SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Downloaden Sie, um offline zu lesen
©2017 AKAMAI | FASTER FORWARDTM
The Akamai Platform and

How To Counter Attacks
Henrik Eriksson

Service Line Manager 

Akamai
©2017 AKAMAI | FASTER FORWARDTM
©2017 AKAMAI | FASTER FORWARDTM
NO ONE IS SAFE
©2017 AKAMAI | FASTER FORWARDTM
CYBER CRIMEPOLITICAL

HACKTIVISM
GLORY HOUNDS STATE-
SPONSORED
Today’s Expanding Threat Landscape:
Who & Why
©2017 AKAMAI | FASTER FORWARDTM
PHISHING
Today’s Expanding Threat Landscape:
How
IoT ATTACKSVULNERABILITIES
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
!6
TRUST NO ONE
DDoS // BOTS // ZERO TRUST // IDENTITY
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
!7
An attack of just

1.3 Tbps is enough
to cripple entire
countries
Just imagine 

what 1000 Tbps
could do…
The scale of attacks will continue to grow
20152013 2017 20232021
100 Gbps
1 Tbps
10 Tbps
100 Tbps
1000 Tbps
2019
We’re seeing 

> 1 Tbps today
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Attackers are exploiting the imbalance in core capacity 

(and billions of insecure IoT devices)
Cloud 

Data Centers
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Akamai provides a defensive shield to absorb attack traffic…
and block application-layer attacks
KONA
KONA
KONA
KONA
KONA
KONA
KONA
KONA
KONA
KONA
KONA
KONA
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
!10
TRUST NO ONE
DDoS // BOTS // ZERO TRUST // IDENTITY
©2017 AKAMAI | FASTER FORWARDTM
Bots are 

taking over
©2017 AKAMAI | FASTER FORWARDTM
search engine
bots, SEO 

bots, ad bots
performance bots,
vulnerability
scanner bots

partner bots
aggregator bots, 

media bots
hacker botsgray 

marketer 

bots
scraper botsspam bots
The Bot LandscapeGood Bad
respond 

fast
prioritize
services 

you use
deprioritize 

& monitor
deprioritize
serve
alternate
content
block serve
alternate
content
reply
‘invalid ID’
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Powerful insight into
neuromuscular actions
Adaptive response 

based on bot behavior
Uses machine-learning to 

protect against evolving bots
Proven ability to stop credential abuse
Akamai Bot Manager
©2017 AKAMAI | FASTER FORWARDTM
Customer Success with Bot Manager
MAJOR ASIAN 

AIRLINE
Eliminated bad bot activity
responsible for >80% 

of traffic, generating
massive cost savings.
MAJOR NORTH AMERICAN
RETAILER
Defended against a 700-850k
TPM (transactions per minute)
attack from scraper bots 

trying to capitalize on a 

limited availability item.
MAJOR NORTH AMERICAN
FINANCIAL INSTITUTION
Emergency integration while 

the customer was under attack.
Blocked a Credential Stuffing
campaign of 2.5 million requests
over 24 hours from >10K IPs.
TOP 10 GLOBAL 

FINANCIAL INSTITUTION
Reduced fraud from account
hacking by 50X. Direct losses
dropped from nearly $100K per
day to just $1-2K per day.
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
!15
TRUST NO ONE
DDoS // BOTS // ZERO TRUST // IDENTITY
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
>50%OF BREACHES ARE TRIGGERED FROM INSIDE
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
“The idea of a corporate 

perimeter becomes quaint, 

even dangerous.”
YOUR ENTERPRISE
DATA
APPS
EMPLOYEES BADACTOR
PERIMETER 

(VPN, SECURE WEB GATEWAY, ETC.)
CONTRACTOR
x
Traditionally, you protect your internal apps with a perimeter defense
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
YOUR ENTERPRISE
DATA
APPS
EMPLOYEES BADACTOR
PERIMETER 

