View
Sorting
From A to Z
Products found: 3
Akamai IoT Edge Cloud
Built to Handle the Most Demanding IoT Cloud Infrastructure Needs
Edge Cloud gives you the infrastructure to securely connect millions of IoT devices, game consoles, applications, cars, and more. All in real-time. And all with uncapped connections per second, uncapped simultaneous messages, and huge file limits.
Edge Cloud Benefits:
Focusing on Your Core Saves on Development time
We offer a pre-integrated message broker, a data pipeline, an edge data stream, and a distributed database. You get real-time connectivity, data collection, and storage, at massive scale, so you can focus on your core: your sensors, your data, your insights.
Multi-layered Security
Protect data and devices with proven, massive edge security network.
Easy to use
Optimize device management and data privacy capabilities by using a fully-managed global network.
Flexible Databases
Managed and pre-integrated with distributed databases and stream processing, so you don’t have to piece it together.
Uncapped Scalability
Focus on your sensors, data and insights. We support millions of connections across the globe.
Predictable Costs
Simplest billing model in the industry. Pay only for bandwidth and use as little or as much as you need.
Edge Cloud Products:
OTA Updates
Secure, over-the-air updates to connected vehicles and IoT devices at a global scale.
IoT Edge Connect
Messaging for connected devices and applications, with security at scale.
-
-
ROI-
-
0
0
Akamai Kona Web Application Firewall
Ensure web application performance with Akamai’s WAF. Kona Web Application Firewall from Akamai offers effective protection against web application attacks. Globally-distributed across the Akamai Intelligent Platform™, Kona WAF can easily scale to defend against massive application attacks. Deployed at the edge of your network rather than in a data center, Kona WAF can identify and mitigate suspicious traffic without affecting performance or availability of the origin server. Security rules for Kona WAF are continuously refined by Akamai’s Threat Intelligence Team to protect against known attacks and respond to emerging threats.
With Kona WAF you can:
With Kona WAF you can:
- Reduce the risk of downtime, data theft and security breaches with a WAF that can scale to protect against the largest DoS and DDoS attacks.
- Ensure high performance even during attacks thanks to Akamai’s globally architecture.
- Defending against new and emerging threats with help from Akamai’s Threat Intelligence Team.
- Minimize costs of cloud security by avoiding the need for expensive dedicated hardware.
- Kona WAF provides comprehensive capabilities to protect against application-layer attacks.
- Adaptive rate controls automatically protect against application-layer DDoS and other volumetric attacks by monitoring and controlling the rate of requests against applications.
- Application-layer controls offer pre-defined, configurable WAF rules that govern Request Limit Violations, Protocol Violations, HTTP Policy Violations and more.
- Network-layer controls automatically deflect network-layer DDoS attacks at the network edge and define and enforce IP whitelists and blacklists to restrict requests from certain IP addresses or geographical regions.
- Security monitor provides real-time visibility into security events and enables administrators to drill down into attack alerts.
- Logging features enable you to integrate WAF and event logs with security information and event management to increase your threat posture awareness.
-
-
ROI-
-
0
0
Akamai Technologies Enterprise Threat Protector
Enterprise Threat Protector proactively identifies, blocks, and mitigates targeted threats such as malware, ransomware, phishing, DNS data exfiltration, and advanced zero-day attacks. Enterprise Threat Protector is a Secure Internet Gateway (SIG) that enables security teams to ensure that users and devices can safely connect to the Internet, regardless of where they are connecting from, without the complexity associated with legacy approaches.
Features:
Real-Time Akamai Threat Intelligence
Up-to-the-minute threat intelligence with low false positives based on Akamai’s visibility into 15-30% of daily web traffic, 2.2 trillion recursive DNS requests, and proprietary data science algorithms.
Real-Time Inline Payload Analysis
Three advanced malware detection engines identify and block complex advanced threats and improve zero-day protection.
Acceptable Use Policy (AUP) Management
Customize and enforce your enterprise AUP and ensure compliance by limiting access to certain content categories.
Customer-Categorized Threat Customization
Integrate existing threat intelligence feeds, extending value from your existing security investments.
Analysis and Reporting
Real-time insight via an easy-to-use dashboard into all outbound enterprise DNS traffic, as well as threat and acceptable use policy events.
Logging
DNS logs are retained for 30 days and can easily be exported as a .CSV file or integrated into a SIEM for further analysis.
Security Insights
Quickly understand why Akamai has added a domain or a URL to its threat intelligence lists.
DNSSEC
All DNS requests sent to Enterprise Threat Protector have DNSSEC enabled.
Benefits:
- Improve Security Posture Everywhere
- Secure Direct Internet Access (DIA) Connections
- Protect Guest Wi-Fi
-
-
ROI-
-
0
0
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.