Akamai’s products and services include layers of defenses to identify the malicious domain
Mitesh Jain
Country Manager, Akamai Technologies
Protection against cybercrime
Akamai’s comprehensive security portfolio has the most effective security capability and unique breadth of our defenses. As the new threat vectors in cybercrime have emerged, we’ve extended our platform to defend against them.
In the era of remote working, Akamai built their architecture with the concept of zero trust model equipped with necessary capabilities that were robust and proactive. The layered defenses in place at Akamai were easily able to adapt to a remote work environment. The concept of Zero Trust has enabled the company’s remote workers to do their jobs from anywhere and protects them at the same time. It’s taken years to architect this model to where it is today, and it’s a continuous process. The security protocols at Akamai addresses several key elements used by criminals including exfiltration, command, and control (C2), and phishing through the layered defense system because the blocks recorded are mostly proactive due to third party access.
Solutions to prevent Distributed DoS attacks (DDoS)
The solutions for DDoS attacks can be fine-tuned according to the respective requirements of the organizations and their internet-based services.
1) Edge Security: The organization should have distributed an intelligent edge platform in such a way that it only accepts traffic via limited pre-decided ports. Therefore, DDoS attacks coming at all network layers are instantly dropped at the edge with a zero-second service level agreement (SLA).
In the case of application-layer DDoS attacks, they are mitigated through APIs which detect the nature of attacks and simultaneously grants access to legitimate users.
2) DNS Security: DNS solutions also filter traffic at the edge and provide a highly scalable platform that has enough capacity to absorb the largest DDoS attacks while also responding to legitimate user requests. Akamai’s domain name system provides redundancies at multiple levels, including name servers, points of presence, networks, and even segmented IP Anycast clouds.
3) Cloud Scrubbing Security: Prolexic is a company under Akamai that stops DDoS attacks with the fastest, most effective defense — at scale. Prolexiccan protect entire data centers and hybrid infrastructures across all system ports with more than 10 Tbps of dedicated DDoS defense. It also offers proactive defensive controls with zero-second mitigation SLA.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.