Akamai Kona

Designed to provide superior cloud computing security, prevent data theft and downtime and mitigate Denial of Service attacks by extending the security perimeter outside the data center, Kona Security Solutions are part of an overall web security strategy. They deliver unmatched cloud security solutions and offer protection from increasingly large and sophisticated Web attacks including SQL injection and Distributed Denial of Service attacks (DDoS attacks).

KONA Site Defender

An overall cloud computing security solution that defends against network and application layer Distributed Denial of Service Attacks (DDoS Attacks), Web application attacks, and direct-to-origin attacks.

Web Application Firewall

A solution that protects the integrity and performance of web applications by defending against application layer attacks such as GET Floods, SQL Injections, and Cross Site Scripts.

Enhanced DNS

A critical component of an overall cyber security strategy; Enhanced DNS is an available, scalable, and high- performance DNS name resolution service using a secondary DNS approach.

Mobile detection

Web Site Cloaking

Hide customer Origin from public internet. Only communicate with subset of Akamai Edge Servers.

Compliance Management

Utilities and documentation provided for PCI, ISO, FISMA, BITS and HIPAA to help ensure adherence to internal audit procedures when using Akamai services.

Edge Tokenization

Helps customers meet PCI compliance by eliminating need to process or store customer's credit card information.