SlideShare a Scribd company logo
©2017 AKAMAI | FASTER FORWARDTM
The Akamai Platform and

How To Counter Attacks
Henrik Eriksson

Service Line Manager 

Akamai
©2017 AKAMAI | FASTER FORWARDTM
©2017 AKAMAI | FASTER FORWARDTM
NO ONE IS SAFE
©2017 AKAMAI | FASTER FORWARDTM
CYBER CRIMEPOLITICAL

HACKTIVISM
GLORY HOUNDS STATE-
SPONSORED
Today’s Expanding Threat Landscape:
Who & Why
©2017 AKAMAI | FASTER FORWARDTM
PHISHING
Today’s Expanding Threat Landscape:
How
IoT ATTACKSVULNERABILITIES
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
!6
TRUST NO ONE
DDoS // BOTS // ZERO TRUST // IDENTITY
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
!7
An attack of just

1.3 Tbps is enough
to cripple entire
countries
Just imagine 

what 1000 Tbps
could do…
The scale of attacks will continue to grow
20152013 2017 20232021
100 Gbps
1 Tbps
10 Tbps
100 Tbps
1000 Tbps
2019
We’re seeing 

> 1 Tbps today
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Attackers are exploiting the imbalance in core capacity 

(and billions of insecure IoT devices)
Cloud 

Data Centers
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Akamai provides a defensive shield to absorb attack traffic…
and block application-layer attacks
KONA
KONA
KONA
KONA
KONA
KONA
KONA
KONA
KONA
KONA
KONA
KONA
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
!10
TRUST NO ONE
DDoS // BOTS // ZERO TRUST // IDENTITY
©2017 AKAMAI | FASTER FORWARDTM
Bots are 

taking over
©2017 AKAMAI | FASTER FORWARDTM
search engine
bots, SEO 

bots, ad bots
performance bots,
vulnerability
scanner bots

partner bots
aggregator bots, 

media bots
hacker botsgray 

marketer 

bots
scraper botsspam bots
The Bot LandscapeGood Bad
respond 

fast
prioritize
services 

you use
deprioritize 

& monitor
deprioritize
serve
alternate
content
block serve
alternate
content
reply
‘invalid ID’
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Powerful insight into
neuromuscular actions
Adaptive response 

based on bot behavior
Uses machine-learning to 

protect against evolving bots
Proven ability to stop credential abuse
Akamai Bot Manager
©2017 AKAMAI | FASTER FORWARDTM
Customer Success with Bot Manager
MAJOR ASIAN 

AIRLINE
Eliminated bad bot activity
responsible for >80% 

of traffic, generating
massive cost savings.
MAJOR NORTH AMERICAN
RETAILER
Defended against a 700-850k
TPM (transactions per minute)
attack from scraper bots 

trying to capitalize on a 

limited availability item.
MAJOR NORTH AMERICAN
FINANCIAL INSTITUTION
Emergency integration while 

the customer was under attack.
Blocked a Credential Stuffing
campaign of 2.5 million requests
over 24 hours from >10K IPs.
TOP 10 GLOBAL 

FINANCIAL INSTITUTION
Reduced fraud from account
hacking by 50X. Direct losses
dropped from nearly $100K per
day to just $1-2K per day.
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
!15
TRUST NO ONE
DDoS // BOTS // ZERO TRUST // IDENTITY
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
>50%OF BREACHES ARE TRIGGERED FROM INSIDE
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
“The idea of a corporate 

perimeter becomes quaint, 

even dangerous.”
YOUR ENTERPRISE
DATA
APPS
EMPLOYEES BADACTOR
PERIMETER 

(VPN, SECURE WEB GATEWAY, ETC.)
CONTRACTOR
x
Traditionally, you protect your internal apps with a perimeter defense
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
YOUR ENTERPRISE
DATA
APPS
EMPLOYEES BADACTOR
PERIMETER 

