Last $71.08 USD
Change Today -0.01 / -0.01%
Volume 93.1K
AKAM On Other Exchanges
Symbol
Exchange
NASDAQ GS
Frankfurt
As of 9:49 AM 03/6/15 All times are local (Market data is delayed by at least 15 minutes).

akamai technologies inc (AKAM) Key Developments

Akamai Technologies, Inc. Unveils Emerging Mobile Business Unit to Address Needs of Mobile Network Operators and Mobile Device Manufacturers

Akamai Technologies, Inc. announced the formation of a new business unit intended to design and develop new technologies to directly address the needs of mobile network operators (MNO) and mobile device manufacturers. The new organization, headed by Vice President and General Manager, Lior Netzer, was created to serve as a center of excellence for inventing, incubating, and launching new mobile products designed for mobile networks and device manufacturers; as well as develop new mobile edge technologies intended to enhance and differentiate existing Akamai products through tighter integration with mobile networks. One of the first innovations being introduced by the Emerging Mobile Business Unit is the Akamai Mobile Edge (AME). AME is designed to simplify the integration of the mobile ecosystem through a single interface that externalizes valuable network assets to third-party applications and mobile web development. The approach is intended to allow MNOs to more easily develop new and smarter mobile CDN services by becoming more content-aware and to allow Internet services to more intelligently deliver content by becoming network and device-aware.

Akamai Technologies, Inc. Releases New Cybersecurity Threat Advisory in Collaboration with PhishLabs' R.A.I.D

Akamai Technologies, Inc. released, through the company's Prolexic Security Engineering & Research Team (PLXsert) in collaboration with PhishLabs' R.A.I.D (Research, Analysis, and Intelligence Division), a new cybersecurity threat advisory. The advisory alerts enterprises and Software-as-a-Service (SaaS) providers of attackers using Joomla servers with a vulnerable Google Maps plugin installed as a platform for launching distributed denial of service (DDoS) attacks. Vulnerability in Google Maps plugin for Joomla enables DDoS attacks: A known vulnerability in a Google Maps plugin for Joomla allows the plugin to act as a proxy. A proxy is an intermediary server that processes a request and returns the result on behalf of someone else. The vulnerable Google Maps plugin allows Joomla servers that use it to be used as a proxy. Attackers spoof (fake) the source of the requests, causing the results to be sent from the proxy to someone else their denial of service target. The true source of the attack remains unknown, because the attack traffic appears to come from the Joomla servers. With cooperation from PhishLabs' R.A.I.D, PLXsert matched DDoS signature traffic originating from multiple Joomla sites, which indicates vulnerable installations are being used en masse for reflected GET floods, a type of DDoS attack. Observed attack traffic and data suggest the attack is being offered on known DDoS-for-hire sites. PLXsert was able to identify more than 150,000 potential Joomla reflectors on the Internet. Although many of the servers appear to have been patched, reconfigured, locked or have had the plugin uninstalled, others remain vulnerable to use in this DDoS attack. PLXsert mitigated a DDoS attack of this type on behalf of an Akamai customer in November. The majority of the top attacking IP addresses originated from Germany. The same IP addresses that participated in this attack have participated in DDoS attacks against other Akamai customers in the industries of hosting, entertainment and consumer goods. Multi-layered DDoS mitigation protects against reflection DDoS attacks: Refection-based DDoS attacks of many types are popular at this time. In the fourth quarter of 2014, Akamai's PLXsert observed 39% of all DDoS attack traffic employed reflection techniques. Reflection DDoS attacks each take advantage of an Internet protocol or application vulnerability that allows DDoS attackers to reflect malicious traffic off a third-party server or device, hiding their identities and amplifying the amount of attack traffic in the process. Cloud-based DDoS attack mitigation can combat this problem to protect organizations from malicious traffic. Edge-based security and scrubbing centers stop DDoS attack traffic long before it affects a client's website or data center. In the advisory, PLXsert shares its analysis and details, including: Use of the GET flood in Joomla reflection; What to look for: Three sample payloads; Attacks from the DAVOSET DDoS tool; Attacks from the UFONet DDoS tool; GET flood requests observed during an attack; Geographical distribution of source traffic; Three DDoS mitigation procedures to stop DDoS attacks of this type.

Akamai Technologies, Inc. Presents at Morgan Stanley 2015 Technology, Media & Telecom Conference, Mar-04-2015 04:15 PM

Akamai Technologies, Inc. Presents at Morgan Stanley 2015 Technology, Media & Telecom Conference, Mar-04-2015 04:15 PM. Venue: The Palace Hotel, 2 New Montgomery Street, San Francisco, CA 94105, United States. Speakers: Wilfredo M. Tejada, Senior Vice President and General Manager of Emergine Products Division.

Akamai Technologies, Inc. - Shareholder/Analyst Call

To discuss key company priorities and may provide forward looking financial guidance during the presentation

Toshiba Corporation Semiconductor & Storage Products Company Selects Akamai Technologies Inc.'s Web Performance Solutions

Akamai Technologies Inc. has announced that Toshiba Corporation Semiconductor & Storage Products Company has selected Akamai's web performance solutions to improve access-speed issues in conjunction with the consolidation of the company's global websites. To speed up user access and website performance, Toshiba Corporation Semiconductor & Storage Products Company chose Akamai's Ion solution that delivered dramatic results once deployed. Overall, website performance and load time has improved ten-fold on average, compared to pre-deployment load times. Akamai's Ion suite tightly integrates web delivery, access acceleration, and other optimization technologies to automatically optimize visitors' web experience in real time based on situational variables from network conditions to user device, location, and browser. Ion is designed to deliver fast web experiences: It simplifies ever-more-complex web delivery while ensuring high availability and security, and its scalability allows it to accommodate any peak-time load.

 

Stock Quotes

Market data is delayed at least 15 minutes.

Company Lookup
Recently Viewed
AKAM:US $71.07 USD -0.02

AKAM Competitors

Market data is delayed at least 15 minutes.

Company Last Change
Broadridge Financial Solutions Inc $53.17 USD -0.27
Citrix Systems Inc $61.92 USD -0.10
F5 Networks Inc $118.91 USD -0.31
Red Hat Inc $67.77 USD -0.21
VeriSign Inc $64.27 USD -0.12
View Industry Companies
 

Industry Analysis

AKAM

Industry Average

Valuation AKAM Industry Range
Price/Earnings 38.5x
Price/Sales 6.4x
Price/Book 4.3x
Price/Cash Flow 34.7x
TEV/Sales 5.8x
 | 

Sponsored Financial Commentaries

Sponsored Links

Report Data Issue

To contact AKAMAI TECHNOLOGIES INC, please visit . Company data is provided by Capital IQ. Please use this form to report any data issues.

Please enter your information in the following field(s):
Update Needed*

All data changes require verification from public sources. Please include the correct value or values and a source where we can verify.

Your requested update has been submitted

Our data partners will research the update request and update the information on this page if necessary. Research and follow-up could take several weeks. If you have questions, you can contact them at bwwebmaster@businessweek.com.