Mais conteĂșdo relacionado Semelhante a Great Expectations - Dr. Tom Leighton, Akamai (20) Mais de Akamai Technologies (20) Great Expectations - Dr. Tom Leighton, Akamai2. Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
The Internet of Things
©2013 AKAMAI | FASTER FORWARDTM
3. Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
The Internet of Everything
©2013 AKAMAI | FASTER FORWARDTM
4. Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
The Hyperconnected World
©2013 AKAMAI | FASTER FORWARDTM
5. EVERYONE
AND EVERYTHING IS
GETTING CONNECTED
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
©2013 AKAMAI | FASTER FORWARDTM
6. Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
©2013 AKAMAI | FASTER FORWARDTM
8. Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
©2013 AKAMAI | FASTER FORWARDTM
9. The Web Fast, affordable
Instant Web The ultimate
must be IP access in the
performance
in video
secure
for any device, quality over
workplace and
anywhere
IP at scaleGrow revenue opportunities with fast, personalized
branch office
web experiences and manage complexity from peak
demand, mobile devices and data collection.
©2013 AKAMAI | FASTER FORWARDTM
10. GRAND CHALLENGE FOR PERFORMANCE
Instant Web performance for any device, anywhere
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
©2013 AKAMAI | FASTER FORWARDTM
11. The Performance Challenge
Time to Download
$
User
Expectations
$$$
Heavier
Content
3rd Party
Content
Complex
Experiences
Chatty
Protocols
Mobile
Congestion
©2013 AKAMAI | FASTER FORWARDTM
12. What Mobile Users Want
Ability to Purchase
or Place an order
Product
Information
Store Directions or
Operating Hours
Sites Loading in
5 Seconds or Less
50%
61%
74%
81%
©2013 AKAMAI | FASTER FORWARDTM
13. Keynote Commerce Index: Desktop vs. Mobile
TOP 30 DESKTOP
COMMERCE SITES*
TOP 30 MOBILE
COMMERCE SITES*
Seconds
to load
Seconds
to load
WE HAVEN'T SEEN 8 SECONDS SINCE 2001!
* As of September 29, 2013, Keynote
©2013 AKAMAI | FASTER FORWARDTM
14. Speed Matters: Conversion Rate vs. Load Time
Population
Conversion Rate (%)
Conversion Rate (%)
0-1
1-2
2-3
3-4
4-5
5-6
6-7
7-8
8-9
9-10
10-11
11+
Page Load Time (Sec)
Page Performance & Site Conversion â Feb 2012
©2013 AKAMAI | FASTER FORWARDTM
15. Featured Akamai Solutions: Aqua Ion & Terra Alta
DSA & WAA
2012
2013
âą Advanced Caching
âą Enhanced Mobile Protocol
âą Akamai Communication Protocols
âą Dynamic Page Caching
Avoid data theft
âą Akamai Routing
âą Pre-Fetching
âą Persistent Connections
âą Front-End Optimization (FEO)
â by extending the
and downtimeWebP
â data-center and
âą Akamai Instantperimeter outside the 3rd Party Decoupling
security
âą IPv6 Adaptation
âą EdgeStart
protect from increasing frequency, scale and
âą SHUTR
âą Real
sophistication of web attacks. User Monitoring (RUM)
âą Origin Health Reporting
âą Mobile Detection & Redirect
âą Instant Config
âą Device Characterization
âą Adaptive Image Compression
âą Cloud Balancer
©2013 AKAMAI | FASTER FORWARDTM
16. Featured Akamai Solutions: Aqua Ion & Terra Alta
DSA & WAA
2012
2013
âą Advanced Caching
âą Enhanced Mobile Protocol
âą Akamai Communication Protocols
âą Dynamic Page Caching
Avoid data theft
âą Akamai Routing
âą Pre-Fetching
âą Persistent Connections
âą Front-End Optimization (FEO)
â by extending the
and downtimeWebP
â data-center and
âą Akamai Instantperimeter outside the 3rd Party Decoupling
security
âą IPv6 Adaptation
âą EdgeStart
protect from increasing frequency, scale and
âą SHUTR
âą Real
sophistication of web attacks. User Monitoring (RUM)
âą Origin Health Reporting
âą Mobile Detection & Redirect
âą Instant Config
âą Device Characterization
âą Adaptive Image Compression
âą Cloud Balancer
©2013 AKAMAI | FASTER FORWARDTM
17. RUM Data: Across the Akamai Intelligent Platformâą