(VPN, SECURE WEB GATEWAY, ETC.)
CONTRACTOR
Today, you need to protect your internal apps 

just as if they were external
APP
YOUR EXTERNAL APPS
You protect your external
apps with multiple layers 

of defense (e.g. Kona)
Authentication
Web App Firewall
DDoS Protection
Bot Protection
And More…
x
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Enable MFA & SSO across 

on-prem, IaaS & SaaS apps
Provide clientless, 

app-specific access
Secure access to all enterprise apps
Akamai for Zero Trust
Eliminate the need for 

a corporate network
Full protection for 

internal apps
©2017 AKAMAI | FASTER FORWARDTM
CUSTOMER SUCCESS:

MAJOR AIRLINE
Internal attacks that
Akamai blocked in
first week
SQL

Injection36 Cross Site
Scripting33 Command
Injection19 PHP 

Injection3
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Leveraging DNS intelligence to detect
malware and suspicious activity
Enterprise 

Threat Protector
Real-time intelligence based 

on delivering 1.7 trillion DNS 

queries per day
Enforce compliance and 

your acceptable use policy 

quickly and uniformly
Protect your workforce 

and your data without 

complexity or hardware
©2017 AKAMAI | FASTER FORWARDTM
CUSTOMER SUCCESS:

LUXURY ITALIAN 

FASHION BRAND
Akamai Enterprise Threat Protector identified Bedep
malware in the AC system trying to exfiltrate data
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
!23
TRUST NO ONE
DDoS // BOTS // ZERO TRUST // IDENTITY
©2017 AKAMAI | FASTER FORWARDTM
Regulation
&
Compliance
Customer Identity
&
Access Management
Digital Services
&
Transformation
Omnichannel,
IoT, KYC &
Personalisation
The challenges
with identity
©2017 AKAMAI | FASTER FORWARDTM
Secure your
customer identities 

& protect against 

identity fraud
CIAM consists of three key 

functions delivered as a service:
Optimize user
experience 

& marketing 

efforts
CIAM increases the
user’s security and
privacy, while improving
end user engagement
and brand loyalty
Manage 

your online
customer
identities
What is CIAM?
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
!26
TRUST NO ONE
DDoS // BOTS // ZERO TRUST // IDENTITY
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
!27
TRUST NO ONE
PEOPLE
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
!28
Security Operations Center
• Human intelligence to respond to evolving threats
• Monitor effectiveness of attack mitigation
• Customer communication and coordination
• Global 24x7x365 coverage
Managed Security Services
• Ongoing evaluation of application security
posture
• WAF rule analysis and customization
• Real-time analysis of attack vectors and
multi-dimensional security threats
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Cambridge
Ft. Lauderdale
Krakow
Bangalore
Tokyo
24x365
Security Operations
Centers monitoring &
mitigating attacks
5
Global locations

with hundreds of

security experts
200+
Security certifications
including: CISSP, GSEC, GIAC,

CISA, CEH, GWAPT,

GPEN and MSIS
Akamai 

Global
SOCC
©2017 AKAMAI | FASTER FORWARDTM
©2017 AKAMAI | FASTER FORWARDTM
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.Thank you.

More Related Content

PDF
What is a Bot and why you should care
PDF
Keynotes Akamai Trust No One City Tour
PDF
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
PDF
Welcome Address: The Accelerating Pace of Innovation - Dr. Tom Leighton, Akamai
PDF
Akamai Technologies - Company Overview
PPTX
Tom edge-keynote-2013. final
PPTX
Software-Defined Security: The New School of Security Designed for DevOps
PDF
2FA Best Practices
What is a Bot and why you should care
Keynotes Akamai Trust No One City Tour
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Welcome Address: The Accelerating Pace of Innovation - Dr. Tom Leighton, Akamai
Akamai Technologies - Company Overview
Tom edge-keynote-2013. final
Software-Defined Security: The New School of Security Designed for DevOps
2FA Best Practices

What's hot (12)

