Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 1 Rating

Total
ease
features
design
support

Alternatives to Consider

  • A10 Defend Threat Control Reviews & Ratings
    32 Ratings
    Company Website
  • SKUDONET Reviews & Ratings
    6 Ratings
    Company Website
  • Fastly Reviews & Ratings
    793 Ratings
    Company Website
  • Heimdal Endpoint Detection and Response (EDR) Reviews & Ratings
    54 Ratings
    Company Website
  • Aikido Security Reviews & Ratings
    71 Ratings
    Company Website
  • Huntress Reviews & Ratings
    763 Ratings
    Company Website
  • Auth0 Reviews & Ratings
    860 Ratings
    Company Website
  • TruGrid Reviews & Ratings
    64 Ratings
    Company Website
  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    372 Ratings
    Company Website
  • SpamTitan Reviews & Ratings
    812 Ratings
    Company Website

What is Kona Site Defender?

Protect your applications and APIs from sophisticated and widespread threats by implementing a web application firewall in conjunction with edge-based DDoS defense. Kona Site Defender delivers strong application security situated at the network's edge, complicating the efforts of potential attackers to access your applications. Processing an impressive 178 billion WAF rule triggers on a daily basis, Akamai equips users with unmatched insights into attack trends, allowing for the provision of customized and effective WAF protections that evolve in response to new threats. Its adaptable security framework is crafted to safeguard your entire application ecosystem while also addressing changing business requirements, including API security and cloud migrations, all while minimizing management overhead. Additionally, Kona Site Defender is equipped with a cutting-edge anomaly detection system that ensures remarkable accuracy from the outset. It is crucial to have security solutions that can adjust to fulfill your unique needs and cater to the varied organizations you support, thereby establishing a robust defense approach. This ensures that your applications remain resilient against both current and future security challenges.

What is DataDome?

DataDome safeguards companies against cyber fraud and automated attacks in real time, ensuring safe digital interactions across various platforms including websites, mobile applications, advertisements, and APIs. Recognized as a Leader in the Forrester Wave for Bot Management, DataDome utilizes artificial intelligence to analyze an astonishing 5 trillion signals every day, providing unparalleled defense without sacrificing performance. Its Cyberfraud Protection Platform integrates effortlessly with any technology infrastructure, resulting in an exceptionally rapid time to value. Fully automated, it identifies and halts all malicious clicks, unauthorized signups, and fraudulent account logins. Supported by a worldwide team of expert threat analysts and round-the-clock Security Operations Center (SOC) assistance, DataDome successfully thwarts over 350 billion attacks each year, ensuring consistent and reliable protection. Additionally, DataDome provides clear insights, straightforward implementation, and over 50 integrations, enhancing its usability. The solution guarantees that there is no added latency for protected endpoints, responding to every request in less than 2 milliseconds, thanks to its network of over 30 regional Points of Presence (PoPs) and adaptive scaling capabilities. DataDome is designed to be user-friendly and frictionless for consumers, making it easier to maintain optimal security. Furthermore, it features the only secure, user-friendly, and privacy-respecting CAPTCHA and Device Check, with the added benefit of being the first invisible alternative available in the market.

Media

Media

Integrations Supported

Amazon CloudFront
Axonius
CapSolver
Cloudflare
Datacard Secura
Entrust Certificate Hub
F5 BIG-IP
Fastly
HAProxy Enterprise
IBM QRadar SIEM
Ivee
Kubernetes
NGINX
OpenText ArcSight Enterprise Security Manager
Salesforce Commerce Cloud
Splunk Enterprise
Varnish

Integrations Supported

Amazon CloudFront
Axonius
CapSolver
Cloudflare
Datacard Secura
Entrust Certificate Hub
F5 BIG-IP
Fastly
HAProxy Enterprise
IBM QRadar SIEM
Ivee
Kubernetes
NGINX
OpenText ArcSight Enterprise Security Manager
Salesforce Commerce Cloud
Splunk Enterprise
Varnish

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

$1590 per month
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Akamai Technologies

Date Founded

1998

Company Location

United States

Company Website

www.akamai.com/us/en/products/security/kona-site-defender.jsp

Company Facts

Organization Name

DataDome

Date Founded

2015

Company Location

New York

Company Website

datadome.co

Categories and Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Categories and Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Popular Alternatives

Popular Alternatives

K2 Security Platform Reviews & Ratings

K2 Security Platform

K2 Cyber Security