Intelligent CIO Middle East Issue 24 | Page 14

LATEST INTELLIGENCE AKAMAI CLOUD SECURITY SOLUTIONS: COMPARING APPROACHES FOR WEB, DNS, AND INFRASTRUCTURE SECURITY PRESENTED BY O rganisations today operate in a Faster Forward world. Over three billion people are connected to the Internet, often through multiple computing devices. People are spending a growing portion of their lives online – communicating, shopping, being entertained, and working. For both business and government organisations, this represents a significant shift in how they engage with their customers and employees. For these organisations, more of their daily activities now take place outside of the traditional office. They engage with customers and collaborate with co-workers over the Internet, performing financial transactions, transmitting sensitive business data, and communicating over public networks. Download whitepaper here To do this, they are moving more of their applications onto Internet-facing networks, so customers can shop 24x7 and employees can access the resources they need at any time in the global work day. As a result, attackers can more easily access a larger number of high- value corporate and government assets. Attackers have shifted their methods accordingly, developing new attacks that no 14 INTELLIGENTCIO longer rely purely on brute force to take a service offline, but rather probe for and then take advantage of application vulnerabilities to steal data or pursue financial gain. The threat landscape is constantly evolving, and organisations must evolve to keep pace with the constant stream of new attacks. However, the increasing pace of change in the last few years requires a revolutionary, not evolutionary, approach to security. When comparing different approaches to security, organisations should consider the strengths and weaknesses of each solution – not just how it performs against the attacks of today, but also how well it will respond to those of tomorrow. Beyond the traditional metrics of scale and performance, architecture and adaptability will also help determine the efficacy of any security solution over the long term. How well will the platform’s architecture lend itself to defending against new attacks that haven’t yet been discovered? And how quickly will it detect and identify those new attacks before it can mitigate them? n www.intelligentcio.com