Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Akamai Public Sector Roundtable, April 2018

Zoe Latchford
April 27, 2018
110

Akamai Public Sector Roundtable, April 2018

Zoe Latchford

April 27, 2018
Tweet

Transcript

  1. ©2017 AKAMAI | FASTER FORWARDTM Agenda 12:00 Roundtable 14:00 NOCC

    Tour 14:30 Close UK Cloud Computing – where are we today? Sue Daley, Head of Cloud, Data Analytics, and AI, TechUK Cloud Security Scott Helme, Security Researcher, Entrepreneur, and International Speaker Security Threat Landscape Jay Coley, Senior Director – Security Planning and Strategy, Akamai Technologies
  2. Key issues facing the cloud market and industry • Common

    themes and issues facing cloud industry and users • Market specific issues facing Cloud computing
  3. Cloud 2020 1.Building trust in the security of cloud 2.Interoperability

    of cloud systems 3.Communications infrastructure that is cloud ready and able 4.Public sector adoption – confident cloud customers 5.Culture change 6.Supportive regulatory and legal environment
  4. Moving the UK Cloud Market Forward • techUK Cloud Champions

    Campaign • Cloud Leadership Committee • Cloud Security WG – workshops • Collecting Cloud adoption case studies • Cloud Skills Roundtable
  5. • By 2021, 94 percent of workloads and compute instances

    will be processed by cloud data centers; 6 percent will be processed by traditional data centers. • By 2021, 73 percent of the cloud workloads and compute instances will be in public cloud data centers. • By 2021, 27 percent of the cloud workloads and compute instances will be in private cloud data centers. • Enterprise and government organizations are moving from test environments to placing more of their mission-critical workloads and compute instances into the cloud. Source: https://www.cisco.com/c/en/us/solutions/collateral/service-provider/global-cloud-index-gci/white-paper-c11-738085.html
  6. • 7,000,000,000+ reports per month received and processed • 10TB+

    of inbound bandwidth per month • 70,000,000+ unique endpoints sending reports
  7. How do you deliver on such enormous expectations? You need

    a cloud Security platform. • 100 percent uptime SLA • Resilient, predictable performance • Intelligent routing and acceleration • Layered, cloud-based security • Experience integrity
  8. MEDIA DELIVERY Consumers expect flawless multi- channel digital experiences. Our

    next-generation CDN services deliver the highest quality media at scale. The Akamai Intelligent Platform. CLOUD SECURITY Protect against website, web app attacks, malware, phishing, data exfiltration, bots, DNS, and other advanced threats – keeping data safe. EXPERTISE 1,900+ experts ready to support you with strategic expertise, 24/7 proactive monitoring and responsive troubleshooting. WEB PERFORMANCE We give you the expertise and proven technology to provide the customers with consistent, fast, secure web experiences.
  9. Top external attack vectors BUSINESS RISK 11% 18% 20% 22%

    28% 34% 37% 37% 42% Exploitation of lost/stolen… Mobile malware DNS Strategic web… DDoS Web application (SQL… User interaction… Use of stolen credentials… Software vulnerability… Source: The State of Network Security: 2016-2017, Forrester, January 2017
  10. Compared to Q4 2016 (Year Over Year) 14%é Total DDoS

    attacks 14%é Infrastructure layer (3 & 4) attacks 4%é Reflection-based attacks 22%é Application layer attacks
  11. DDoS Attacks Per Target, Q1-Q4 2017 Number of DDoS Attacks

    Faced by Top Target Organization in Q4 512
  12. Turn it up to 11 :: The amplification Attacker spoofs

    target IP 15 bytes of data Each device amplifies by X amount 1.35Tbps of attack traffic 1. Attacker spoof target requests and makes a memcached request to vulnerable servers. 2. Upon receipt of a memcached get request, each device send requested data over the wire in an uninterrupted stream. 3. Targeted IP address receives all UDP on port 11211 with the attacker requested memcached data
  13. Compared to Q4 2016 (Year Over Year) 10%é Total web

    application attacks 31%é Attacks sourcing from the U.S. (top source country) 10%é SQLi attacks
  14. Credential stuffing Protecting customer and employee accounts and minimizing web

    fraud ü ü Driving online requirements BUSINESS INITIATIVES Availability Ensuring revenue-generating websites are always available and accessible 24 Cloud Moving business and consumer-facing applications to public or hybrid clouds Agile development Enable development teams to rapidly create, update, and deploy applications Mobile Majority of online transactions today are conducted through mobile devices Brand protection Prevent security incidents that impact brand equity and customer trust ü
  15. Partner with Akamai SECURITY STRATEGY Analytics Granular visibility into DDoS,

    web attack, and bot traffic through a single interface Threat intelligence Prioritize security resources and efforts using Akamai’s visibility into the latest threats SIEM Ingest security data into your SIEM tool for greater awareness across all security solutions Open APIs Better integrate security with your applications and software development lifecycle
  16. Single data center API Business initiatives increase ATTACK SURFACE API

    Distributed footprint Cloud provider Hosted applications Applications Multiple data centers Remote access API API
  17. Akamai cloud delivery PLATFORM Cloud perimeter adapts to your application

    infrastructure and stops attacks in the cloud Extend the application infrastructure with global scalability & resiliency Integrated security solutions on a single global platform Data center Cloud provider Remote office >2400 data centers 70+ Tbps capacity 100% uptime SLA Web security Infrastructure protection Access management
  18. Our core capabilities EXPERTISE Support Services Security § 24 x

    365 technical support § Fast-response SLAs § Preventative support § Personalized contacts § Comprehensive training § Global team of technology & industry experts § Proactive monitoring § Alerting & mitigation § Performance optimization § 24 x 365 monitoring and mitigation § 5 global locations staffed by 100+ security experts § 200+ security certifications across team