#
0 kết quả
#

Menu

Enterprise Threat Protector
Proactive protection against zero-day malware
Enterprise Threat Protector proactively identifies, blocks, and mitigates targeted threats such as malware, ransomware, phishing, DNS data exfiltration, and advanced zero-day attacks. Enterprise Threat Protector is a Secure Internet Gateway (SIG) that enables security teams to ensure that users and devices can safely connect to the Internet, regardless of where they are connecting from, without the complexity associated with legacy approaches.
Download the Product Brief >
Enterprise Threat Protector is a cost-effective security solution that can be installed and setup in minutes.
TRY NOW
Uses: Enterprise Threat Protector
#

Improve Security Posture Everywhere

Your recursive DNS is likely unprotected, and as such, could be exploited. In a matter of minutes, add a layer of security that uses DNS as a control point to uniformly and immediately block malicious domains and communications for all of your users, whether they are on or off network.

Learn More
#

Secure Direct Internet Access (DIA) Connections

Protect your branch DIA traffic quickly with zero complexity, without replicating your security stack at every location.

Learn More
#

Protect Guest Wi-Fi

Easily enforce an acceptable use policy (AUP) across your guest Wi-Fi for both brand and user protection.

Learn More
Features: Enterprise Threat Protector
#

Real-time Akamai Threat Intelligence

Up-to-the-minute threat intelligence with low false positives based on Akamai’s visibility into 15-30% of daily web traffic, 2.2 trillion recursive DNS requests, and proprietary data science algorithms.

#

Analysis and Reporting

Real-time insight via an easy-to-use dashboard into all outbound enterprise DNS traffic, as well as threat and acceptable use policy events.

#

Inline Real-time Payload Analysis

Three advanced malware detection engines identify and block complex advanced threats and improve zero-day protection.

#

Logging

DNS logs are retained for 30 days and can easily be exported as a .CSV file or integrated into a SIEM for further analysis.

#

Acceptable Use Policy (AUP) Management

Customize and enforce your enterprise AUP and ensure compliance by limiting access to certain content categories.

#

Security Insights

Quickly understand why Akamai has added a domain or a URL to its threat intelligence lists.

#

Customer-Categorized Threat Customization

Integrate existing threat intelligence feeds, extending value from your existing security investments.

#

DNSSEC

All DNS requests sent to Enterprise Threat Protector have DNSSEC enabled.

Guest Wi-Fi
Intelligence
Advanced Threat
Security
Block malware, phishing, and CnC
#
#
Identify DNS data exfiltration
#
#
URL inspection
#
#
Inline payload analysis
#
Enforce security for roaming users
#
#
Acceptable Use Policy (AUP)
Enforce AUPs
#
#
#
Enforce Safe Search
#
#
#
Reporting, Monitoring, and Administration
Real-time, enterprise-wide activity and search
#
#
Integrations via an open API
#
#
#
Delegated administration
#
#
#