Akamai Introduces Kona Site Defender to Protect Enterprises from Multi-vectored DDoS and Application Security Attacks
CAMBRIDGE, Mass., Feb. 21, 2012 /PRNewswire/ – Akamai® Technologies, Inc. (NASDAQ: AKAM), the leading cloud platform for delivering secure, high-performing user experiences to any device, anywhere, today introduced Akamai Kona Site Defender. The service is designed to protect the brand value of companies by shielding their web sites, applications and associated data in the face of increasing and more complex attacks. These attacks can cost companies millions in lost transactions and business productivity each year, and even higher losses in their brand value and reputation. With the introduction of Kona Site Defender, real-time web security monitoring, adaptive rate controls and other powerful features are bundled into a single, always on, cloud-based solution that can protect an enterprise’s most critical online business functions.
Akamai currently provides web security solutions to more than 300 enterprises – including financial institutions, retailers, government agencies, and media and entertainment companies organizing today’s most high-profile events – and has seen a more than 140 percent increase in customers taking advantage of Akamai security solutions from 2010 to 2011. And while many organizations still wish to pair acceleration with web security in order to give users of primary sites and web applications an optimal experience, an increasing number find that the requirement for protection from DDoS and application layer attacks applies to a much broader number of their web properties. The availability of Kona Site Defender makes it possible for these organizations to more easily protect web sites from attack without requiring the purchase of acceleration and optimization services.
“Attackers don’t stay on one layer anymore; they tend to include both network and application-based techniques, which makes defending against them more complicated,” said Wendy Nather, research director of 451 Research’s Enterprise Security Practice. “Enterprises are looking for resilient defense that takes advantage of the provider’s experience with large volumes of these kinds of attacks.”
At the foundation of Akamai’s security offerings is the massively distributed Akamai Intelligent Platform(TM) that is designed to provide not only unmatched scale but also automatic protection against network layer attacks. Because the Akamai Intelligent Platform is designed to only accept valid HTTP/S requests on port 80 and port 443, network layer attacks such as TCP SYN floods, UDP floods, and other network packet based attacks are deflected. The Akamai Intelligent Platform is further designed with built-in automatic protections against HTTP “slow client” attacks (e.g. Slowloris) and HTTP Request Smuggling attacks.
Akamai’s platform-based approach to web security can offer powerful protection to customers without incurring the performance penalty often associated with other methods, such as traffic scrubbing. Akamai seeks to deliver protection natively in the existing traffic path eliminating the need for rerouting, mitigating added latency and incurring no single point of failure. The Akamai Intelligent Platform is designed to deliver always on protection with industry leading scalability. Every Akamai edge server can act as a Kona Site Defender policy enforcement point, which is designed to allow Akamai to rapidly scale up defenses against attacks against its customers. In addition, Kona Site Defender helps protects customers from some of the potential costs resulting from high volume attacks by explicitly capping burst fees that Akamai might otherwise charge for traffic bursts if that traffic was caused by a large scale DDoS attack.
At the application layer, where attacks such as SQL injection and cross site scripting are prevalent, the Akamai technology is differentiated through the inclusion of a full-feature Web application firewall. This application layer firewall consists of approximately 100 easy to configure rules that are designed to provide:
- HTTP protocol violation protections
- HTTP request limits
- HTTP policy limits (limit methods, content types, file extensions, etc.)
- Protections against trojans
- Defenses against scanners and bad robots
- Generic attack protections (e.g. SQL injections, cross site scripting, system command injections, etc.)
- Outbound content protection
In addition, the web application firewall can block requests based on the geography of the IP address making the request and it can define custom rules that apply specific protections for customer applications.
New design features introduced with the launch of Kona Site Defender include:
Advanced Security Monitor: Knowing in real-time that a Web site or application is being attacked, and having visibility into the nature and source of the attack, is critical to a successful defense. Kona Site Defender provides security professionals with the required real-time visibility into security events as well as the capability to drill down into attack alerts to retrieve detailed information on who is attacking, what they are attacking, what defense capabilities triggered the attack declaration and what specifically was seen in the requests that triggered site defenses. As important, archived log data is available for 90 days to aid in post-attack forensics review.
Rate Controls: KonaSite Defender provides a new set of web defenses based on detecting and blocking clients that exhibit malicious behavior. The platform monitors the rate of requests coming from individual IP addresses and gathers statistics about each. This allows customers to block any IP address that is behaving in an abusive way, such as sending too many requests per second or causing too many origin errors. These protections are always on. Further the statistics collected allow Kona Site Defender to automatically detect IP addresses that have a high request rate but are not malicious such as large enterprise proxies.
“Our customers are some of the most innovative online businesses in the world, and as such, are looking for that same level of innovation from the companies with which they work to protect their brands and their reputations,” explained John Summers, vice president, Security Business, Akamai. “With the introduction of Kona Site Defender, we’re offering what we believe is the best way to respond to an ever changing, and in many ways, ever more hostile online environment.”
In recent weeks, Akamai customers have benefitted from the Company’s differentiated approach to delivering DDoS mitigation and web application security services. Both commercial and government organizations have been protected from potentially crippling, long-term attacks that in some cases reached a peak of more than 16,300 requests/sec (862 Mb/sec), an increase of 110 times normal traffic, and lasted over three days. In every case, the customers’ sites remained up and fully operational.
Akamai Kona Site Defender is in limited availability now and will be generally available April 11, 2012. To see Kona Site Defender in action, please visit Akamai at the upcoming RSA Conference 2012 (Booth 851).
Akamai(®) is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the Company’s solutions is the Akamai Intelligent Platform(TM) providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter.
Akamai Statement Under the Private Securities Litigation Reform Act
This release contains information about future expectations, plans and prospects of Akamai’s management that constitute forward-looking statements for purposes of the safe harbor provisions under The Private Securities Litigation Reform Act of 1995. Actual results may differ materially from those indicated by these forward-looking statements as a result of various important factors including, but not limited to, failure of Akamai services to operate as expected or to address intended market needs, a failure of Akamai’s network infrastructure, and other factors that are discussed in Akamai’s Annual Report on Form 10-K, quarterly reports on Form 10-Q, and other documents periodically filed with the SEC.
Contacts: Rob Morton Natalie Temple Media Relations Investor Relations 617-444-3641 617-444-3635 firstname.lastname@example.org email@example.com
SOURCE Akamai Technologies, Inc.