akamai technologies inc (AKAM) Key Developments
Akamai Technologies, Inc. Unveils Emerging Mobile Business Unit to Address Needs of Mobile Network Operators and Mobile Device Manufacturers
Feb 26 15
Akamai Technologies, Inc. announced the formation of a new business unit intended to design and develop new technologies to directly address the needs of mobile network operators (MNO) and mobile device manufacturers. The new organization, headed by Vice President and General Manager, Lior Netzer, was created to serve as a center of excellence for inventing, incubating, and launching new mobile products designed for mobile networks and device manufacturers; as well as develop new mobile edge technologies intended to enhance and differentiate existing Akamai products through tighter integration with mobile networks. One of the first innovations being introduced by the Emerging Mobile Business Unit is the Akamai Mobile Edge (AME). AME is designed to simplify the integration of the mobile ecosystem through a single interface that externalizes valuable network assets to third-party applications and mobile web development. The approach is intended to allow MNOs to more easily develop new and smarter mobile CDN services by becoming more content-aware and to allow Internet services to more intelligently deliver content by becoming network and device-aware.
Akamai Technologies, Inc. Releases New Cybersecurity Threat Advisory in Collaboration with PhishLabs' R.A.I.D
Feb 25 15
Akamai Technologies, Inc. released, through the company's Prolexic Security Engineering & Research Team (PLXsert) in collaboration with PhishLabs' R.A.I.D (Research, Analysis, and Intelligence Division), a new cybersecurity threat advisory. The advisory alerts enterprises and Software-as-a-Service (SaaS) providers of attackers using Joomla servers with a vulnerable Google Maps plugin installed as a platform for launching distributed denial of service (DDoS) attacks. Vulnerability in Google Maps plugin for Joomla enables DDoS attacks: A known vulnerability in a Google Maps plugin for Joomla allows the plugin to act as a proxy. A proxy is an intermediary server that processes a request and returns the result on behalf of someone else. The vulnerable Google Maps plugin allows Joomla servers that use it to be used as a proxy. Attackers spoof (fake) the source of the requests, causing the results to be sent from the proxy to someone else their denial of service target. The true source of the attack remains unknown, because the attack traffic appears to come from the Joomla servers. With cooperation from PhishLabs' R.A.I.D, PLXsert matched DDoS signature traffic originating from multiple Joomla sites, which indicates vulnerable installations are being used en masse for reflected GET floods, a type of DDoS attack. Observed attack traffic and data suggest the attack is being offered on known DDoS-for-hire sites. PLXsert was able to identify more than 150,000 potential Joomla reflectors on the Internet. Although many of the servers appear to have been patched, reconfigured, locked or have had the plugin uninstalled, others remain vulnerable to use in this DDoS attack. PLXsert mitigated a DDoS attack of this type on behalf of an Akamai customer in November. The majority of the top attacking IP addresses originated from Germany. The same IP addresses that participated in this attack have participated in DDoS attacks against other Akamai customers in the industries of hosting, entertainment and consumer goods. Multi-layered DDoS mitigation protects against reflection DDoS attacks: Refection-based DDoS attacks of many types are popular at this time. In the fourth quarter of 2014, Akamai's PLXsert observed 39% of all DDoS attack traffic employed reflection techniques. Reflection DDoS attacks each take advantage of an Internet protocol or application vulnerability that allows DDoS attackers to reflect malicious traffic off a third-party server or device, hiding their identities and amplifying the amount of attack traffic in the process. Cloud-based DDoS attack mitigation can combat this problem to protect organizations from malicious traffic. Edge-based security and scrubbing centers stop DDoS attack traffic long before it affects a client's website or data center. In the advisory, PLXsert shares its analysis and details, including: Use of the GET flood in Joomla reflection; What to look for: Three sample payloads; Attacks from the DAVOSET DDoS tool; Attacks from the UFONet DDoS tool; GET flood requests observed during an attack; Geographical distribution of source traffic; Three DDoS mitigation procedures to stop DDoS attacks of this type.
Akamai Technologies, Inc. Presents at Morgan Stanley 2015 Technology, Media & Telecom Conference, Mar-04-2015 04:15 PM
Feb 23 15
Akamai Technologies, Inc. Presents at Morgan Stanley 2015 Technology, Media & Telecom Conference, Mar-04-2015 04:15 PM. Venue: The Palace Hotel, 2 New Montgomery Street, San Francisco, CA 94105, United States. Speakers: Wilfredo M. Tejada, Senior Vice President and General Manager of Emergine Products Division.
Akamai Technologies, Inc. - Shareholder/Analyst Call
Feb 19 15
To discuss key company priorities and may provide forward looking financial guidance during the presentation
Toshiba Corporation Semiconductor & Storage Products Company Selects Akamai Technologies Inc.'s Web Performance Solutions
Feb 18 15
Akamai Technologies Inc. has announced that Toshiba Corporation Semiconductor & Storage Products Company has selected Akamai's web performance solutions to improve access-speed issues in conjunction with the consolidation of the company's global websites. To speed up user access and website performance, Toshiba Corporation Semiconductor & Storage Products Company chose Akamai's Ion solution that delivered dramatic results once deployed. Overall, website performance and
load time has improved ten-fold on average, compared to pre-deployment load times. Akamai's Ion suite tightly integrates web delivery, access acceleration, and other optimization technologies to automatically optimize visitors' web experience in real time based on situational variables from network conditions to user device, location, and browser. Ion is designed to deliver fast web experiences: It simplifies ever-more-complex web delivery while ensuring high availability and security, and its scalability allows it to accommodate any peak-time load.