(VPN, SECURE WEB GATEWAY, ETC.)
CONTRACTOR
Today, you need to protect your internal apps 

just as if they were external
APP
YOUR EXTERNAL APPS
You protect your external
apps with multiple layers 

of defense (e.g. Kona)
Authentication
Web App Firewall
DDoS Protection
Bot Protection
And More…
x
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Enable MFA & SSO across 

on-prem, IaaS & SaaS apps
Provide clientless, 

app-specific access
Secure access to all enterprise apps
Akamai for Zero Trust
Eliminate the need for 

a corporate network
Full protection for 

internal apps
©2017 AKAMAI | FASTER FORWARDTM
CUSTOMER SUCCESS:

MAJOR AIRLINE
Internal attacks that
Akamai blocked in
first week
SQL

Injection36 Cross Site
Scripting33 Command
Injection19 PHP 

Injection3
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Leveraging DNS intelligence to detect
malware and suspicious activity
Enterprise 

Threat Protector
Real-time intelligence based 

on delivering 1.7 trillion DNS 

queries per day
Enforce compliance and 

your acceptable use policy 

quickly and uniformly
Protect your workforce 

and your data without 

complexity or hardware
©2017 AKAMAI | FASTER FORWARDTM
CUSTOMER SUCCESS:

LUXURY ITALIAN 

FASHION BRAND
Akamai Enterprise Threat Protector identified Bedep
malware in the AC system trying to exfiltrate data
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
!23
TRUST NO ONE
DDoS // BOTS // ZERO TRUST // IDENTITY
©2017 AKAMAI | FASTER FORWARDTM
Regulation
&
Compliance
Customer Identity
&
Access Management
Digital Services
&
Transformation
Omnichannel,
IoT, KYC &
Personalisation
The challenges
with identity
©2017 AKAMAI | FASTER FORWARDTM
Secure your
customer identities 

& protect against 

identity fraud
CIAM consists of three key 

functions delivered as a service:
Optimize user
experience 

& marketing 

efforts
CIAM increases the
user’s security and
privacy, while improving
end user engagement
and brand loyalty
Manage 

your online
customer
identities
What is CIAM?
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
!26
TRUST NO ONE
DDoS // BOTS // ZERO TRUST // IDENTITY
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
!27
TRUST NO ONE
PEOPLE
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
!28
Security Operations Center
• Human intelligence to respond to evolving threats
• Monitor effectiveness of attack mitigation
• Customer communication and coordination
• Global 24x7x365 coverage
Managed Security Services
• Ongoing evaluation of application security
posture
• WAF rule analysis and customization
• Real-time analysis of attack vectors and
multi-dimensional security threats
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Cambridge
Ft. Lauderdale
Krakow
Bangalore
Tokyo
24x365
Security Operations
Centers monitoring &
mitigating attacks
5
Global locations

with hundreds of

security experts
200+
Security certifications
including: CISSP, GSEC, GIAC,

CISA, CEH, GWAPT,

GPEN and MSIS
Akamai 

Global
SOCC
©2017 AKAMAI | FASTER FORWARDTM
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.Thank you.

Weitere ähnliche Inhalte

Was ist angesagt?

Automate Security Event Management Using Trust-Based Decision Models - AWS Su...
Automate Security Event Management Using Trust-Based Decision Models - AWS Su...Automate Security Event Management Using Trust-Based Decision Models - AWS Su...
Automate Security Event Management Using Trust-Based Decision Models - AWS Su...Amazon Web Services
 
The Theory and Practice, Practice, Practice of AWS Operations - AWS Summit Sy...
The Theory and Practice, Practice, Practice of AWS Operations - AWS Summit Sy...The Theory and Practice, Practice, Practice of AWS Operations - AWS Summit Sy...
The Theory and Practice, Practice, Practice of AWS Operations - AWS Summit Sy...Amazon Web Services
 
