文本描述
akamai’s [state of the internet]/ security
Q12016 report
[V
o
lu
m
e/ N
u
m
be
r]
FASTER FORWARD TO THE LATEST GLOBAL BROADBAND TRENDS
Download Akamai&39;s latest [state of the internet]/ connectivity report
DOWNLOAD THE
FULL REPORT
TAP
HEREakamai’s [state of the internet]/ security / Q12016/
akamai/StateOfTheInternet
[LETTER FROM THE EDITOR]
letter from the editor / Te
q12016 State of the Internet / Security Report
combines data from Akamai’s global infrastructure and the routed DDoS solution.
Te Akamai Intelligent Platform protects customers by being massively distributed,
providing several cloud security solutions, and having the ability to absorb attack
trafc closest to its origin. Akamai’s Cloud Security Intelligence (csi) data analysis
engine stores more than 2 petabytes (pb) of threat intelligence data. Tis includes 10
terabytes (tb) of application-layer attack data per day, for a rolling 30–45 days. We
have more than 70 heuristics to automatically query the stored data every hour. Te
insight we extract from the data feeds improvements to cloud security solutions
and our client intelligence engine.
Te routed DDoS solution is designed to protect customers by routing trafc to
our global scrubbing centers where experienced incident responders use a variety
of mitigation and monitoring tools to remove malicious trafc before passing clean
trafc to the customer network.
Each solution collects a distinct data set that represents a unique view of the Internet,
allowing us to compare diferent indicators of attack activity.
Te data in this report is based on attacks observed and mitigated by Akamai. Te
attack trends are afected by several factors, including increases in attack activity,
changes in the distribution of our customer base, the launch of new products, and
improvements to attack sensors.
Our threat landscape overview comprises an extensive review of the data, allowing
us to explore which industries among our customer base sufered the highest attack
volumes, which attack techniques and vectors were most common, where malicious
trafc originated, and how attack trends evolved.
。。。以上简介无排版格式,详细内容请下载查看