Cloud Security

Cloud Security

read more

WEB APPLICATION:

KONA SITE DEFENDER

Comprehensive Web Application and API Protection

  • Reduces risks of downtime, data theft and website defacement
  • Protects against the largest DoS and DDoS attacks
  • Protects against web attacks such as SQL injection, XSS and RFI

CLIENT REPUTATION

Stop malicious clients before they can attack, based on Akamai’s visibility into prior behavior of individual IP addresses

  • Additional layer of defense for Kona Site Defender based on recent client behavior
  • Leverages Akamai’s visibility into attacks against other customers

WEB APPLICATION PROTECTOR & BOT MANAGEMENT

  • Reduces risks of downtime, data theft, and website defacement
  • Protects against web attacks and DDoS
  • Implements rule updates automatically
  • Provides visibility into the amount of bot traffic accessing your site
  • Improves user experience by reducing the impact of bots on the web during peak traffic hours
  • Prevents price and content scraping with serving alternative content
  • Stop the most sophisticated bots and reduce your infrastructure load

 

SECURE ENTERPRISE ACCESS:

ENTERPRISE APPLICATION ACCESS

Application Access Redefined: Secure, Simple, Fast

  • Centralize your security and access control
  • Keep all users off of your network and make your applications invisible to the Internet
  • Complete auditing and reporting of user activity

ENTERPRISE THREAT PROTECTOR

Proactive protection against zero-day malware and phishing

  • Get proactive protection vs. reactive mitigation
  • Instant protection without complexity or hardware
  • Quick and uniform enforcement of Acceptable Use Policy

DATA CENTERS:

PROLEXIC ROUTED

Fastest DDoS Mitigation of Terabit Scale Attacks

  • Reduces business risks posed by the threat of DDoS attack
  • Maintains availability of Internet-facing applications
  • Fast mitigation by Akamai’s 24×7 SOC, with time-to-mitigate SLA

ENTERPRISE THREAT PROTECTOR

Proactive protection against zero-day malware and phishing

  • Get proactive protection vs. reactive mitigation
  • Instant protection without complexity or hardware
  • Quick and uniform enforcement of Acceptable Use Policy

ZERO TRUST:

ZERO TRUST SECURITY

Users, devices, applications, and data are moving outside of the enterprise perimeter and zone of control

  • New business processes driven by digital transformation increase risk exposure
  • “Trust but verify” is no longer an option, as targeted, advanced threats are moving inside the corporate perimeter
  • Traditional perimeters are complex, increase risk, and are no longer compatible with today’s business models

MALWARE & PHISING

ENTERPRISE THREAT PROTECTOR

Proactive protection against zero-day malware and phishing

  • Get proactive protection vs. reactive mitigation
  • Instant protection without complexity or hardware
  • Quick and uniform enforcement of Acceptable Use Policy

DNS SERVICES

EDGE DNS

Gain peace of mind by extending your DNS to the edge, with high availability and performance, and resilience against DDoS attacks backed by a 100% uptime SLA.

  • Optimizes DNS availability and performance globally
  • Provides resilience against the largest DDoS attacks
  • Prevents DNS spoofing and hijacking with DNSSEC

KONA DDoS DEFENDER

Managed DDoS protection service for critical websites and web applications

  • Reduces risks of downtime, data theft and website defacement
  • Protects against the largest DoS and DDoS attacks
  • Protects against web attacks such as SQL injection, XSS and RFI

SITE SHIELD

Origin defense by cloaking websites and web infrastructure

  • Ensures web traffic goes through the Akamai Intelligent Platform
  • Complements Kona DDoS Defender to help prevent attackers from targeting the origin

DNS SECURITY and SERVICES

You rely on your DNS for business and customer transactions, we help you make it fast, resilient and secure

  • Our mapping system leverages DNS to ensure the fastest and highest quality delivery of Internet content
  • Our DNS technology defends our customers against DDoS attacks and targeted threats, enables new revenue streams for ISPs, and helps cloud applications perform better
  • Our recursive DNS solutions serve over 50 million Internet subscribers for many of the world’s largest ISPs and protect enterprises from targeted threats

APIs

API CAPABILITIES

Scale, protect, and manage APIs

  • Leverage a unique set of API-specific capabilities designed to provide performance, scale, offload, and reliability
  • Real-time data collected by Akamai selects an optimal path between your origin infrastructure and the Akamai Edge servers, while proprietary techniques are used to avoid Internet congestion points and unnecessarily long routes
  • Apply rate controls to API requests, as well as inspect JSON and XML API calls in order to ensure your web server remains available and the data on it is secure

VIDEO and ONLINE Propertis

SCALEBLE CLOUD SECURITY

Deliver flawless and uninterrupted viewing experiences, with secure content, applications, sites and data

  • Proactively augment your existing infrastructure with security measures in the cloud for a more robust web security posture
  • Cloud-based security offers greater scale and capacity to protect your CDN from even the largest DDoS attack
  • Stop threats at the edge – with zero impact on your website performance or the quality of your digital experiences

CUSTOMER IDENTITY & ACCESS MANAGEMENT

IDENTITY CLOUD

Mission-critical customer identity and access management to provide trusted digital experiences for end users

  • Provides a highly-secure and resilient environment for collecting and storing sensitive user information
  • Safeguards against malicious activities including fraudulent accounts and credential compromise
  • Enables brands to establish and maintain digital trust with their customers