Ratings and Reviews 7 Ratings
Ratings and Reviews 0 Ratings
What is Source Defense?
Source Defense plays a crucial role in safeguarding web safety by securing data precisely at the point of entry. Its platform delivers a straightforward yet powerful approach to ensuring data security and meeting privacy compliance requirements. This solution effectively tackles the threats and risks associated with the growing reliance on JavaScript, third-party vendors, and open-source code within your online assets. By providing various options for code security, it also fills a significant gap in managing the risks of third-party digital supply chains, which includes regulating the actions of third-party, fourth-party, and beyond JavaScript that enhance your website's functionality. Furthermore, Source Defense Platform defends against a wide range of client-side security threats, such as keylogging, formjacking, and digital skimming, while also offering protection against Magecart attacks by extending security measures from the browser to the server environment. In doing so, it ensures a comprehensive security framework that adapts to the complexities of modern web interactions.
What is EdgeWorkers?
Akamai's EdgeWorkers offers a serverless computing framework that empowers developers to run custom JavaScript code at the network edge, significantly improving user experiences by executing tasks nearer to the users' locations. By doing this, it effectively cuts down on latency, diminishing the reliance on slower calls to origin servers, which not only accelerates performance but also bolsters security by bringing sensitive client-side logic closer to the edge. EdgeWorkers supports a wide range of applications, including A/B testing, geolocation-based content delivery, data protection compliance, dynamic website personalization, traffic management, and experience customization based on the type of device used. Developers are able to craft their JavaScript code and deploy it through various channels such as APIs, command-line interfaces, or user-friendly graphical interfaces, fully leveraging Akamai's powerful infrastructure that automatically adjusts to accommodate increased demand or traffic spikes. Furthermore, the platform integrates smoothly with Akamai's EdgeKV, a distributed key-value store, which enhances the development of data-centric applications by enabling rapid data access. This adaptability ensures that EdgeWorkers is an indispensable asset for contemporary developers focused on building agile and secure web applications. As technology continues to evolve, the importance of such innovative solutions in meeting user demands only grows more pronounced.
Integrations Supported
JavaScript
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
Source Defense
Date Founded
2014
Company Location
United States, Israel
Company Website
sourcedefense.com
Company Facts
Organization Name
Akamai
Date Founded
1998
Company Location
United States
Company Website
www.akamai.com/products/serverless-computing-edgeworkers
Categories and Features
Data Privacy Management
Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
GDPR Compliance
Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
PCI Compliance
Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management