sb-au logo
Story image

Second Akamai scrubbing centre opens in Melbourne

21 Aug 2019

Akamai has opened a new ‘scrubbing centre’ in Melbourne with the aim of extending the overall attack fighting capability and resiliency of the Akamai platform in the A/NZ region.

The Melbourne scrubbing centre will complement Akamai's existing regional DDoS-mitigation-platform footprint, which includes further scrubbing centres in Sydney, Tokyo, Hong Kong, Osaka and Singapore.

Akamai’s scrubbing centres are centralised data-cleansing stations, that filter out malicious traffic before it can reach the applications and data centres of Akamai’s customers. 

By blocking attack traffic at the edge, Akamai helps to make sure that ‘good’ traffic can still be processed efficiently, without the end-customers’ infrastructures becoming overwhelmed.

According to Akamai researchers, over the course of 2018, they noticed a 97.7% growth rate in attack size, with a median in January of .56 Gbps ballooning to 1.548 Gbps by December. 

As attackers up the ante with bigger botnets, Akamai is responding with greater capacity to absorb attack traffic.

The new Melbourne scrubbing centre will allow Akamai to continue to meet its aims of having three-to-five times the capacity of the largest DDoS attacks currently recorded, even in spite of the growth of attack data, increasing the dedicated capacity to 8.0 Tbps globally.

Akamai Asia Pacific and Japan vice president and managing director Graeme Beardsell says, “The launch of our second scrubbing centre in Australia reinforces our DDoS mitigation capabilities in the region and demonstrates our commitment to continuously improving the cybersecurity posture of businesses and government departments.” 

Akamai’s scrubbing centres are a key element of its Prolexic Routed solutions, which is designed to stop DDoS attacks in the cloud before they reach applications, data centres, and infrastructure.

It’s built on a DDoS mitigation platform with 19 global scrubbing centres that are closer to users and attackers, which minimises performance latency and improves network resiliency.

It works by redirecting networking traffic through Akamai’s scrubbing centres by making a simple border gateway protocol (BGP) route advertisement change.

Traffic is routed through the closest available scrubbing centre, and proactive mitigation controls are architected to drop attacks instantly.

Akamai SOC experts analyse the remaining DDoS traffic to quickly and efficiently apply the most appropriate mitigation for every attack vector.

Clean traffic is then forwarded to a business’ applications and data centres, and outbound traffic is returned directly to users.

Akamai offers two deployment options: ‘always-on’ to mitigate malicious traffic at all times, and ‘on-demand’ which allows businesses to redirect traffic when they are under attack.

Story image
Zerto launches security solutions for containerised applications
The company has launched its beta program of Zerto for Kubernetes (Z4K), an extension of its Zerto Platform, to support next-generation, cloud native applications.More
Story image
Trend Micro launches cloud native security solution for modern applications and APIs
“Application security is an invaluable part of the Cloud One platform, integrating technology to provide superior protection for customers deploying applications wherever it makes the most sense for them."More
Story image
CyberArk launches Forescout and Phosphorus integration to aid with IoT security
“Through our integration with Forescout and Phosphorus, CyberArk dramatically improves security and compliance, and alleviates the burden on IT and security teams."More
Story image
DigiCert revamps PKI management capabilities for remote work
The revamp provides new ways of delivering certificate automation that can authenticate employees and devices, and encrypt data over networks.More
Story image
Vectra expands NDR capabilities across all network environments
Vectra’s network threat detection and response (NDR) solution is designed to use cloud identities that track and link attacker activities and progression across all networks.More
Story image
Forrester names Thycotic a Leader in privileged access management
Thycotic received the highest possible score in 11 of the 24 criteria in the study, including SaaS/cloud, innovation roadmap, and integrations, deployment, supporting products and services, commercial model, and PIM installed base.More