Origin Shield is implemented to safeguard your origin server during periods of high request loads. By placing a shield server between the CDN edge server and your origin server, the content is fetched from your origin by the shield server and then delivered to the CDN edge server. This approach ensures the efficiency of your […]
Category: Glossary
Client Reputation
Client Reputation computes a reputation score for IP addresses. The range spans 1-10 for each category—10 indicating high odds that the IP address is in use by a malicious actor. Because the service continually evaluates activity, scores may decay over time, as they stop exhibiting bad behavior. In addition, this risk score is customized for […]
IP/GEO Firewall
If you have been receiving disruptive requests from particular IP addresses or if you wish to restrict traffic originating from The Onion Router (TOR) network commonly used by hackers to conceal their identity, IP/Geo controls provide a solution. With IP/Geo controls, you can effectively block or allow traffic based on specific IP addresses, subnets, geographic […]
DOS Protection
DOS Protection, short for Denial-of-Service Protection, is a security measure designed to defend against and mitigate Denial-of-Service (DoS) attacks. A DoS attack aims to disrupt the availability and functionality of a target system, such as a website, network, or application, by overwhelming it with an excessive amount of traffic or requests.
BOT Management
BOT management is a security measure provided by Application and API Protector to safeguard your website or application against bot attacks. By implementing this feature, you can ensure the utmost security for your application and have the ability to differentiate between legitimate and malicious bots. This enables you to have fine-grained control over bot access […]
Web Application Firewall
A web application firewall (WAF) is a security measure designed to protect web applications from various types of attacks and vulnerabilities. It acts as a filter between the web application and the client, monitoring and analyzing incoming and outgoing HTTP/HTTPS traffic.
Application and API Protector
Akamai App & API Protector is a single solution that brings together many security technologies including web application firewall, bot mitigation, API security, and DDoS protection. App & API Protector is recognized as the leading attack detection solution, quickly identifying and mitigating threats beyond the traditional firewall to protect entire digital estates from multidimensional attacks. […]
Image Optimizer
The technique of image optimization enables the transformation of images in real time without requiring image manipulation software. By simply adding a parameter, images can be optimized efficiently, saving time and providing maximum efficiency to meet your needs.
CDN+
CDN+ provides maximum security, adaptive performance, and real-time optimization for every user across different device types and network conditions, however, they choose to connect with little or NO CODE change.
TTL
TTL stands for Time-to-Live and it’s a setting in computer networking that determines how long a packet can remain in the network before being discarded. It helps to prevent packets from circulating endlessly in the network and ensures they are delivered in a timely manner. The TTL value is set by the sender of the […]