CDN Breakthroughs
2.5K views | +0 today
Follow
CDN Breakthroughs
Monitoring innovations in CDN, CDN Federation, Cloud, SDN, Security, Caching, Load Balancing, Video/DRM delivery strategies & tools
Curated by Nicolas Weil
Your new post is loading...
Your new post is loading...
Scooped by Nicolas Weil
Scoop.it!

EdgeCast Going After Akamai’s Commerce Business With A Dedicated PCI Network For Internet Retailers

EdgeCast Going After Akamai’s Commerce Business With A Dedicated PCI Network For Internet Retailers | CDN Breakthroughs | Scoop.it

Dynamic content delivery has been available for a number of years and beyond just basic caching functionality, solutions in the market now focus on route, connection and content optimization. As online commerce sites have grown more complex, they rely on every feature and function of a CDN to quickly and optimally serve users. More importantly, these sites have to cater to higher user expectations across an ever-changing set of devices.

 

EdgeCast new solution, launched last month, which they call “Transact”, combines the concept of a purpose-built platform for commerce with PCI Compliance, front end optimization, more efficient caching and what they say are faster SSL connections.

more...
No comment yet.
Scooped by Nicolas Weil
Scoop.it!

AWS CloudHSM : dedicated Hardware Security Module (HSM) appliances within the AWS cloud

AWS CloudHSM : dedicated Hardware Security Module (HSM) appliances within the AWS cloud | CDN Breakthroughs | Scoop.it

AWS CloudHSM Functionality

 

With AWS CloudHSM you can:

- Protect and store your cryptographic keys with industry standard, tamper-resistant HSM appliances. No one but you has access to your keys (including Amazon administrators who manage and maintain the appliance).

- Use your most sensitive and regulated data on Amazon EC2 without giving applications direct access to your data's encryption keys.

- Store and access data reliably from your applications that demand highly available and durable key storage and cryptographic operations.

- Use AWS CloudHSM in conjunction with your compatible on-premise HSMs to replicate keys among on-premise HSMs and CloudHSMs. This increases key durability and makes it easy to migrate cryptographic applications from your datacenter to AWS.

Nicolas Weil's insight:

A potentially disruptive service for ensuring highest security of video source contents in cloud processing workflows.

more...
No comment yet.
Scooped by Nicolas Weil
Scoop.it!

Akamai Raises the Bar for Web Security with Enhancements to Kona Site Defender [PR]

Akamai Raises the Bar for Web Security with Enhancements to Kona Site Defender [PR] | CDN Breakthroughs | Scoop.it

Included in the new version of Kona Site Defender are upgraded Web Application Firewall (WAF) capabilities and network layer controls, new user validation capabilities and improved configuration and automation tools that speed both initial deployment and response time to changing attacks. Further, Akamai has developed Application Programming Interfaces (APIs) and other modifications to Kona Site Defender. These are designed to make the technology easier to use by Managed Security Services Providers (MSSP) as well as to facilitate tighter integration with existing on-premises security technology. 

Kona Site Defender is an always-on cloud-based web security solution designed to protect an enterprise's most critical online business functions against attacks that can result in millions of dollars in lost transactions and business productivity each year, and even greater harm to brand value and reputation. Using the Akamai Intelligent Platform™ as its foundation, the solution offers highly flexible and scalable protection – that does not negatively impact performance – to customers against a variety of attack vectors including DDoS, as well as web application attacks such as SQL injection, Cross Site Scripting and others. 

Enhancements to Kona Site Defender include:

- Akamai Common Rules set

- New Rate Control Capabilities

- User Validation Capabilities

- Cloud Security Intelligence

- Site Assessment and WAF Rule Update Services

- APIs and MSSP Flexibility

more...
No comment yet.
Scooped by Nicolas Weil
Scoop.it!

Storage, Security Products Take Center Stage At AWS Summit 2013

Storage, Security Products Take Center Stage At AWS Summit 2013 | CDN Breakthroughs | Scoop.it
Storing, sharing and securing data in the cloud is constantly evolving as clients look for new ways to take advantage of the cloud to add flexibility to and remove costs from their IT infrastructures.The Amazon Web Services (AWS) Summit 2013, held this week in San Francisco, is bringing together several of Amazon's technology partners to showcase a variety of new ways to move and secure their data in the cloud, and as it is migrating to and from the cloud or between clouds.
more...
No comment yet.
Scooped by Nicolas Weil
Scoop.it!

5 years after major DNS flaw is discovered, few US companies have deployed long-term fix

5 years after major DNS flaw is discovered, few US companies have deployed long-term fix | CDN Breakthroughs | Scoop.it

Five years after the disclosure of a serious vulnerability in the Domain Name System dubbed the Kaminsky bug, only a handful of U.S. ISPs, financial institutions or e-commerce companies have deployed DNS Security Extensions (DNSSEC ) to alleviate this threat.

 

In 2008, security researcher Dan Kaminsky described a major DNS flaw that made it possible for hackers to launch cache poisoning attacks, where traffic is redirected from a legitimate website to a fake one without the website operator or end user knowing.

 

While DNS software patches are available to help plug the Kaminsky hole, experts agree that the best long-term fix is DNSSEC, which uses digital signatures and public-key encryption to allow websites to verify their domain names and corresponding IP addresses and prevent man-in-the-middle attacks.

more...
No comment yet.