Akamai unveils Cloud Security Intelligence

Recognizing the crucial role data analytics play in more effectively fighting cloud security threats, Akamai Technologies has unveiled the foundation underpinning its Cloud Security Solutions. Known as Akamai Cloud Security Intelligence, a data processing engine within the Akamai Intelligent Platform, the engine is used to continuously analyze more than two Petabytes of data related to web security threats. Akamai uses the resulting intelligence to not only continuously update and improve the Kona Site Defender application security rule set, but also provides the framework around which innovative offerings, such as the newly available Kona Client Reputation solutions are built.

Akamai Cloud Security Intelligence is designed to provide more comprehensive insight into how malicious actors are attacking web properties, which in turn can be used to inform the direction of Akamai’s Cloud Security Solutions.

“The Akamai Cloud Security Intelligence data analysis engine provides a solid foundation from which we are able to make our existing Akamai Cloud Security Solutions even smarter and provide a framework upon which new cloud security solutions can be built. The ultimate goal is to continue delivering technology designed to keep our customers’ online businesses protected in the face of an ever-changing threat landscape,” explained John Summers, Vice-President, Cloud Security, Akamai.

Security professionals can benefit from the power of Akamai’s Cloud Security Intelligence through two newly-introduced offerings:

    Kona Client Reputation: Akamai’s unprecedented view of web traffic gives the company access to more web client data than any other security provider. That data, combined with a proprietary query language and advanced heuristics and algorithms creates a reputation “score” for every IP address that crosses the platform. As important, this score can adapt over time, based on the ongoing data analysis of IP address activity. Potentially hazardous traffic is classified as DDoS attackers, vulnerability scanners, web attackers or web scrapers and further rated according to the likelihood of danger associated with the client.... See more 

Comments

Popular posts from this blog

N Chandrasekaran appointed chairman of Tata Sons

DoT Secretary hints at making Draft NTP 2018 available in public domain soon

Visa buys NFT based CryptoPunk and paid $150,000 in Etherium