Professional Documents
Culture Documents
EXECUTIVE SUMMARY
Complexity and scale of attacks have exploded. Increased criminal talent level devoted to Internet. Distributed Denial-of-Service (DDoS) attacks jumped in size. Increasingly sophisticated malware and growing zombie armies. Traditional perimeter defense solutions not kept pace with growth. Enterprises currently have an arsenal of threat-specific tools.
24/07/2012
Cloud-based security services offer an innovative approach. Offers flexibility across a broad set of protective capabilities. Allows companies to leverage just-in-time defenses.
24/07/2012
Traditional Approaches To Perimeter Security Are No Longer Sufficient: Organizations rely on firewalls, intrusion prevention systems, network scanning solutions. Traditional perimeter defense systems also tend to be rigid.
Cloud-based Perimeter Security Turning A Threat Into An Asset: Cloud-based security provides a critical layer to overcome limitations.
24/07/2012 (Akamai: Leveraging Cloud Security to Weather Threatening Storms) 5
24/07/2012
24/07/2012
CONCLUSION
Internet threats continue to multiply, businesses need to be more vigilant. Effective security requires a defense-in-depth approach. Cloud-based security offers scalability, flexibility, capacity planning, and cost. Akamais Edge Platform to securely and reliably deliver an aggregate of 500 billion Web interactions each day.
24/07/2012
THANK YOU
24/07/2012