PDF
Trends in Digital Transformation by Joe Chung
PDF
Akamai 2016 Investor Relations Summit Presentation
PPTX
Managing Security on AWS
PDF
Are Cloud Apps the Invisible Man?
PPTX
Akamai corporate presentation english
PDF
Designing customer account recovery in a 2FA world
PPTX
Building a Real-Time Data Platform on AWS
PDF
Introduction to AWS Travel by Massimo Morin
PDF
Alexa Voice Services by Linda Lian
PDF
2015 akamai ir_summit_show_file_v6_unanimated
PPTX
AWS Sydney Summit 2019 Re:Cap
PDF
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWS
Trends in Digital Transformation by Joe Chung
Akamai 2016 Investor Relations Summit Presentation
Managing Security on AWS
Are Cloud Apps the Invisible Man?
Akamai corporate presentation english
Designing customer account recovery in a 2FA world
Building a Real-Time Data Platform on AWS
Introduction to AWS Travel by Massimo Morin
Alexa Voice Services by Linda Lian
2015 akamai ir_summit_show_file_v6_unanimated
AWS Sydney Summit 2019 Re:Cap
AWS Summit Singapore 2019 | Driving Business Outcomes with Data Lake on AWS
Ad

Similar to How to Counter Cybersecurity Attacks - Trust No One (20)

PPTX
Building Cyber Resilience at the Speed of Business
PDF
DESAYUNO DE TRABAJO AKAMAI
PDF
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
PDF
Replacing recovery with resilience
PPTX
Akamai: From Theory to Practice
PDF
Akamai in a hyperconnected world
PDF
Akamai in a hyperconnected world
PDF
Kona Web Application Firewall Product Brief - Application-layer defense to pr...
PDF
Akamai Korea - Tech Day (2015/03/11) DNS
PPTX
Tom uk soti_final_without video.4.21.15
PDF
Akamai partner training by Malcolm Rowe
PDF
Kona Site Defender Product Brief - Multi-layered defense to protect websites ...
PPTX
State of the Internet: Mirai, IOT and History of Botnets
PPTX
3 Reasons You Need Proactive Protection Against Malware
PPTX
Akamai waf
PDF
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
PPTX
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
PDF
Holiday Retail Readiness: Preparing For Peak
PDF
4 critical criteria DDos
PDF
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Building Cyber Resilience at the Speed of Business
DESAYUNO DE TRABAJO AKAMAI
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Replacing recovery with resilience
Akamai: From Theory to Practice
Akamai in a hyperconnected world
Akamai in a hyperconnected world
Kona Web Application Firewall Product Brief - Application-layer defense to pr...
Akamai Korea - Tech Day (2015/03/11) DNS
Tom uk soti_final_without video.4.21.15
Akamai partner training by Malcolm Rowe
Kona Site Defender Product Brief - Multi-layered defense to protect websites ...
State of the Internet: Mirai, IOT and History of Botnets
3 Reasons You Need Proactive Protection Against Malware
Akamai waf
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Holiday Retail Readiness: Preparing For Peak
4 critical criteria DDos
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Ad

More from Elisabeth Bitsch-Christensen (15)

PDF
Trust No One - Zero Trust on the Akamai Platform
PDF
Designing for API Doomsday
PDF
The Akamai Security Portfolio
PDF
Datadriven organizations and the digital customer journey
PDF
Creating a datadriven news room - Expressen in Sweden
PDF
Social Airlines and Customer Experience in Social Media
PDF
The digital journey in 8 steps: from catalog to content and digital
PDF
Digital CMO - Dataföreningens Nätverk För Marketing Professionals
PDF
Hermods gymnasium-4-feb (1)
PDF
Digital Strategy in Presidential Elections
PDF
Engagement marketing: Influence the Influencer
PPTX
CCT Nordics Stockholm 10.15 Gallery
PDF
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
PDF
Web forumsocialairlines
PDF
SSMX SocialAirlines
Trust No One - Zero Trust on the Akamai Platform
Designing for API Doomsday
The Akamai Security Portfolio
Datadriven organizations and the digital customer journey
Creating a datadriven news room - Expressen in Sweden
Social Airlines and Customer Experience in Social Media
The digital journey in 8 steps: from catalog to content and digital
Digital CMO - Dataföreningens Nätverk För Marketing Professionals
Hermods gymnasium-4-feb (1)
Digital Strategy in Presidential Elections
Engagement marketing: Influence the Influencer
CCT Nordics Stockholm 10.15 Gallery
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
Web forumsocialairlines
SSMX SocialAirlines