8
Seconds to onLoad
7
With Akamai DSA
6
With Aqua Ion
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
5
50%
4
3
Faster With Aqua Ion
2
1
0
9/16
9/17
9/18
9/19
9/20
9/21
9/22
9/23
9/24
14.5 million data points plotted
©2013 AKAMAI | FASTER FORWARDTM
18. RUM Data for Cellular Users
9
With Akamai DSA
7
Seconds to onLoad
8
With Aqua Ion
6
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
69%
5
4
3
Faster With Aqua Ion
2
1
0
9/16
9/17
9/18
9/19
9/20
9/21
9/22
9/23
9/24
©2013 AKAMAI | FASTER FORWARDTM
19. RUM Data: Performance Improvement In-Country
7
With Akamai DSA
Seconds to onLoad
6
With Aqua Ion
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
5
74%
4
3
Faster With Aqua Ion
2
1
Measurements taken from users
in Japan from origin in Tokyo
0
5/21
5/23
5/24
5/25
5/26
5/27
©2013 AKAMAI | FASTER FORWARDTM
20. Histogram from Real Users
With Akamai DSA
20%
With Aqua Ion
15%
% of Users
65k data points over 7 days
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
10%
5%
0%
0-1
1-2
2-3
3-4
4-5
5-6
6-7
7-8
8-9 9-10 10-11 11-12 12-13 13-14 14-15
Page Load Time (in Seconds)
©2013 AKAMAI | FASTER FORWARDTM
21. Histogram from Real Users
With Akamai DSA
20%
With Aqua Ion
15%
% of Users
65k data points over 7 days
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
10%
33%
5%
16%
0%
0-1
1-2
2-3
3-4
4-5
5-6
6-7
7-8
~1/2 as many
users over
8 seconds
8-9 9-10 10-11 11-12 12-13 13-14 14-15
Page Load Time (in Seconds)
©2013 AKAMAI | FASTER FORWARDTM
22. Histogram from Real Users
20%
With Akamai DSA
With Aqua Ion
% of Users
15%
65k data points over 7 days
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
49%
10%
~2x users
under 4 sec.
5%
26%
0%
0-1
1-2
2-3
3-4
4-5
5-6
6-7
7-8
8-9 9-10 10-11 11-12 12-13 13-14 14-15
Page Load Time (in Seconds)
©2013 AKAMAI | FASTER FORWARDTM
23. Grow revenue opportunities with fast, personalized
Assaf Kremer
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Product Manager,
Aqua Web Solutions
©2013 AKAMAI | FASTER FORWARDTM
24. Learn More
Who: Mike Afergan, Akamai
Aqua Web & Terra Enterprise
When: Thursday, 11:20AM â 12:00PM
Solutions: Transforming
Where: Woodrow Wilson
Your Business with
Amazing User-Experiences data theft and downtime by extending the
Avoid
on Any Device Anywhere
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
Commerce Keynote:
The Evolution of Web
Performance Measurement
and Optimization
Who: Steve Lerner, eBay
When: Thursday, 2:10 â 3:00PM
Where: Baltimore 1 â 2
©2013 AKAMAI | FASTER FORWARDTM
25. GRAND CHALLENGE FOR MEDIA
The ultimate in video quality over IP anytime, anywhere
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
©2013 AKAMAI | FASTER FORWARDTM
26. Quality Requires Bits
4K-UHD
HEVC/H.265
16,000-30,000
Kbps
50,000
COMPRESSED BIT RATE (Kbps)
8K-UHD
XEVC+?
50,000+ Kbps
40,000
30,000
20,000
QVGA
MPEG1
550
Kbps
VGA/SDTV
MPEG2-4
1,800 Kbps
Avoid data theft and downtime by extending the
HD-1080p
security perimeter outside the data-center and
AVC/H.264
7,500 Kbps
HD-720pprotect from increasing frequency, scale and
AVC/H.264
sophistication of web attacks.
3,500 Kbps
IP TODAY
10,000
0
2001
48%
CAGR
2004
25%
CAGR
2007
21%
CAGR
2011
75%
CAGR
2013
Future
©2013 AKAMAI | FASTER FORWARDTM
27. Future Demand
2.5B Primetime Viewers
x 10 Mbps
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
~25,000 Tbps
©2013 AKAMAI | FASTER FORWARDTM
28. The Scalability Challenge
Cloud Data Centers
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
©2013 AKAMAI | FASTER FORWARDTM
29. The Scalability Challenge
100 Major Networks
X 5 Tbps
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
500 Tbps
©2013 AKAMAI | FASTER FORWARDTM
30. The Scalability Challenge
2%
=
100 Major Networks
500 Tbps
X 5 Tbps
of what
25,000 Tbps
500 we need!
