Designed to provide superior cloud computing security, prevent data theft and downtime and mitigate Denial of Service attacks by extending the security perimeter outside the data center, Kona Security Solutions are part of an overall web security strategy. They deliver unmatched cloud security solutions and offer protection from increasingly large and sophisticated Web attacks including SQL injection and Distributed Denial of Service attacks (DDoS attacks).
KONA Site Defender
An overall cloud computing security solution that defends against network and application layer Distributed Denial of Service Attacks (DDoS Attacks), Web application attacks, and direct-to-origin attacks.
Web Application Firewall
A solution that protects the integrity and performance of web applications by defending against application layer attacks such as GET Floods, SQL Injections, and Cross Site Scripts.
Enhanced DNS
A critical component of an overall cyber security strategy; Enhanced DNS is an available, scalable, and high- performance DNS name resolution service using a secondary DNS approach.

Mobile detection
Web Site Cloaking
Hide customer Origin from public internet. Only communicate with subset of Akamai Edge Servers.
Compliance Management
Utilities and documentation provided for PCI, ISO, FISMA, BITS and HIPAA to help ensure adherence to internal audit procedures when using Akamai services.
Edge Tokenization
Helps customers meet PCI compliance by eliminating need to process or store customer's credit card information.