In the context of a Content Delivery Network (CDN), purging the cache refers to the process of removing or deleting the cached copies of files or content stored on the CDN’s edge servers. When you purge the cache in a CDN, it triggers the removal of outdated or stale content from the edge servers, ensuring […]
Category: Network & Security
CSS
CSS stands for Cascading Style Sheets. It is a programming language used for describing the visual appearance and formatting of a document written in HTML or XML. CSS allows web developers to control the layout, colors, fonts, and other design aspects of a web page, making it an essential tool for creating visually appealing and […]
Origin IP resolution
Origin IP resolution is a technique primarily employed to fetch content from your origin server by the CDN using the server’s IP address instead of relying solely on your domain. This approach proves to be effective for achieving comprehensive site acceleration. By pointing your domain to the CDN edge server, the CDN can directly pull […]
Origin Shield
Origin Shield is implemented to safeguard your origin server during periods of high request loads. By placing a shield server between the CDN edge server and your origin server, the content is fetched from your origin by the shield server and then delivered to the CDN edge server. This approach ensures the efficiency of your […]
Client Reputation
Client Reputation computes a reputation score for IP addresses. The range spans 1-10 for each category—10 indicating high odds that the IP address is in use by a malicious actor. Because the service continually evaluates activity, scores may decay over time, as they stop exhibiting bad behavior. In addition, this risk score is customized for […]
IP/GEO Firewall
If you have been receiving disruptive requests from particular IP addresses or if you wish to restrict traffic originating from The Onion Router (TOR) network commonly used by hackers to conceal their identity, IP/Geo controls provide a solution. With IP/Geo controls, you can effectively block or allow traffic based on specific IP addresses, subnets, geographic […]
DOS Protection
DOS Protection, short for Denial-of-Service Protection, is a security measure designed to defend against and mitigate Denial-of-Service (DoS) attacks. A DoS attack aims to disrupt the availability and functionality of a target system, such as a website, network, or application, by overwhelming it with an excessive amount of traffic or requests.
BOT Management
BOT management is a security measure provided by Application and API Protector to safeguard your website or application against bot attacks. By implementing this feature, you can ensure the utmost security for your application and have the ability to differentiate between legitimate and malicious bots. This enables you to have fine-grained control over bot access […]
Web Application Firewall
A web application firewall (WAF) is a security measure designed to protect web applications from various types of attacks and vulnerabilities. It acts as a filter between the web application and the client, monitoring and analyzing incoming and outgoing HTTP/HTTPS traffic.
Application and API Protector
Akamai App & API Protector is a single solution that brings together many security technologies including web application firewall, bot mitigation, API security, and DDoS protection. App & API Protector is recognized as the leading attack detection solution, quickly identifying and mitigating threats beyond the traditional firewall to protect entire digital estates from multidimensional attacks. […]