Procuring Cloud: Achieving Business Outcomes with AWS
Procuring Cloud: Achieving Business Outcomes with AWSProcuring Cloud: Achieving Business Outcomes with AWS
Procuring Cloud: Achieving Business Outcomes with AWSAmazon Web Services
 
The Pitch: Essentials for Success, and Blunders to Avoid
The Pitch: Essentials for Success, and Blunders to AvoidThe Pitch: Essentials for Success, and Blunders to Avoid
The Pitch: Essentials for Success, and Blunders to AvoidAmazon Web Services
 
Software-Defined Security: The New School of Security Designed for DevOps
Software-Defined Security: The New School of Security Designed for DevOpsSoftware-Defined Security: The New School of Security Designed for DevOps
Software-Defined Security: The New School of Security Designed for DevOpsVMware Tanzu
 
Transform with Cloud to drive your Future | AWS Summit Tel Aviv 2019
Transform with Cloud to drive your Future | AWS Summit Tel Aviv 2019Transform with Cloud to drive your Future | AWS Summit Tel Aviv 2019
Transform with Cloud to drive your Future | AWS Summit Tel Aviv 2019Amazon Web Services
 
Trends in Digital Transformation by Joe Chung
Trends in Digital Transformation by Joe ChungTrends in Digital Transformation by Joe Chung
Trends in Digital Transformation by Joe ChungSameer Kenkare
 
Enabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICEnabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICAmazon Web Services
 
Akamai 2016 Investor Relations Summit Presentation
Akamai 2016 Investor Relations Summit PresentationAkamai 2016 Investor Relations Summit Presentation
Akamai 2016 Investor Relations Summit PresentationLiz Bradley
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWSAWS Summits
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?IBM Security
 
Akamai corporate presentation english
Akamai corporate presentation englishAkamai corporate presentation english
Akamai corporate presentation englishJonny Nässlander
 
Designing customer account recovery in a 2FA world
Designing customer account recovery in a 2FA worldDesigning customer account recovery in a 2FA world
Designing customer account recovery in a 2FA worldKelley Robinson
 
Building a Real-Time Data Platform on AWS
Building a Real-Time Data Platform on AWSBuilding a Real-Time Data Platform on AWS
Building a Real-Time Data Platform on AWSInjae Kwak
 
Introduction to AWS Travel by Massimo Morin
Introduction to AWS Travel by Massimo MorinIntroduction to AWS Travel by Massimo Morin
Introduction to AWS Travel by Massimo MorinSameer Kenkare
 
Alexa Voice Services by Linda Lian
Alexa Voice Services by Linda LianAlexa Voice Services by Linda Lian
Alexa Voice Services by Linda LianSameer Kenkare
 
2015 akamai ir_summit_show_file_v6_unanimated
2015 akamai ir_summit_show_file_v6_unanimated2015 akamai ir_summit_show_file_v6_unanimated
2015 akamai ir_summit_show_file_v6_unanimatednoellefaris
 
AWS Sydney Summit 2019 Re:Cap
AWS Sydney Summit 2019 Re:CapAWS Sydney Summit 2019 Re:Cap
AWS Sydney Summit 2019 Re:CapInjae Kwak
 

Was ist angesagt? (20)

Automate Security Event Management Using Trust-Based Decision Models - AWS Su...
Automate Security Event Management Using Trust-Based Decision Models - AWS Su...Automate Security Event Management Using Trust-Based Decision Models - AWS Su...
Automate Security Event Management Using Trust-Based Decision Models - AWS Su...
 
The Theory and Practice, Practice, Practice of AWS Operations - AWS Summit Sy...
The Theory and Practice, Practice, Practice of AWS Operations - AWS Summit Sy...The Theory and Practice, Practice, Practice of AWS Operations - AWS Summit Sy...
The Theory and Practice, Practice, Practice of AWS Operations - AWS Summit Sy...
 