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Empathic Computing: Creating Shared Understanding
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Electronic commerce courselecture one. Pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Encapsulation theory and applications.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
MYSQL Presentation for SQL database connectivity
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Empathic Computing: Creating Shared Understanding
The AUB Centre for AI in Media Proposal.docx
Spectral efficient network and resource selection model in 5G networks
Encapsulation_ Review paper, used for researhc scholars
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Review of recent advances in non-invasive hemoglobin estimation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Network Security Unit 5.pdf for BCA BBA.
Dropbox Q2 2025 Financial Results & Investor Presentation
Electronic commerce courselecture one. Pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Encapsulation theory and applications.pdf
NewMind AI Monthly Chronicles - July 2025

How to Counter Cybersecurity Attacks - Trust No One

  • 1. ©2017 AKAMAI | FASTER FORWARDTM The Akamai Platform and
 How To Counter Attacks Henrik Eriksson
 Service Line Manager 
 Akamai
  • 2. ©2017 AKAMAI | FASTER FORWARDTM
  • 3. ©2017 AKAMAI | FASTER FORWARDTM NO ONE IS SAFE
  • 4. ©2017 AKAMAI | FASTER FORWARDTM CYBER CRIMEPOLITICAL
 HACKTIVISM GLORY HOUNDS STATE- SPONSORED Today’s Expanding Threat Landscape: Who & Why
  • 5. ©2017 AKAMAI | FASTER FORWARDTM PHISHING Today’s Expanding Threat Landscape: How IoT ATTACKSVULNERABILITIES
  • 6. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. !6 TRUST NO ONE DDoS // BOTS // ZERO TRUST // IDENTITY
  • 7. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. !7 An attack of just
 1.3 Tbps is enough to cripple entire countries Just imagine 
 what 1000 Tbps could do… The scale of attacks will continue to grow 20152013 2017 20232021 100 Gbps 1 Tbps 10 Tbps 100 Tbps 1000 Tbps 2019 We’re seeing 
 > 1 Tbps today
  • 8. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Attackers are exploiting the imbalance in core capacity 
 (and billions of insecure IoT devices) Cloud 
 Data Centers
  • 9. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Akamai provides a defensive shield to absorb attack traffic… and block application-layer attacks KONA KONA KONA KONA KONA KONA KONA KONA KONA KONA KONA KONA
  • 10. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. !10 TRUST NO ONE DDoS // BOTS // ZERO TRUST // IDENTITY
  • 11. ©2017 AKAMAI | FASTER FORWARDTM Bots are 
 taking over
  • 12. ©2017 AKAMAI | FASTER FORWARDTM search engine bots, SEO 
 bots, ad bots performance bots, vulnerability scanner bots
 partner bots aggregator bots, 
 media bots hacker botsgray 
 marketer 
 bots scraper botsspam bots The Bot LandscapeGood Bad respond 
 fast prioritize services 
 you use deprioritize 
 & monitor deprioritize serve alternate content block serve alternate content reply ‘invalid ID’
  • 13. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Powerful insight into neuromuscular actions Adaptive response 
 based on bot behavior Uses machine-learning to 
 protect against evolving bots Proven ability to stop credential abuse Akamai Bot Manager
  • 14. ©2017 AKAMAI | FASTER FORWARDTM Customer Success with Bot Manager MAJOR ASIAN 
 AIRLINE Eliminated bad bot activity responsible for >80% 
 of traffic, generating massive cost savings. MAJOR NORTH AMERICAN RETAILER Defended against a 700-850k TPM (transactions per minute) attack from scraper bots 
 trying to capitalize on a 
 limited availability item. MAJOR NORTH AMERICAN FINANCIAL INSTITUTION Emergency integration while 
 the customer was under attack. Blocked a Credential Stuffing campaign of 2.5 million requests over 24 hours from >10K IPs. TOP 10 GLOBAL 
