A Akamai gravará esta transcrição. Consulte a nossa política de privacidade para obter mais informações. Ao prosseguir, você concorda com a gravação e o uso de seus dados pessoais.
Both an asset and an attack vector for the enterprise, information helps businesses achieve a competitive edge while at the same time turning their IT systems into attractive targets for damaging cyber-attacks like DDoS and the SQL injection attack. For organizations increasingly dependent on their information systems, information security is now a top priority.
Information security is the practice of protecting valuable and sensitive information from unauthorized access, use, disclosure, modification, and destruction. Typically, the primary goals of info security are to preserve the confidentiality, integrity and availability of information, ensure business continuity through backup and disaster recovery, and maintain regulatory compliance.
Due to the complex and unpredictable nature of today's threat landscape, developing and implementing information security policies and controls is time-consuming and costly. Considering both the needs of users and the risks of exposing sensitive data and mission-critical applications to hackers, organizations struggle to strike a balance among various commitments. The difficulty of information security lies in the necessity of providing information and services readily to those who require access while ensuring the protection of confidential information and the availability and continued performance of IT systems.
Moreover, as the responsibilities and priorities of organizations and the consumption of IT evolve over time, companies must regularly assess and improve their information security posture. In particular, they will need to periodically evaluate existing policies for physical security, network security, and database security as well as contingency and disaster recovery planning, info security awareness education, and information security management. Also, many organizations will have to take into account security compliance standards and regulations such as HIPAA, PCI-DSS, and ISO 27001 when selecting and defining risk-appropriate security controls.
Taking into consideration recent trends in technology like the consumerization of IT and BYOD initiatives, it is clear that the ideal corporate information security architecture is one that can support greater business agility and productivity while reducing vulnerabilities in and improving the resilience of IT systems to attack. In order to achieve this, organizations are increasingly turning to cloud-based Cloud Security Solutions, which offer flexibility, adaptability and a range of capabilities that can effectively and cost-efficiently improve information security.
In addition to our market-leading web content distribution and media streaming services, which allow our clients to provide their users with high performance web applications and superior Internet video quality, Akamai offers our clients multi-layered, forward-positioned Cloud Security Solutions. Whether your company needs DDoS mitigation, a full-powered Web Application Firewall, or PCI-certified SSL delivery, we have you covered, protecting your network, websites and applications from upstream cyber threats 24/7.