Unmatched web and application security delivered via an intelligent platform with 137,000+ servers in 87+ countries
Some of the biggest brands in the world – many of which are targeted for attack on a regular basis, trust our web security solutions to protect their online presence.
Kona Site Defender
Kona Site Defender extends security beyond the data center while maintaining site performance and availability in the face of fast-changing threats. It leverages the power of the Akamai Intelligent Platform™ to detect, identify and mitigate attacks before they ever reach the origin.
How it Works
Kona Site Defender incorporates a highly scalable Web Application Firewall (WAF) that protects against application-layer attacks in HTTP and HTPS traffic, such as SQL injections and cross-site scripting (XSS), remote file inclusion and more.
Fast DNS (optional): Leverage Akamai’s authoritative name servers to allow your end users to quickly get to your websites. Fast DNS is designed to improve the performance and availability of your DNS infrastructure while also protecting against the threat of DDoS attack. Control Panels are available to manage your DNS zone files and configuration settings.
Reduce downtime and business risk with the scale to deflect/absorb the largest DoS and DDoS attacks
Reduce the risk of data theft with a highly scalable Web Application Firewall
Highly accurate WAF stops more attacks without blocking legitimate users
Maintain performance during attacks through the globally distributed architecture
Reduce costs associated with web security by leveraging the globally distributed web security platform
Protect against new and evolving threats with Kona Rules regularly updated by the Threat Intelligence Team
Kona Rules: Develops and updates WAF rules continually to address new and emerging web application attacks, such as SQL injections, cross-site scripting, remote file inclusion and more.
Application-Layer Controls: A collection of pre-defined, configurable application-layer firewall rules address categories such as Protocol Violations, Request Limit Violations, HTTP Policy Violations and more. You can also create policy-based rules enforced after the execution of application layer controls.
Adaptive Rate Controls: Automatically protect applications against application-layer DDoS and other volumetric attacks by monitoring and controlling the rate of requests against them.
Network-Layer Controls: Automatically drop network-layer DDoS attacks at the network edge.
Site Shield: Cloak your origin from the public Internet to further protect against direct-to-origin attacks without impeding quick, reliable content delivery
Security Monitor: Real-time visibility into security events and the ability to drill down into attack alerts to learn what’s being attacked, by whom, what defense capabilities triggered the attack declaration and what specifically in the requests triggered site defenses
Logging: Increase your threat posture awareness by integrating WAF event logs with your security information and event management (SIEM) or other reporting solution through the Log Delivery Service (LDS)