Tbps
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
©2013 AKAMAI | FASTER FORWARDTM
31. Akamaiâs Strategy Today:
Over 137,000 Servers Inside 1,100 Networks
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
©2013 AKAMAI | FASTER FORWARDTM
32. Akamaiâs Next-Gen Platform:
Multicast, Pre-Position Content and Client-Assisted Delivery
Akamai Software Moves into the Home
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
©2013 AKAMAI | FASTER FORWARDTM
33. Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
Kris Alexander
demand, mobile devices and data collection.
Chief Strategist,
Gaming and Devices
©2013 AKAMAI | FASTER FORWARDTM
34. Learn More
Learn
More
Connected
Home and 4K Demos
Avoid data theft and downtime by extending the
HAPPENING ALL WEEK security perimeter outside the data-center and
IN THE PARTNER PAVILION
protect from increasing frequency, scale and
sophistication of web attacks.
©2013 AKAMAI | FASTER FORWARDTM
35. Learn More
Who: Bill Wheaton, Akamai
Sola Media Solutions:
When: Thursday, 10:30 â 11:10AM
Making Quality Simple â for
Where: Annapolis 1 â 4
YOU! The Endless Pursuit of
Online Media Quality Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
Media Keynote:
Strategies for Successful
Media Delivery in High-Growth
Emerging Markets
Who: Bernardo Gonzalez, Televisa
When: Thursday, 2:10 â 3:00PM
Where: Baltimore 3 â 4
©2013 AKAMAI | FASTER FORWARDTM
36. Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
©2013 AKAMAI | FASTER FORWARDTM
37. GRAND CHALLENGE FOR SECURITY
The Web must be secure
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
©2013 AKAMAI | FASTER FORWARDTM
38. NO ONE
IS SAFE
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
©2013 AKAMAI | FASTER FORWARDTM
39. Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
©2013 AKAMAI | FASTER FORWARDTM
40. Attacks on Akamai Customers
Typical Attack Size
Large Attack Size
100â200 Gbps
Attacks are originating from
all geographies and are
moving between geographies
during the attack
Number of Attacks
3â10 Gbps
768
800
600
510
400
220
200
0
14
2009
2010
2011
2012
©2013 AKAMAI | FASTER FORWARDTM
41. Attacks are Varied and Sophisticated
Predictable Resource
Location 2%
Cross-Site Forgery 2%
Stolen Credentials 2%
Brute Force 3%
âą SQL Injection is the most
common attack type followed
by DoS attacks
âą Attack tools such as LOIC,
HOIC and SlowLoris evolve
rapidly and are easily available
Clickjacking 1%
Banking Trojan 3%
Unreported
37%
Denial
of Service
23%
Top WHID
Attacks in
2011
SQL Injection
27%
Source: Trustwave, Web Hacking Incident DB â 2012 report
©2013 AKAMAI | FASTER FORWARDTM
43. Security is no longer âjust an IT issueâ
74%
31%
$8MM
Of companies
experienced one or
more cyber attacks
in the past year
Of these
attacks resulted
in service
disruption
Is what each
breach costs on
average, and some
can cost up to $1B
©2013 AKAMAI | FASTER FORWARDTM
44. Traditional Solutions Are Insufficient
Datacenter
Devices
Carrier
Filtering
Cloud
Washing
Sufficient Capacity
Packet Inspection
Proactive vs. Reactive
Maintain Performance
©2013 AKAMAI | FASTER FORWARDTM
45. Akamai Has a Solution â Kona Site Defender
(Cloud)
Datacenters
Origin
Traffic
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
End User
sophistication of web attacks.
Akamai
Traffic
10000
10000
1000
1000
100
100
10
10
1
1
COVERED
©2013 AKAMAI | FASTER FORWARDTM
46. Grow revenue opportunities with fast, personalized
John Summers
web experiences and manage complexity from peak
Vice President,
demand, mobile devices and data collection.
Security Business
©2013 AKAMAI | FASTER FORWARDTM
47. Learn More
Kona Security Solutions Demo:
See the attack demo presented
today in more detail
Who: Security Center of Excellence Team
When: All Week Long
Where: Kona Kiosk
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
Who: Ronni Zehavi, Akamai
Web Security Solutions: protect from increasing frequency, scale and
When: Thursday, 11:20AM â 12:00PM
How Kona and Cloud Security
sophistication of Where: Annapolis 1 â 4
web attacks.
