access to best-in-class application security expertise Application Layer Protection Kona Site Defender incorporates a full featured Web Application Firewall (WAF) based upon proprietary technology that provides customers with a highly scalable layer of protection against application layer attacks. Implemented in-line across Akamai’s globally distributed platform of tens of thousands of servers, Akamai’s WAF helps detect and deflect threats in HTTP and HTTPS traffic, issuing alerts or blocking attack traffic closer to its source, before it reaches the customer origin. Application Layer Controls include a collection of pre-defined yet configurable Web application firewall rules for different types of attack categories. These rules also enable deep packet inspec- tion of an HTTP/S Request/Response and its payload in order to identify and protect against attacks such as SQL Injections, Cross-Site Scripting, etc.
  • 2. Site Defender KONA SECURITY SOLUTIONS: PRODUCT BRIEF Network Layer Controls afford the ability to enforce customer-defined Other Features IP whitelists and blacklists. List updates are propagated across Akamai’s Additional capabilities associated with Kona Site Defender include: global network within minutes, enabling rapid response to attacks. Other adaptive caching, in which additional customer identified content is features include the ability to restrict requests from specific IP addresses served from the Edge during an attack, site failover, user access control, to protect customer origin from application layer attacks, and implement log delivery service, the inclusion of Akamai NetStorage, and Akamai’s geo blocking. Up to 10,000 CIDR entries are supported – including named compliance management toolset for ISO 27002. lists such as Tor exit nodes. Kona Site Defender Service Management provides access to Akamai’s Rate Controls provides protection against application layer DDoS attacks experienced professional services team for regular review of WAF log files by monitoring and controlling the rate of requests against the Akamai and updates to WAF configuration. servers and the customer origin. Rate categories can be incorporated DNS Infrastructure Protection is designed to ensure end users get as WAF rules enabling the customer to dynamically alert and/or block direct to your Web sites. Aka­ ai’s Enhanced DNS is an outsourced DNS m clients exhibiting excessive request rate behaviors. Statistics are collected solution that leverages the globally distributed Akamai Platform’s sec­ for three request phases: client request; forward request; and forward ondary authoritative name servers. It requires no change to existing DNS response. administration processes and provides incredibly robust, reliable, scalable, secure DNS resolution. Custom Rules enable a user to create policy-based rules that are enforced after the execution of the application layer controls. Custom rules serve as “virtual patches” for new Web site vulnerabilities. Origin Cloaking Kona Site Defender also includes the ability to cloak (hide) a customer origin from the public Internet. This adds an additional layer of security protection without impeding the quick and reliable delivery of content, regardless of end user location. It is designed to complement your existing infrastructure and prevent direct-to-origin attacks. Only a fixed subset of Akamai servers is allowed to communicate with the customer origin, which acts as a parent for all other Akamai servers. Mapping of Akamai servers to the customer origin is implemented as an Access Control List (ACL) in the origin firewall – all other traffic is denied. Akamai’s Security Monitor provides real time visibility into security events Advanced Security Monitor for alerting, analysis and forensics. Kona Site Defender provides security professionals with real time visibility into security events as well as the capability to drill down into attack alerts to retrieve detailed information on who is attacking, what they are attacking, and what defense capabilities triggered the attack declaration and what specifically was seen in the requests that triggered site defenses. Also of importance, archived log data is available for 90 days to aid in post-attack forensics review. The Akamai Difference Akamai® is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the company’s solutions is the Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com and follow @Akamai on Twitter. Akamai Technologies, Inc. U.S. Headquarters International Offices 8 Cambridge Center Unterfoehring, Germany Bangalore, India Cambridge, MA 02142 Paris, France Sydney, Australia ©2012 Akamai Technologies, Inc. All Rights Reserved. Reproduction in whole or in part in any form or medium without express written permission is prohibited. Tel 617.444.3000 Milan, Italy Beijing, China Akamai and the Akamai wave logo are registered trademarks. Other trademarks Fax 617.444.3001 London, England Tokyo, Japan contained herein are the property of their respective owners. Akamai believes U.S. toll-free 877.4AKAMAI Madrid, Spain Seoul, Korea that the information in this publication is accurate as of its publication date; (877.425.2624) Stockholm, Sweden Singapore such information is subject to change without notice. www.akamai.com