By Salvatore Genovese | Article Rating: |
|
December 15, 2009 05:15 PM EST | Reads: |
7,891 |

Cloud Computing Expo - Akamai Technologies today expanded its cloud-based suite of security capabilities with the introduction of its Web Application Firewall managed service. Implemented on Akamai’s EdgePlatform, the service provides a scalable edge defense system for blocking Web application attacks in the cloud.
Based on the open source ModSecurity Core Rule Set supported by Breach Security, the Akamai Web Application Firewall service is designed to protect against the most common and harmful types of attacks and exploitation techniques such as SQL Injection, Cross Site Scripting (XSS) and other Open Web Application Security Project (OWASP) Top-10 attacks.
The Akamai Web Application Firewall service provides customers with a unique approach to easily and economically defend their Web applications. With no hardware to manage or maintain, customers manage their own security rule set through Akamai’s customer portal. Additionally, the Akamai Web Application Firewall service helps enable Payment Card Industry (PCI) Data Security Standard compliance.
As enterprises have increasingly migrated from the desktop to the Web – relying more and more on the Internet for mission-critical data and operations – the scale and severity of attacks launched on Web sites and applications have continued to grow. Estimates show that cyber crime now cost businesses approximately $1 trillion a year.1 As research reveals, the enormity of this expense is due in large part to the fact that more than 95 percent of corporate Web applications have severe vulnerabilities.2
“While threats to network and information security will always exist, the complexity and scale of cyber attacks is exploding, forcing enterprises to face the daunting challenge of defending an increasingly porous perimeter,” said Tom Leighton, co-founder and chief scientist, Akamai. “Cloud-based security offers an innovative approach to helping organizations overcome the limitations of traditional perimeter solutions by adding a globally-distributed layer to their defenses. We believe our service is also essential for cloud computing, as infrastructure is shared across multiple customers. When leveraging shared computing resources, it is vital that your application does not become compromised by an attack directed at another enterprise.”
Published December 15, 2009 Reads 7,891
Copyright © 2009 SYS-CON Media, Inc. — All Rights Reserved.
Syndicated stories and blog feeds, all rights reserved by the author.
More Stories By Salvatore Genovese
Salvatore Genovese is a Cloud Computing consultant and an i-technology blogger based in Rome, Italy. He occasionally blogs about SOA, start-ups, mergers and acquisitions, open source and bleeding-edge technologies, companies, and personalities. Sal can be reached at hamilton(at)sys-con.com.
Feb. 22, 2019 07:00 PM EST |
By Liz McMillan ![]() Feb. 22, 2019 06:00 PM EST Reads: 4,489 |
By Elizabeth White Feb. 22, 2019 05:15 PM EST |
By Zakia Bouachraoui Feb. 22, 2019 04:15 PM EST |
By Zakia Bouachraoui Feb. 22, 2019 04:00 PM EST |