Akamai to pay $370M for DDoS security firm Prolexic
Content delivery specialist Akamai says it wants to diversify its security offerings
IDG News Service - Content delivery services provider Akamai Technologies plans to buy Prolexic Technologies, a distributed denial-of-service (DDoS) mitigation specialist, for $370 million in cash.
Akamai, in Cambridge, Massachusetts, runs one of the world's largest content delivery networks with 137,000 servers in 87 countries. Its clients span a variety of industries and include a third of the companies on the Fortune Global 500 list.
Akamai already offers security services that protect Web sites and Web applications against a variety of threats, including DDoS attacks. However, Prolexic, located in Hollywood, Florida, specializes in defending enterprise applications against application-layer and network-layer attacks.
By acquiring Prolexic, Akamai wants to expand its services and provide customers with the technology needed to protect Web and IP infrastructure.
The transaction is pending regulatory approvals and is expected to close in the first half of 2014.
According to Scott Hammack, CEO of Prolexic, combining the expertise of both companies will allow customers to use a single provider for the Internet performance and security needs of their applications, which will simplify the resolution of network availability issues and clarify accountability.
Prolexic operates a network of so-called scrubbing centers spread around the world that have a combined bandwidth of more than 1.5 Tbps. When a DDoS attack occurs, the targeted customer routes in-bound traffic to the nearest Prolexic center, which has enough bandwidth capacity to analyze it and apply DDoS filtering techniques in order to identify and drop the malicious packets. The clean, scrubbed traffic is then routed back to the customer.
The size and number of DDoS attacks has increased significantly in recent years and the methods used by attackers have become more sophisticated, according to past reports from Prolexic and other DDoS mitigation vendors.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Benefits of Automated Log Management This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management...
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Four Myths of High-Productivity App Dev Debunked Debunk the main myths surrounding high-productivity application development and how both platforms have overcome them.
On-Demand Webcast: 7 Reasons to Choose VoIP
Thinking about a new phone system for your business?
Be sure to watch this informative webcast. Steve Strauss, small business columnist for USA...
All Cyberwarfare White Papers |