LATEST INTELLIGENCE
AKAMAI CLOUD
SECURITY
SOLUTIONS:
COMPARING
APPROACHES FOR
WEB, DNS, AND
INFRASTRUCTURE
SECURITY
PRESENTED BY
O
rganisations today operate in a Faster
Forward world. Over three billion people
are connected to the Internet, often
through multiple computing devices. People
are spending a growing portion of their lives
online – communicating, shopping, being
entertained, and working. For both business
and government organisations, this represents
a significant shift in how they engage with
their customers and employees.
For these organisations, more of their daily
activities now take place outside of the
traditional office. They engage with customers
and collaborate with co-workers over the
Internet, performing financial transactions,
transmitting sensitive business data, and
communicating over public networks.
Download whitepaper here
To do this, they are moving more of their
applications onto Internet-facing networks, so
customers can shop 24x7 and employees can
access the resources they need at any time in
the global work day. As a result, attackers can
more easily access a larger number of high-
value corporate and government assets.
Attackers have shifted their methods
accordingly, developing new attacks that no
14
INTELLIGENTCIO
longer rely purely on brute force to take a service
offline, but rather probe for and then take
advantage of application vulnerabilities to steal
data or pursue financial gain.
The threat landscape is constantly evolving, and
organisations must evolve to keep pace with the
constant stream of new attacks.
However, the increasing pace of change in
the last few years requires a revolutionary, not
evolutionary, approach to security.
When comparing different approaches to
security, organisations should consider the
strengths and weaknesses of each solution –
not just how it performs against the attacks of
today, but also how well it will respond to those
of tomorrow.
Beyond the traditional metrics of scale and
performance, architecture and adaptability will
also help determine the efficacy of any security
solution over the long term. How well will the
platform’s architecture lend itself to defending
against new attacks that haven’t yet been
discovered? And how quickly will it detect
and identify those new attacks before it can
mitigate them? n
www.intelligentcio.com