Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • A10 Defend Threat Control Reviews & Ratings
    32 Ratings
    Company Website
  • SKUDONET Reviews & Ratings
    6 Ratings
    Company Website
  • Fastly Reviews & Ratings
    793 Ratings
    Company Website
  • Heimdal Endpoint Detection and Response (EDR) Reviews & Ratings
    54 Ratings
    Company Website
  • Aikido Security Reviews & Ratings
    71 Ratings
    Company Website
  • Huntress Reviews & Ratings
    763 Ratings
    Company Website
  • Auth0 Reviews & Ratings
    860 Ratings
    Company Website
  • TruGrid Reviews & Ratings
    64 Ratings
    Company Website
  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    372 Ratings
    Company Website
  • SpamTitan Reviews & Ratings
    812 Ratings
    Company Website

What is Kona Site Defender?

Protect your applications and APIs from sophisticated and widespread threats by implementing a web application firewall in conjunction with edge-based DDoS defense. Kona Site Defender delivers strong application security situated at the network's edge, complicating the efforts of potential attackers to access your applications. Processing an impressive 178 billion WAF rule triggers on a daily basis, Akamai equips users with unmatched insights into attack trends, allowing for the provision of customized and effective WAF protections that evolve in response to new threats. Its adaptable security framework is crafted to safeguard your entire application ecosystem while also addressing changing business requirements, including API security and cloud migrations, all while minimizing management overhead. Additionally, Kona Site Defender is equipped with a cutting-edge anomaly detection system that ensures remarkable accuracy from the outset. It is crucial to have security solutions that can adjust to fulfill your unique needs and cater to the varied organizations you support, thereby establishing a robust defense approach. This ensures that your applications remain resilient against both current and future security challenges.

What is Bitglass?

Bitglass delivers comprehensive data and threat protection for every interaction, irrespective of the device or location used. Its extensive global network, featuring over 200 points of presence, guarantees outstanding performance and reliability, thereby ensuring business continuity for organizations of all sizes. While transitioning to the cloud grants your organization increased flexibility and cost savings, it remains essential to retain control over your data. The cutting-edge Next-Gen Cloud Access Security Broker (CASB) solution from Bitglass enables your organization to safely engage with both managed and unmanaged cloud applications. The Zero-day CASB Core from Bitglass is crafted to consistently adapt to the dynamic nature of enterprise cloud environments, offering real-time defenses against data breaches and security threats. In addition, the Next-Gen CASB intelligently learns and evolves in reaction to new cloud applications, emerging malware threats, and the introduction of additional devices, guaranteeing thorough protection across all platforms. This remarkable adaptability renders Bitglass an indispensable ally in addressing the challenges associated with cloud security, as it continuously enhances its capabilities to meet the ever-evolving demands of modern enterprises.

Media

Media

Integrations Supported

Amazon Web Services (AWS)
Axonius
Box
Confluence
CrowdStrike Falcon
CylanceENDPOINT
Datacard Secura
Dropbox
Emerge Cyber Security
Gmail
Google Workspace
IBM QRadar SIEM
Microsoft 365
Microsoft Exchange
OpenText ArcSight Enterprise Security Manager
Proficio
Salesforce
Slack
Splunk Enterprise
Workday HCM

Integrations Supported

Amazon Web Services (AWS)
Axonius
Box
Confluence
CrowdStrike Falcon
CylanceENDPOINT
Datacard Secura
Dropbox
Emerge Cyber Security
Gmail
Google Workspace
IBM QRadar SIEM
Microsoft 365
Microsoft Exchange
OpenText ArcSight Enterprise Security Manager
Proficio
Salesforce
Slack
Splunk Enterprise
Workday HCM

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Akamai Technologies

Date Founded

1998

Company Location

United States

Company Website

www.akamai.com/us/en/products/security/kona-site-defender.jsp

Company Facts

Organization Name

Bitglass

Date Founded

2013

Company Location

United States

Company Website

www.bitglass.com

Categories and Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Categories and Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Popular Alternatives

Popular Alternatives

K2 Security Platform Reviews & Ratings

K2 Security Platform

K2 Cyber Security
CloudSOC CASB Reviews & Ratings

CloudSOC CASB

Broadcom