Procuring Cloud: Achieving Business Outcomes with AWS
Procuring Cloud: Achieving Business Outcomes with AWSProcuring Cloud: Achieving Business Outcomes with AWS
Procuring Cloud: Achieving Business Outcomes with AWS
 
The Pitch: Essentials for Success, and Blunders to Avoid
The Pitch: Essentials for Success, and Blunders to AvoidThe Pitch: Essentials for Success, and Blunders to Avoid
The Pitch: Essentials for Success, and Blunders to Avoid
 
Software-Defined Security: The New School of Security Designed for DevOps
Software-Defined Security: The New School of Security Designed for DevOpsSoftware-Defined Security: The New School of Security Designed for DevOps
Software-Defined Security: The New School of Security Designed for DevOps
 
2FA Best Practices
2FA Best Practices2FA Best Practices
2FA Best Practices
 
Transform with Cloud to drive your Future | AWS Summit Tel Aviv 2019
Transform with Cloud to drive your Future | AWS Summit Tel Aviv 2019Transform with Cloud to drive your Future | AWS Summit Tel Aviv 2019
Transform with Cloud to drive your Future | AWS Summit Tel Aviv 2019
 
Trends in Digital Transformation by Joe Chung
Trends in Digital Transformation by Joe ChungTrends in Digital Transformation by Joe Chung
Trends in Digital Transformation by Joe Chung
 
Enabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICEnabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TIC
 
Akamai 2016 Investor Relations Summit Presentation
Akamai 2016 Investor Relations Summit PresentationAkamai 2016 Investor Relations Summit Presentation
Akamai 2016 Investor Relations Summit Presentation
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
 
Akamai corporate presentation english
Akamai corporate presentation englishAkamai corporate presentation english
Akamai corporate presentation english
 
Designing customer account recovery in a 2FA world
Designing customer account recovery in a 2FA worldDesigning customer account recovery in a 2FA world
Designing customer account recovery in a 2FA world
 
Building a Real-Time Data Platform on AWS
Building a Real-Time Data Platform on AWSBuilding a Real-Time Data Platform on AWS
Building a Real-Time Data Platform on AWS
 
AWS Startup Day- softchef
AWS Startup Day- softchefAWS Startup Day- softchef
AWS Startup Day- softchef
 
Introduction to AWS Travel by Massimo Morin
Introduction to AWS Travel by Massimo MorinIntroduction to AWS Travel by Massimo Morin
Introduction to AWS Travel by Massimo Morin
 
Alexa Voice Services by Linda Lian
Alexa Voice Services by Linda LianAlexa Voice Services by Linda Lian
Alexa Voice Services by Linda Lian
 
2015 akamai ir_summit_show_file_v6_unanimated
2015 akamai ir_summit_show_file_v6_unanimated2015 akamai ir_summit_show_file_v6_unanimated
2015 akamai ir_summit_show_file_v6_unanimated
 
AWS Sydney Summit 2019 Re:Cap
AWS Sydney Summit 2019 Re:CapAWS Sydney Summit 2019 Re:Cap
AWS Sydney Summit 2019 Re:Cap
 

Ähnlich wie How to Counter Cybersecurity Attacks - Trust No One

Building Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessBuilding Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessRahul Neel Mani
 
Data is the soil khan smith create tech 2012
Data is the soil khan smith create tech 2012Data is the soil khan smith create tech 2012
Data is the soil khan smith create tech 2012Khan Smith
 
Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15Liz Bradley
 
TL;DR Web Performance Workshop
TL;DR Web Performance WorkshopTL;DR Web Performance Workshop
TL;DR Web Performance WorkshopGareth Hughes
 
게임 서비스를 위한 클라우드 네트워크 활용
게임 서비스를 위한 클라우드 네트워크 활용게임 서비스를 위한 클라우드 네트워크 활용
게임 서비스를 위한 클라우드 네트워크 활용Seung Heun Noh
 
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)Colin Bendell
 
Akamai: From Theory to Practice
Akamai: From Theory to PracticeAkamai: From Theory to Practice
Akamai: From Theory to PracticeLiz Bradley
 
