Akamai Diversity

The Akamai Blog

IBM, Akamai Team Up in DDoS Fight

As part of a new partnership, IBM will integrate Akamai's Kona Site Defender with IBM's Cloud Security Services portfolio.

IBM Security Services General Manager Kris Lovejoy said her company decided to join forces with Akamai because of its track record in protecting customers from DDoS attacks.

"Our clients tell us there is a need to strengthen cloud security," Lovejoy said in a statement. "The partnership with Akamai combines a world-class security team and an intelligent network platform to strengthen cloud security Together with Akamai, IBM can provide both proactive and reactive DDoS protection from the increasing frequency, scale and sophistication of these attacks."

Based on daily monitoring of security for more than 4,000 thousand clients, IBM sees DDoS attacks as an escalating problem. The average large company must filter through 1,400 cyber attacks weekly, according to the IBM Cyber Security Intelligence Index.

In its most recent State of the Internet report, Akamai documented a second-quarter rise in DDoS attacks. Akamai customers reported 318 attacks -- a 54 percent increase over the 208 reported in the first quarter. At 134 reported attacks, the Enterprise sector continued to be the leading target of DDoS attacks, followed by Commerce (91), Media and Entertainment (53), High Tech (23) and Public Sector (17).

The companies will also share security intelligence to better detect threats, identify security risks and areas of noncompliance and set priorities for remediation. IBM's X-FORCE research and development will contribute global analytics capabilities and use its Q1Radar security solution, which gathers information from multiple sources and uses analytics to identify potential threats and breaches.

The result for clients is managed DDoS protection that covers a full spectrum of services including: 

• Preparation - development of readiness plans and response protocols
• Mitigation - proactively stop attacks before they affect clients' networks
• Monitoring - monitor network traffic, DDoS alerts, and the real-time health of IT resources
• Response - trained response experts on standby to assist with attacks; to contain, eradicate, recover and identify primary and secondary attacks
• Intelligence - deliver insights on internet threat conditions and provide real-time DDoS metrics