Get In Touch
Recently in Corporate Category
After the quake struck, many Akamai colleagues sprung into action, donating funds to relief organizations, which Akamai matched, and joining volunteer or philanthropic efforts of all sorts. One Akamai employee showed extraordinary commitment to helping the victims of the quake. Sunil Khandelwal, a Professional Services solutions architect in Akamai's Tokyo office, dedicated four weeks of his time to volunteer as part of a disaster relief team on the ground in Nepal.
Nearly two years ago, we published a blog post titled "Clarifying State of the Internet Report Metrics", and it has served as a great reference for those interested in finding out more about the metrics published within the State of the Internet Report. However, as the report has evolved over the last several years, we thought it would be worth publishing an update to clarify existing metrics and review new ones, with the goal of minimizing confusion about, or misinterpretation of, terms and/or data within the report.
CAMBRIDGE, Mass. - October 23, 2014 - Akamai Technologies, Inc. (NASDAQ: AKAM), the leading provider of cloud services for delivering, optimizing and securing online content and business applications, today announced availability of the Q3 2014 State of the Internet - Security Report. Akamai's Prolexic Security Engineering and Research Team (PLXsert) is a recognized leader in Distributed Denial of Service (DDoS) protection services and strategies. This quarter's report, which provides analysis and insight into the global attack threat landscape including DDoS attacks, can be downloaded at www.stateoftheinternet.com/security-report.
"DDoS attack size and volume have gone through the roof this year," said John Summers, vice president, Security Business Unit at Akamai Technologies. "In the third quarter alone, Akamai mitigated 17 attacks greater than 100 gigabits-per-second, with the largest at 321 Gbps. Interestingly, we witnessed none of that size in the same quarter a year ago and only six last quarter. These mega-attacks each used multiple DDoS vectors to deliver large bandwidth-consuming packets at an extremely high rate of speed."