Great Expectations - Dr. Tom Leighton, Akamai
Great Expectations - Dr. Tom Leighton, AkamaiGreat Expectations - Dr. Tom Leighton, Akamai
Great Expectations - Dr. Tom Leighton, AkamaiAkamai Technologies
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsRahul Neel Mani
 
Rise of The Hyper Connected Shopper
Rise of The Hyper Connected ShopperRise of The Hyper Connected Shopper
Rise of The Hyper Connected ShoppereTailing India
 
4 critical criteria DDos
4 critical criteria DDos4 critical criteria DDos
4 critical criteria DDosGCC Computers
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Technologies
 
人工智慧雲服務與金融服務應用
人工智慧雲服務與金融服務應用人工智慧雲服務與金融服務應用
人工智慧雲服務與金融服務應用Amazon Web Services
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architectureHybrid IT Europe
 
Holiday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For PeakHoliday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For PeakG3 Communications
 
Replacing recovery with resilience
Replacing recovery with resilienceReplacing recovery with resilience
Replacing recovery with resilienceAkamai Technologies
 
Accelerate Innovation and Maximize Business Value with Serverless Application...
Accelerate Innovation and Maximize Business Value with Serverless Application...Accelerate Innovation and Maximize Business Value with Serverless Application...
Accelerate Innovation and Maximize Business Value with Serverless Application...Amazon Web Services
 
Remediate Tech Debt or Drive Innovation - AWS Summit Sydney 2018
Remediate Tech Debt or Drive Innovation - AWS Summit Sydney 2018Remediate Tech Debt or Drive Innovation - AWS Summit Sydney 2018
Remediate Tech Debt or Drive Innovation - AWS Summit Sydney 2018Amazon Web Services
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 

Ähnlich wie How to Counter Cybersecurity Attacks - Trust No One (20)

Building Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessBuilding Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of Business
 
DESAYUNO DE TRABAJO AKAMAI
DESAYUNO DE TRABAJO AKAMAIDESAYUNO DE TRABAJO AKAMAI
DESAYUNO DE TRABAJO AKAMAI
 
Data is the soil khan smith create tech 2012
Data is the soil khan smith create tech 2012Data is the soil khan smith create tech 2012
Data is the soil khan smith create tech 2012
 
Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15
 
TL;DR Web Performance Workshop
TL;DR Web Performance WorkshopTL;DR Web Performance Workshop
TL;DR Web Performance Workshop
 
게임 서비스를 위한 클라우드 네트워크 활용
게임 서비스를 위한 클라우드 네트워크 활용게임 서비스를 위한 클라우드 네트워크 활용
게임 서비스를 위한 클라우드 네트워크 활용
 
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
 
Akamai: From Theory to Practice
Akamai: From Theory to PracticeAkamai: From Theory to Practice
Akamai: From Theory to Practice
 
Great Expectations - Dr. Tom Leighton, Akamai
Great Expectations - Dr. Tom Leighton, AkamaiGreat Expectations - Dr. Tom Leighton, Akamai
Great Expectations - Dr. Tom Leighton, Akamai
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
 
Rise of The Hyper Connected Shopper
Rise of The Hyper Connected ShopperRise of The Hyper Connected Shopper
Rise of The Hyper Connected Shopper
 
4 critical criteria DDos
4 critical criteria DDos4 critical criteria DDos
4 critical criteria DDos
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
人工智慧雲服務與金融服務應用
人工智慧雲服務與金融服務應用人工智慧雲服務與金融服務應用
人工智慧雲服務與金融服務應用
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
 
Holiday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For PeakHoliday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For Peak
 
Replacing recovery with resilience
Replacing recovery with resilienceReplacing recovery with resilience
Replacing recovery with resilience
 
Accelerate Innovation and Maximize Business Value with Serverless Application...
Accelerate Innovation and Maximize Business Value with Serverless Application...Accelerate Innovation and Maximize Business Value with Serverless Application...
Accelerate Innovation and Maximize Business Value with Serverless Application...
 
