Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

2/25/2013
10:28 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Akamai Raises Bar For Web Security With Enhancements To Kona Site Defender

Included in the new version of Kona Site Defender are upgraded Web Application Firewall (WAF) capabilities and network layer controls

SAN FRANCISCO, Feb. 25, 2013 /PRNewswire/ -- RSA® Conference 2013 (Booth #1630)

- Akamai®Technologies, Inc. (NASDAQ: AKAM), the leading cloud platform for delivering secure, high-performing user experiences to any device, anywhere, today unveiled several feature upgrades to the company's Kona Site Defender web security solution. The enhancements are designed to add greater intelligence, flexibility and simplicity to the defense of web site and application attacks, giving businesses the tools to help organizations of all types better protect web sites and applications from an ever changing threat landscape.

Included in the new version of Kona Site Defender are upgraded Web Application Firewall (WAF) capabilities and network layer controls, new user validation capabilities and improved configuration and automation tools that speed both initial deployment and response time to changing attacks. Further, Akamai has developed Application Programming Interfaces (APIs) and other modifications to Kona Site Defender. These are designed to make the technology easier to use by Managed Security Services Providers (MSSP) as well as to facilitate tighter integration with existing on-premises security technology.

Kona Site Defender is an always-on cloud-based web security solution designed to protect an enterprise's most critical online business functions against attacks that can result in millions of dollars in lost transactions and business productivity each year, and even greater harm to brand value and reputation.

Using the Akamai Intelligent Platform(TM) as its foundation, the solution offers highly flexible and scalable protection - that does not negatively impact performance - to customers against a variety of attack vectors including DDoS, as well as web application attacks such as SQL injection, Cross Site Scripting and others.

Enhancements to Kona Site Defender include:

-- Akamai Common Rules: In addition to the baseline WAF security offered by

the OWASP ModSecurity Core Rule Set (CRS), organizations can now benefit

from the extended security offered by the newly introduced Akamai Common

Rules set. Each time the Akamai threat intelligence team experiences a

new attack tool or a new version of an existing attack tool used against

the platform, the company develops a rule to counter the attack. These

rules are uniquely available to Akamai customers. To date, Akamai has

developed and implemented rules to counter attacks such as LOIC (Low

Orbit Ion Cannon) and HOIC (High Orbit Ion Cannon), among others.

-- New Rate Control Capabilities: To help determine if anomalous traffic is

being generated by users accessing the Internet from behind a proxy

server and if that traffic is legitimate or malicious, Kona Site

Defender features upgraded rate control capabilities. For example, IP

addresses that might previously have been flagged as being the source of

malicious content based on request volume can now easily be identified

as a web proxy. This increased security intelligence is designed to

enable customers to make better decisions about which traffic to block

and which traffic to let through to their sites or web applications.

Improved protection against slow-moving DDoS attack vectors better

allows customers to fight "resource starvation" attacks that bring down

sites and applications by tying up CPU power versus simply flooding with

massive traffic levels.

-- User Validation Capabilities: New to Kona Site Defender, the user

validation module provides a way to better understand who or what is

generating traffic aimed at your web site or web application. If traffic

is identified as potentially malicious, the browser is redirected to a

JavaScript confirmation page. If the browser passes, the client request

is further processed. The user validation module helps reduce an

enterprise's exposure to machine-based attacks.

-- Cloud Security Intelligence: The massive scale of the Akamai Intelligent

Platform gives the company tremendous visibility into emerging attack

vectors and other malicious activity that can negatively impact

organizations doing business online. The intelligence derived from the

processing and analysis of aggregated security data is designed to make

Akamai services simpler, more automated and more efficient.

-- Site Assessment and WAF Rule Update Services: To help identify potential

site vulnerabilities and develop appropriate web security strategies,

organizations can now engage with Akamai security experts for web site

scanning and analysis. This one time professional services engagement is

intended to provide customers with a deeper understanding of potential

exposure to attack and options for mitigating risk. In addition,

customers now can work with Akamai's professional services organization

for ongoing WAF rules updating and tuning.

-- APIs and MSSP Flexibility: Understanding that customers may wish to use

Kona Site Defender in conjunction with existing on-premises appliances

or through relationships with MSSPs, Akamai is developing APIs and other

modifications intended to ease integration with these environments. The

APIs will enable on-premises security controls to tightly integrate with

the DDoS mitigation functionalities delivered by Kona Site Defender. The

ability for MSSPs to include Kona Site Defender in their portfolio of

supported technology gives customers greater choice in how they deploy

and take the best advantage of the solution according to their unique

requirements.

"The threat landscape is constantly evolving and web security professionals need a solution that can keep pace with the array of challenges they face every day,"

explained John Summers, vice president, Security Business, Akamai. "Customers that have deployed Kona Site Defender have been able to deal effectively with these new adversaries, new tools and new attacks. Mitigating the Operation Ababil attacks that began in September 2012 is just one example of our success."

Kona Site Defender is part of the Akamai Kona Security Solutions family. Akamai customers across industries are using Kona Security Solutions to better protect their valuable web sites and web applications by extending the security perimeter outside the data-center and to provide protection from the increasing frequency, scale and sophistication of web attacks. To date, 27 of the Fortune 100, 37 of the Internet Retailer 100 (including 10 of the top 20) and 27 of the Mobile 100 use Kona Security Solutions to protect their online businesses.

For more information about Kona Security Solutions please visit http://www.akamai.com/html/solutions/kona-solutions.html.

About Akamai

Akamai® is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the Company's solutions is the Akamai Intelligent Platform(TM) providing extensive reach, coupled with unmatched reliability, security, visibility and expertise.

Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter.

Akamai Statement Under the Private Securities Litigation Reform Act This release contains information about future expectations, plans and prospects of Akamai's management that constitute forward-looking statements for purposes of the safe harbor provisions under The Private Securities Litigation Reform Act of 1995. Actual results may differ materially from those indicated by these forward-looking statements as a result of various important factors including, but not limited to, failure of Akamai services to operate as expected or to address intended market needs, a failure of Akamai's network infrastructure, and other factors that are discussed in Akamai's Annual Report on Form 10-K, quarterly reports on Form 10-Q, and other documents periodically filed with the SEC.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6852
PUBLISHED: 2019-11-20
A CWE-200: Information Exposure vulnerability exists in Modicon Controllers (M340 CPUs, M340 communication modules, Premium CPUs, Premium communication modules, Quantum CPUs, Quantum communication modules - see security notification for specific versions), which could cause the disclosure of FTP har...
CVE-2019-6853
PUBLISHED: 2019-11-20
A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server.
CVE-2013-2092
PUBLISHED: 2019-11-20
Cross-site Scripting (XSS) in Dolibarr ERP/CRM 3.3.1 allows remote attackers to inject arbitrary web script or HTML in functions.lib.php.
CVE-2013-2093
PUBLISHED: 2019-11-20
Dolibarr ERP/CRM 3.3.1 does not properly validate user input in viewimage.php and barcode.lib.php which allows remote attackers to execute arbitrary commands.
CVE-2015-3166
PUBLISHED: 2019-11-20
The snprintf implementation in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 does not properly handle system-call errors, which allows attackers to obtain sensitive information or have other unspecified impact via unknown vectors, as d...