Akamai, IBM team for cloud security

Akamai, IBM team for cloud security

Networks Asia Staff  |   November 01, 2013
Networks Asia
IBM has announced a new cloud solution that combines software analytics and cloud security services to fend off web-based Distributed Denial of Services (DDoS) attacks for organizations doing business on the web and in the cloud. The new software and services are based on a partnership with Akamai.
 
Based on daily monitoring of security for more than 4,000 thousand clients, IBM has determined that DDoS attacks are on the rise. The average large company must filter through 1,400 cyber attacks weekly according to the IBM Cyber Security Intelligence Index.
 
But many organizations do not have the on-site expertise or the right IT skills and tools required to combat them. Also, many do not have an incident response program in place or rely on existing programs that are out of date, not regularly tested or recently updated to address the growing exponential threats.
 
As part of the cloud solution, IBM will integrate Akamai’s always-on cloud-based web security solution, Kona Site Defender, with IBM’s Cloud Security Services portfolio.
 
The companies will also share security intelligence insights gained by applying business analytics to security monitoring data to better detect threats, identify security risks and areas of noncompliance and set priorities for remediation.
Source: 
Networks Asia Staff

Bigbox

TelcoStrat 288

TELCO STRATEGIES CONFERENCE
May 7-8, Jakarta
Join telco CxOs from around Asia to discuss:
• Changing the way telcos operate
• New service offerings
• Restructuring for innovation
See the conference agenda >>

Transmode's Sten Nordell explains why Asia is ahead of the game in mobile fronthaul, and how WDM-PON’s time has finally come

SignUpTAenews

Frontpage Content by Category with Image

Activists petition for the withdrawal of the Newborn-to-Toddler Apptivity Seat

 

Telecomasia.net full website

© 2012 Questex Asia Ltd., a Questex Media Group company. All rights reserved. Reproduction in whole or in part is prohibited. Please send any technical comments or questions to our webmaster.