Remediate Tech Debt or Drive Innovation - AWS Summit Sydney 2018
Remediate Tech Debt or Drive Innovation - AWS Summit Sydney 2018Remediate Tech Debt or Drive Innovation - AWS Summit Sydney 2018
Remediate Tech Debt or Drive Innovation - AWS Summit Sydney 2018
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 

Mehr von Elisabeth Bitsch-Christensen

Datadriven organizations and the digital customer journey
Datadriven organizations and the digital customer journeyDatadriven organizations and the digital customer journey
Datadriven organizations and the digital customer journeyElisabeth Bitsch-Christensen
 
Creating a datadriven news room - Expressen in Sweden
Creating a datadriven news room - Expressen in SwedenCreating a datadriven news room - Expressen in Sweden
Creating a datadriven news room - Expressen in SwedenElisabeth Bitsch-Christensen
 
Social Airlines and Customer Experience in Social Media
Social Airlines and Customer Experience in Social MediaSocial Airlines and Customer Experience in Social Media
Social Airlines and Customer Experience in Social MediaElisabeth Bitsch-Christensen
 
The digital journey in 8 steps: from catalog to content and digital
The digital journey in 8 steps: from catalog to content and digitalThe digital journey in 8 steps: from catalog to content and digital
The digital journey in 8 steps: from catalog to content and digitalElisabeth Bitsch-Christensen
 
Digital CMO - Dataföreningens Nätverk För Marketing Professionals
Digital CMO - Dataföreningens Nätverk För Marketing ProfessionalsDigital CMO - Dataföreningens Nätverk För Marketing Professionals
Digital CMO - Dataföreningens Nätverk För Marketing ProfessionalsElisabeth Bitsch-Christensen
 
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...Elisabeth Bitsch-Christensen
 

Mehr von Elisabeth Bitsch-Christensen (15)

Trust No One - Zero Trust on the Akamai Platform
Trust No One - Zero Trust on the Akamai PlatformTrust No One - Zero Trust on the Akamai Platform
Trust No One - Zero Trust on the Akamai Platform
 
Designing for API Doomsday
Designing for API DoomsdayDesigning for API Doomsday
Designing for API Doomsday
 
The Akamai Security Portfolio
The Akamai Security PortfolioThe Akamai Security Portfolio
The Akamai Security Portfolio
 
Datadriven organizations and the digital customer journey
Datadriven organizations and the digital customer journeyDatadriven organizations and the digital customer journey
Datadriven organizations and the digital customer journey
 
Creating a datadriven news room - Expressen in Sweden
Creating a datadriven news room - Expressen in SwedenCreating a datadriven news room - Expressen in Sweden
Creating a datadriven news room - Expressen in Sweden
 
Social Airlines and Customer Experience in Social Media
Social Airlines and Customer Experience in Social MediaSocial Airlines and Customer Experience in Social Media
Social Airlines and Customer Experience in Social Media
 
The digital journey in 8 steps: from catalog to content and digital
The digital journey in 8 steps: from catalog to content and digitalThe digital journey in 8 steps: from catalog to content and digital
The digital journey in 8 steps: from catalog to content and digital
 
Digital CMO - Dataföreningens Nätverk För Marketing Professionals
Digital CMO - Dataföreningens Nätverk För Marketing ProfessionalsDigital CMO - Dataföreningens Nätverk För Marketing Professionals
Digital CMO - Dataföreningens Nätverk För Marketing Professionals
 
Hermods gymnasium-4-feb (1)
Hermods gymnasium-4-feb (1)Hermods gymnasium-4-feb (1)
Hermods gymnasium-4-feb (1)
 
Digital Strategy in Presidential Elections
Digital Strategy in Presidential ElectionsDigital Strategy in Presidential Elections
Digital Strategy in Presidential Elections
 
