Cloud Security
WEB APPLICATION:
KONA SITE DEFENDER
Comprehensive Web Application and API Protection
- Reduces risks of downtime, data theft and website defacement
- Protects against the largest DoS and DDoS attacks
- Protects against web attacks such as SQL injection, XSS and RFI
CLIENT REPUTATION
Stop malicious clients before they can attack, based on Akamai’s visibility into prior behavior of individual IP addresses
- Additional layer of defense for Kona Site Defender based on recent client behavior
- Leverages Akamai’s visibility into attacks against other customers
WEB APPLICATION PROTECTOR & BOT MANAGEMENT
- Reduces risks of downtime, data theft, and website defacement
- Protects against web attacks and DDoS
- Implements rule updates automatically
- Provides visibility into the amount of bot traffic accessing your site
- Improves user experience by reducing the impact of bots on the web during peak traffic hours
- Prevents price and content scraping with serving alternative content
- Stop the most sophisticated bots and reduce your infrastructure load
SECURE ENTERPRISE ACCESS:
ENTERPRISE APPLICATION ACCESS
Application Access Redefined: Secure, Simple, Fast
- Centralize your security and access control
- Keep all users off of your network and make your applications invisible to the Internet
- Complete auditing and reporting of user activity
ENTERPRISE THREAT PROTECTOR
Proactive protection against zero-day malware and phishing
- Get proactive protection vs. reactive mitigation
- Instant protection without complexity or hardware
- Quick and uniform enforcement of Acceptable Use Policy
DATA CENTERS:
PROLEXIC ROUTED
Fastest DDoS Mitigation of Terabit Scale Attacks
- Reduces business risks posed by the threat of DDoS attack
- Maintains availability of Internet-facing applications
- Fast mitigation by Akamai’s 24×7 SOC, with time-to-mitigate SLA
ENTERPRISE THREAT PROTECTOR
Proactive protection against zero-day malware and phishing
- Get proactive protection vs. reactive mitigation
- Instant protection without complexity or hardware
- Quick and uniform enforcement of Acceptable Use Policy
ZERO TRUST:
ZERO TRUST SECURITY
Users, devices, applications, and data are moving outside of the enterprise perimeter and zone of control
- New business processes driven by digital transformation increase risk exposure
- “Trust but verify” is no longer an option, as targeted, advanced threats are moving inside the corporate perimeter
- Traditional perimeters are complex, increase risk, and are no longer compatible with today’s business models
MALWARE & PHISING
ENTERPRISE THREAT PROTECTOR
Proactive protection against zero-day malware and phishing
- Get proactive protection vs. reactive mitigation
- Instant protection without complexity or hardware
- Quick and uniform enforcement of Acceptable Use Policy
DNS SERVICES
EDGE DNS
Gain peace of mind by extending your DNS to the edge, with high availability and performance, and resilience against DDoS attacks backed by a 100% uptime SLA.
- Optimizes DNS availability and performance globally
- Provides resilience against the largest DDoS attacks
- Prevents DNS spoofing and hijacking with DNSSEC
KONA DDoS DEFENDER
Managed DDoS protection service for critical websites and web applications
- Reduces risks of downtime, data theft and website defacement
- Protects against the largest DoS and DDoS attacks
- Protects against web attacks such as SQL injection, XSS and RFI
SITE SHIELD
Origin defense by cloaking websites and web infrastructure
- Ensures web traffic goes through the Akamai Intelligent Platform
- Complements Kona DDoS Defender to help prevent attackers from targeting the origin
DNS SECURITY and SERVICES
You rely on your DNS for business and customer transactions, we help you make it fast, resilient and secure
- Our mapping system leverages DNS to ensure the fastest and highest quality delivery of Internet content
- Our DNS technology defends our customers against DDoS attacks and targeted threats, enables new revenue streams for ISPs, and helps cloud applications perform better
- Our recursive DNS solutions serve over 50 million Internet subscribers for many of the world’s largest ISPs and protect enterprises from targeted threats
APIs
API CAPABILITIES
Scale, protect, and manage APIs
- Leverage a unique set of API-specific capabilities designed to provide performance, scale, offload, and reliability
- Real-time data collected by Akamai selects an optimal path between your origin infrastructure and the Akamai Edge servers, while proprietary techniques are used to avoid Internet congestion points and unnecessarily long routes
- Apply rate controls to API requests, as well as inspect JSON and XML API calls in order to ensure your web server remains available and the data on it is secure
VIDEO and ONLINE Propertis
SCALEBLE CLOUD SECURITY
Deliver flawless and uninterrupted viewing experiences, with secure content, applications, sites and data
- Proactively augment your existing infrastructure with security measures in the cloud for a more robust web security posture
- Cloud-based security offers greater scale and capacity to protect your CDN from even the largest DDoS attack
- Stop threats at the edge – with zero impact on your website performance or the quality of your digital experiences
CUSTOMER IDENTITY & ACCESS MANAGEMENT
IDENTITY CLOUD
Mission-critical customer identity and access management to provide trusted digital experiences for end users
- Provides a highly-secure and resilient environment for collecting and storing sensitive user information
- Safeguards against malicious activities including fraudulent accounts and credential compromise
- Enables brands to establish and maintain digital trust with their customers