Intelligence Will Help You
Weather Cyber Storms
©2013 AKAMAI | FASTER FORWARDTM
48. Learn More
Learn
More
Security Keynote:
A Conversation with Bruce
Schneier
Security Panel Session:
Operation Ababil,
Anniversary
Panel â What We Have
Learned
Who: Bruce Schneier
When: Thursday, 2:10 â 3:00PM
Where: Annapolis 1 â 4
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
Who: Andy Ellis, Akamai
When: Thursday, 4:20 â 5:00PM
Where: Annapolis 1 â 4
©2013 AKAMAI | FASTER FORWARDTM
49. GRAND CHALLENGE FOR ENTERPRISE
Fast, affordable IP access in the workplace and branch office
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
©2013 AKAMAI | FASTER FORWARDTM
50. IN-BRANCH
CONNECTIVITY IS
SLOW & EXPENSIVE
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
©2013 AKAMAI | FASTER FORWARDTM
51. In-Branch Networks Are Not Enabled for Speed
Remote Branch
16 hops
In-Branch
Wi-Fi
5 hops
Residential
Wi-Fi
WAN
(MPLS/VPN)
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale Trombone
âThe and
sophistication of web attacks. Effectâ for MPLS
VS.
& VPN Branches
Enterprise
Data Center
Internet
SaaS Provider
Source: Akamai Research, Gartner
©2013 AKAMAI | FASTER FORWARDTM
52. Akamai is Moving into the Branch
Akamai optimizes bandwidth & speeds up
applications on
the corporate WAN
Remote Branch
Akamai offloads the
WAN for non-critical applications
Akamai optimizes bandwidth & speeds
up applications
in the cloud
AKAMAI
FUNCTIONALITY:
De-Deduplication
Local Caching
Prepositioning of Content
And everything else the Akamai
Intelligent Platformâą does!
WAN
(MPLS/VPN)
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale Trombone
âThe and
sophistication of web attacks. Effectâ for MPLS
& VPN Branches
Enterprise
Data Center
SaaS Provider
Internet
©2013 AKAMAI | FASTER FORWARDTM
53. WAN Bandwidth Savings Over 1 Hour
% of Bandwidth Reduced
100%
80%
60%
Average
Bandwidth
Avoid data theft and downtime by extending the
Savings 62%
security perimeter outside the data-center and
Caching
protect from increasing frequency, scale and Savings
Up To 96%
sophistication of web attacks.
40%
Data Taken
From Actual
Customer
Branch in
Europe
20%
0%
14:20 14:25 14:30 14:35 14:40 14:45 14:50 14:55 15:00 15:05 15:10 15:15 15:20
©2013 AKAMAI | FASTER FORWARDTM
54. Andy Champagne
Grow revenue opportunities with fast, personalized
Chief Technology
web experiences and manage complexity from peak
Officer, Emerging
demand, mobile devices and data collection.
Products
©2013 AKAMAI | FASTER FORWARDTM
55. Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
©2013 AKAMAI | FASTER FORWARDTM
56. Grow revenue opportunities with fast, personalized
Mark Lohmeyer
web experiences and manage complexity from peak
VP, Product
demand, mobile devices and data collection.
Management,
Enterprise Networking,
Cisco
©2013 AKAMAI | FASTER FORWARDTM
58. Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
SCALE
Technology
©2013 AKAMAI | FASTER FORWARDTM
59. Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Best of Breed Web
Acceleration & Internet
Traffic Engineering
10MM Routers
Covering 85%
of Branches
©2013 AKAMAI | FASTER FORWARDTM
60. 137,000 Servers in
87 Countries, Within
Over 1,150 Networks
Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
Leading WAN Optimization,
VPN, Firewall and
Web Security
©2013 AKAMAI | FASTER FORWARDTM
61. ISR-AX
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
©2013 AKAMAI | FASTER FORWARDTM
62. Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
akamai.com/cisco
cisco.com/go/iwan
Request More Info:
kborillo@akamai.com
©2013 AKAMAI | FASTER FORWARDTM
63. Learn More
Emerging Solutions: Akamai in the Branch â
Avoid data theft
Where Brick & Mortar and downtime Cloud
Meets the by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
Who: Willie Tejada, Akamai
sophistication â 11:10AM
When: Thursday, 10:30 of web attacks.
Where: Woodrow Wilson
©2013 AKAMAI | FASTER FORWARDTM
64. Grow revenue opportunities with fast, personalized
web experiences and manage complexity from peak
demand, mobile devices and data collection.
©2013 AKAMAI | FASTER FORWARDTM