Engagement marketing: Influence the Influencer
Engagement marketing: Influence the InfluencerEngagement marketing: Influence the Influencer
Engagement marketing: Influence the Influencer
 
CCT Nordics Stockholm 10.15 Gallery
CCT Nordics Stockholm 10.15 GalleryCCT Nordics Stockholm 10.15 Gallery
CCT Nordics Stockholm 10.15 Gallery
 
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
 
Web forumsocialairlines
Web forumsocialairlinesWeb forumsocialairlines
Web forumsocialairlines
 
SSMX SocialAirlines
SSMX SocialAirlinesSSMX SocialAirlines
SSMX SocialAirlines
 

Kürzlich hochgeladen

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

How to Counter Cybersecurity Attacks - Trust No One

  • 1. ©2017 AKAMAI | FASTER FORWARDTM The Akamai Platform and
 How To Counter Attacks Henrik Eriksson
 Service Line Manager 
 Akamai
  • 2. ©2017 AKAMAI | FASTER FORWARDTM
  • 3. ©2017 AKAMAI | FASTER FORWARDTM NO ONE IS SAFE
  • 4. ©2017 AKAMAI | FASTER FORWARDTM CYBER CRIMEPOLITICAL
 HACKTIVISM GLORY HOUNDS STATE- SPONSORED Today’s Expanding Threat Landscape: Who & Why
  • 5. ©2017 AKAMAI | FASTER FORWARDTM PHISHING Today’s Expanding Threat Landscape: How IoT ATTACKSVULNERABILITIES
  • 6. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. !6 TRUST NO ONE DDoS // BOTS // ZERO TRUST // IDENTITY
  • 7. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. !7 An attack of just
 1.3 Tbps is enough to cripple entire countries Just imagine 
 what 1000 Tbps could do… The scale of attacks will continue to grow 20152013 2017 20232021 100 Gbps 1 Tbps 10 Tbps 100 Tbps 1000 Tbps 2019 We’re seeing 
 > 1 Tbps today
  • 8. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Attackers are exploiting the imbalance in core capacity 
 (and billions of insecure IoT devices) Cloud 
 Data Centers
  • 9. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Akamai provides a defensive shield to absorb attack traffic… and block application-layer attacks KONA KONA KONA KONA KONA KONA KONA KONA KONA KONA KONA KONA
  • 10. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. !10 TRUST NO ONE DDoS // BOTS // ZERO TRUST // IDENTITY
  • 11. ©2017 AKAMAI | FASTER FORWARDTM Bots are 
 taking over
  • 12. ©2017 AKAMAI | FASTER FORWARDTM search engine bots, SEO 
 bots, ad bots performance bots, vulnerability scanner bots
 partner bots aggregator bots, 
 media bots hacker botsgray 
 marketer 
 bots scraper botsspam bots The Bot LandscapeGood Bad respond 
 fast prioritize services 
 you use deprioritize 
 & monitor deprioritize serve alternate content block serve alternate content reply ‘invalid ID’
  • 13. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Powerful insight into neuromuscular actions Adaptive response 
 based on bot behavior Uses machine-learning to 
 protect against evolving bots Proven ability to stop credential abuse Akamai Bot Manager
  • 14. ©2017 AKAMAI | FASTER FORWARDTM Customer Success with Bot Manager MAJOR ASIAN 
 AIRLINE Eliminated bad bot activity responsible for >80% 
 of traffic, generating massive cost savings. MAJOR NORTH AMERICAN RETAILER Defended against a 700-850k TPM (transactions per minute) attack from scraper bots 
 trying to capitalize on a 
 limited availability item. MAJOR NORTH AMERICAN FINANCIAL INSTITUTION Emergency integration while 
 the customer was under attack. Blocked a Credential Stuffing campaign of 2.5 million requests over 24 hours from >10K IPs. TOP 10 GLOBAL 
 FINANCIAL INSTITUTION Reduced fraud from account hacking by 50X. Direct losses dropped from nearly $100K per day to just $1-2K per day.
  • 15. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. !15 TRUST NO ONE DDoS // BOTS // ZERO TRUST // IDENTITY
