[go: up one dir, main page]

0% found this document useful (0 votes)
124 views4 pages

Akamai Guardicore Segmentation

Uploaded by

Kovit Thakral
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
124 views4 pages

Akamai Guardicore Segmentation

Uploaded by

Kovit Thakral
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

AKAMAI PRODUCT BRIEF

Akamai Guardicore Segmentation


Stop lateral movement with granular visibility and microsegmentation controls

Enterprise IT infrastructure continues to evolve from traditional BENEFITS TO YOUR BUSINESS


on-premises data centers to cloud and hybrid cloud architectures, Prevent ransomware
with a blend of platforms and application deployment models.
Although this digital transformation is helping many organizations Achieve Zero Trust

achieve greater business agility, reduce infrastructure costs, and Accelerate compliance
enable remote work, it is also creating a larger and more complex
attack surface that does not have a well-defined perimeter. Each Ringfence critical applications

individual server, virtual machine, cloud instance, and endpoint


Secure cloud migrations
is now a possible point of exposure. And with the prevalence of
threats like ransomware and zero-day vulnerabilities, attackers Safeguard remote workforce
are becoming more adept at moving laterally toward high-value
Protect endpoints
targets when — not if — they find a way in.
Move beyond internal firewalls
Akamai Guardicore Segmentation provides the simplest, fastest, and most intuitive
way to enforce Zero Trust principles within your network. It is designed to stop lateral
movement by visualizing activity within your IT environments, implementing precise
microsegmentation policies, and detecting possible breaches quickly.

Key solution capabilities


Granular, AI-powered segmentation
Implement policies in a few clicks using AI recommendations, templates for remediating
ransomware and other common use cases, and precise workload attributes like
processes, users, and domain names

Real-time and historical visibility


Map application dependencies and flows down to the user and process levels on
a real-time or historical basis

Broad platform support


Cover modern and legacy operating systems across bare-metal servers, virtual
machines, containers, IoT, and cloud instances

Flexible asset labeling


Add rich context with a customizable labeling hierarchy for visibility and enforcement,
and integration with orchestration tools and configuration management databases for
automated labeling

Multiple protection methods


Integrate threat intelligence, defense, and breach detection capabilities to reduce
incident response time
How it works
Akamai Guardicore Segmentation collects detailed information about an organization’s IT infrastructure
through a mix of agent-based sensors, network-based data collectors, virtual private cloud flow logs from
cloud providers, and integrations that enable agentless functionality. Relevant context is added to this
information through a flexible and highly automated labeling process that includes integration with existing
data sources, such as orchestration systems and configuration management databases.

Infrastructure topology

Most customers utilize SaaS management, but on-premises


management options are also available.

Network map
The output is a dynamic map of the entire IT infrastructure that allows
security teams to view activity with user- and process-level granularity
on a real-time or historical basis. These detailed insights, combined with
AI-powered policy workflows, make the creation of segmentation policies
fast, intuitive, and based on real workload context.

Templates

Policy creation is made easy with pre-built templates for the most common
use cases. Policy enforcement is completely decoupled from the underlying
infrastructure, so security policies can be created or altered without complex
network changes or downtime. In addition, policies follow the workload
no matter where it resides — in on-premises data centers or public cloud
environments. Our segmentation capabilities are complemented by a
sophisticated set of threat defense and breach detection capabilities,
as well as by Akamai Hunt, our managed threat hunting service.

2
Comprehensive protection at scale

Any environment
Protect workloads in complex IT environments with a combination of on-premises workloads,
virtual machines, legacy systems, containers and orchestration, public/private cloud
instances, and IoT/OT

Simplified security
Simplify security management with one platform that provides network visualization,
segmentation, threat defense, breach detection capabilities, and guided policy enforcement
for Zero Trust initiatives

Enterprise scalability and performance


Start with focused protection of your most critical digital assets, and scale up to protect your
full enterprise without complexity, infrastructure changes, or performance bottlenecks

Cloud
workloads

Data
collection

Bare
metal

Visibility

Virtual
machines

IT automation
Segmentation

Containers

Security
operations Breach
detection
Endpoints

Authentication

Devices

3
Supported platforms and technologies
• Akamai Guardicore Segmentation is designed to integrate with your existing infrastructure.

• Our OS support expands continuously with our customers’ needs.

• Check out our technology partners page for a complete list of our integrations.

Operating systems
Linux Apple Microsoft

Unix

Public cloud providers Hypervisors

Hypervision orchestration Security gateways

Container orchestration and engines

Browsers for web console Memory and system minimum requirements


Management
Management
Management Server
Server
Server Aggregator
Aggregator
Aggregator
3232
GBGB RAM,
RAM, 8 8 vCPUs,
vCPUs,
32 GB RAM, 8Server 530
530 GB
GB
vCPUs, 530 GB 4 4
GBGB RAM,
4 RAM,
GB 44
RAM, vCPUs,
vCPUs, 3030
4 vCPUs, GB
GB
30 GB
Management Aggregator
Deception
Deception Server
Server
32Deception
GB RAM, vCPUs, 530 GB ESC
8Server ESC
4 ESC
GB Collector
Collector
RAM, 4 vCPUs, 30 GB
Collector
3232
GBGB
32 RAM,
RAM,
GB 88
RAM, vCPUs,
vCPUs, 100
100
8 vCPUs, GB
GB
100 GB 2 2
GBGB RAM,
2 RAM,
GB 22
RAM, vCPUs,
vCPUs, 3030
2 vCPUs, GB
GB
30 GB
Deception Server ESC Collector
32 GB RAM, 8 vCPUs, 100 GB 2 GB RAM, 2 vCPUs, 30 GB

STIX,
STIX, Syslog,
Syslog,
STIX, SMTP,
SMTP,
Syslog, CEF,
CEF,
SMTP, Open
Open
CEF, REST
REST
Open API
API
REST API
STIX, Syslog, SMTP, CEF, Open REST API

For more information about Akamai Guardicore Segmentation,


or to request a personalized product demo, visit akamai.com/guardicore.

©2024 Akamai Technologies Support Published 02/24


4

You might also like