 FINANCIAL INSTITUTION Reduced fraud from account hacking by 50X. Direct losses dropped from nearly $100K per day to just $1-2K per day.
  • 15. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. !15 TRUST NO ONE DDoS // BOTS // ZERO TRUST // IDENTITY
  • 16. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. >50%OF BREACHES ARE TRIGGERED FROM INSIDE
  • 17. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. “The idea of a corporate 
 perimeter becomes quaint, 
 even dangerous.” YOUR ENTERPRISE DATA APPS EMPLOYEES BADACTOR PERIMETER 
 (VPN, SECURE WEB GATEWAY, ETC.) CONTRACTOR x Traditionally, you protect your internal apps with a perimeter defense
  • 18. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. YOUR ENTERPRISE DATA APPS EMPLOYEES BADACTOR PERIMETER 
 (VPN, SECURE WEB GATEWAY, ETC.) CONTRACTOR Today, you need to protect your internal apps 
 just as if they were external APP YOUR EXTERNAL APPS You protect your external apps with multiple layers 
 of defense (e.g. Kona) Authentication Web App Firewall DDoS Protection Bot Protection And More… x
  • 19. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Enable MFA & SSO across 
 on-prem, IaaS & SaaS apps Provide clientless, 
 app-specific access Secure access to all enterprise apps Akamai for Zero Trust Eliminate the need for 
 a corporate network Full protection for 
 internal apps
  • 20. ©2017 AKAMAI | FASTER FORWARDTM CUSTOMER SUCCESS:
 MAJOR AIRLINE Internal attacks that Akamai blocked in first week SQL
 Injection36 Cross Site Scripting33 Command Injection19 PHP 
 Injection3
  • 21. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Leveraging DNS intelligence to detect malware and suspicious activity Enterprise 
 Threat Protector Real-time intelligence based 
 on delivering 1.7 trillion DNS 
 queries per day Enforce compliance and 
 your acceptable use policy 
 quickly and uniformly Protect your workforce 
 and your data without 
 complexity or hardware
  • 22. ©2017 AKAMAI | FASTER FORWARDTM CUSTOMER SUCCESS:
 LUXURY ITALIAN 
 FASHION BRAND Akamai Enterprise Threat Protector identified Bedep malware in the AC system trying to exfiltrate data
  • 23. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. !23 TRUST NO ONE DDoS // BOTS // ZERO TRUST // IDENTITY
  • 24. ©2017 AKAMAI | FASTER FORWARDTM Regulation & Compliance Customer Identity & Access Management Digital Services & Transformation Omnichannel, IoT, KYC & Personalisation The challenges with identity
  • 25. ©2017 AKAMAI | FASTER FORWARDTM Secure your customer identities 
 & protect against 
 identity fraud CIAM consists of three key 
 functions delivered as a service: Optimize user experience 
 & marketing 
 efforts CIAM increases the user’s security and privacy, while improving end user engagement and brand loyalty Manage 
 your online customer identities What is CIAM?
  • 26. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. !26 TRUST NO ONE DDoS // BOTS // ZERO TRUST // IDENTITY
  • 27. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. !27 TRUST NO ONE PEOPLE
  • 28. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. !28 Security Operations Center • Human intelligence to respond to evolving threats • Monitor effectiveness of attack mitigation • Customer communication and coordination • Global 24x7x365 coverage Managed Security Services • Ongoing evaluation of application security posture • WAF rule analysis and customization • Real-time analysis of attack vectors and multi-dimensional security threats
  • 29. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Cambridge Ft. Lauderdale Krakow Bangalore Tokyo 24x365 Security Operations Centers monitoring & mitigating attacks 5 Global locations
 with hundreds of
 security experts 200+ Security certifications including: CISSP, GSEC, GIAC,
 CISA, CEH, GWAPT,
 GPEN and MSIS Akamai 
 Global SOCC
  • 30. ©2017 AKAMAI | FASTER FORWARDTM
  • 31. ©2017 AKAMAI | FASTER FORWARDTM Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.Thank you.