  • 16. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. >50%OF BREACHES ARE TRIGGERED FROM INSIDE
  • 17. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. “The idea of a corporate 
 perimeter becomes quaint, 
 even dangerous.” YOUR ENTERPRISE DATA APPS EMPLOYEES BADACTOR PERIMETER 
 (VPN, SECURE WEB GATEWAY, ETC.) CONTRACTOR x Traditionally, you protect your internal apps with a perimeter defense
  • 18. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. YOUR ENTERPRISE DATA APPS EMPLOYEES BADACTOR PERIMETER 
 (VPN, SECURE WEB GATEWAY, ETC.) CONTRACTOR Today, you need to protect your internal apps 
 just as if they were external APP YOUR EXTERNAL APPS You protect your external apps with multiple layers 
 of defense (e.g. Kona) Authentication Web App Firewall DDoS Protection Bot Protection And More… x
  • 19. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Enable MFA & SSO across 
 on-prem, IaaS & SaaS apps Provide clientless, 
 app-specific access Secure access to all enterprise apps Akamai for Zero Trust Eliminate the need for 
 a corporate network Full protection for 
 internal apps
  • 20. ©2017 AKAMAI | FASTER FORWARDTM CUSTOMER SUCCESS:
 MAJOR AIRLINE Internal attacks that Akamai blocked in first week SQL
 Injection36 Cross Site Scripting33 Command Injection19 PHP 
 Injection3
  • 21. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Leveraging DNS intelligence to detect malware and suspicious activity Enterprise 
 Threat Protector Real-time intelligence based 
 on delivering 1.7 trillion DNS 
 queries per day Enforce compliance and 
 your acceptable use policy 
 quickly and uniformly Protect your workforce 
 and your data without 
 complexity or hardware
  • 22. ©2017 AKAMAI | FASTER FORWARDTM CUSTOMER SUCCESS:
 LUXURY ITALIAN 
 FASHION BRAND Akamai Enterprise Threat Protector identified Bedep malware in the AC system trying to exfiltrate data
  • 23. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. !23 TRUST NO ONE DDoS // BOTS // ZERO TRUST // IDENTITY
  • 24. ©2017 AKAMAI | FASTER FORWARDTM Regulation & Compliance Customer Identity & Access Management Digital Services & Transformation Omnichannel, IoT, KYC & Personalisation The challenges with identity
  • 25. ©2017 AKAMAI | FASTER FORWARDTM Secure your customer identities 
 & protect against 
 identity fraud CIAM consists of three key 
 functions delivered as a service: Optimize user experience 
 & marketing 
 efforts CIAM increases the user’s security and privacy, while improving end user engagement and brand loyalty Manage 
 your online customer identities What is CIAM?
  • 26. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. !26 TRUST NO ONE DDoS // BOTS // ZERO TRUST // IDENTITY
  • 27. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. !27 TRUST NO ONE PEOPLE
  • 28. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. !28 Security Operations Center • Human intelligence to respond to evolving threats • Monitor effectiveness of attack mitigation • Customer communication and coordination • Global 24x7x365 coverage Managed Security Services • Ongoing evaluation of application security posture • WAF rule analysis and customization • Real-time analysis of attack vectors and multi-dimensional security threats
  • 29. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Cambridge Ft. Lauderdale Krakow Bangalore Tokyo 24x365 Security Operations Centers monitoring & mitigating attacks 5 Global locations
 with hundreds of
 security experts 200+ Security certifications including: CISSP, GSEC, GIAC,
 CISA, CEH, GWAPT,
 GPEN and MSIS Akamai 
 Global SOCC
  • 30. ©2017 AKAMAI | FASTER FORWARDTM
  • 31. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.Thank you.