Origin Shield

Origin Shield is implemented to safeguard your origin server during periods of high request loads. By placing a shield server between the CDN edge server and your origin server, the content is fetched from your origin by the shield server and then delivered to the CDN edge server. This approach ensures the efficiency of your […]

Read More

Client Reputation

Client Reputation computes a reputation score for IP addresses. The range spans 1-10 for each category—10 indicating high odds that the IP address is in use by a malicious actor. Because the service continually evaluates activity, scores may decay over time, as they stop exhibiting bad behavior. In addition, this risk score is customized for […]

Read More

IP/GEO Firewall

If you have been receiving disruptive requests from particular IP addresses or if you wish to restrict traffic originating from The Onion Router (TOR) network commonly used by hackers to conceal their identity, IP/Geo controls provide a solution. With IP/Geo controls, you can effectively block or allow traffic based on specific IP addresses, subnets, geographic […]

Read More

DOS Protection

DOS Protection, short for Denial-of-Service Protection, is a security measure designed to defend against and mitigate Denial-of-Service (DoS) attacks. A DoS attack aims to disrupt the availability and functionality of a target system, such as a website, network, or application, by overwhelming it with an excessive amount of traffic or requests.

Read More

BOT Management

BOT management is a security measure provided by Application and API Protector to safeguard your website or application against bot attacks. By implementing this feature, you can ensure the utmost security for your application and have the ability to differentiate between legitimate and malicious bots. This enables you to have fine-grained control over bot access […]

Read More

Web Application Firewall

A web application firewall (WAF) is a security measure designed to protect web applications from various types of attacks and vulnerabilities. It acts as a filter between the web application and the client, monitoring and analyzing incoming and outgoing HTTP/HTTPS traffic.

Read More

Application and API Protector

Akamai App & API Protector is a single solution that brings together many security technologies including web application firewall, bot mitigation, API security, and DDoS protection. App & API Protector is recognized as the leading attack detection solution, quickly identifying and mitigating threats beyond the traditional firewall to protect entire digital estates from multidimensional attacks. […]

Read More

Image Optimizer

The technique of image optimization enables the transformation of images in real time without requiring image manipulation software. By simply adding a parameter, images can be optimized efficiently, saving time and providing maximum efficiency to meet your needs.

Read More

CDN+

CDN+ provides maximum security, adaptive performance, and real-time optimization for every user across different device types and network conditions, however, they choose to connect with little or NO CODE change.

Read More

TTL

TTL stands for Time-to-Live and it’s a setting in computer networking that determines how long a packet can remain in the network before being discarded. It helps to prevent packets from circulating endlessly in the network and ensures they are delivered in a timely manner. The TTL value is set by the sender of the […]

Read More