QiRong>>
中文
Akamai > Security
 
Cloud Security Solution
Protect websites and data centers, thereby reducing the risk of downtime and data theft Online threats continue to change. Akamai can withstand the largest and most complex totals, helping you protect your website and other Internet applications from the risk of downtime and data theft. The Akamai cloud data security solution is built on the Akamai Intelligent Platform™, which can prevent the largest distributed denial of service (DDoS) and web application attacks without degrading performance. It can also detect the latest threats and use expertise to adjust strategies and attacks vector.
 

1.Website Protection

 

1) Kona Site Defender

A comprehensive protection solution to help websites and APIs resist complex DDoS and web application attacks

  • Reduce the risk of downtime, data theft and website tampering
  • Resist the largest denial of service (DoS) and DDoS attacks
  • Resist SQL injection, cross-site scripting (XSS) and remote file inclusion (RFI) and other network attacks

 

2) Web Application Protector

Simplify WAF and DDoS Protection

  • Reduce the risk of downtime, data theft and website tampering
  • Defense against web attacks and DDoS
  • Automatic update rules

 

3) Bot Manager

A cash strategy for flexibly managing the long-term impact of crawlers on business and IT

  • Know the number of bot traffic visiting your website
  • Improve user experience by reducing the impact of bots on the Web during peak traffic hours
  • Prevent price and content theft

 

4) Fast DNS

Cloud-based Domain Name System (DNS) can improve the performance, availability, and resilience against distributed denial of service (DDoS) attacks

  • Increase DNS response speed by up to 75%
  • Improve the availability of DNS services for global users
  • Protect DNS infrastructure from the largest DDoS attacks
  •  

5) Kona DDoS Defender

Hosted Distributed Denial of Service (DDoS) protection services for critical websites and web applications

  • Reduce the risk of downtime for critical websites
  • Resist the largest denial of service (DoS) and DDoS attacks
  • Quickly resist risks with Akamai's 24/7 security operations center
  •  

6) Client Reputation

Based on Akamai's visibility into the previous behavior of each IP address, stop malicious clients before they attack

  • Kona Site Defender's additional layer of defense based on recent client behavior
  • Leverage Akamai's visibility into attacks on other customers
  •  

7) Site Shield

Source defense by hiding websites and web infrastructure

  • Ensure that web traffic passes through the Akamai Intelligent Platform
  • Supplement Kona DDoS Defender to help prevent attackers from targeting the source

 

 

 

2.Infrastructure Protection

 

1) Enterprise Application Access

Redefine application access: safe, simple and fast

  • Centralized security and access control
  • No users can access the private network, and your application is no trace on the Internet
  • Complete audits and reports of user activities
  •  

2) Enterprise Threat Protector

Proactively defend against zero-day malware

  • Achieve active protection and passive mitigation
  • Instant protection without complicated setup or hardware
  • Enforce acceptable use policies quickly and consistently
  •  

3) Prolexic Solution

Provide expert-level mitigation measures against a wide range of DDoS attacks, and have industry-leading SLA

  • Reduce business risks caused by DDoS attack threats
  • Maintain the availability of Internet-facing applications
  • Quickly defend against risks through Akamai's 24/7 Security Operations Center (SOC), while providing resistance to time service level agreements (SLA)

 

 

3.Customer Identity and Access Management

 

1)Identity Cloud

Realize mission-critical customer identity and access management, and provide end users with a trusted digital experience

  • Provide a highly secure and flexible environment for the collection and storage of sensitive user information
  • Effectively prevent malicious activities such as fraudulent accounts and credential leakage
  • Help brands establish and maintain digital trust relationships with their customers

 

 
 
QiRong >>
© 2018 Beijing Qirong Excellent Information Technology Co., Ltd. All rights reserved.
Contact Us
Address: Room 5-303, 93 Jianguo Road, Wanda Plaza, Chaoyang District, Beijing
E-mail:sales@keyfameplus.com
Follow Us