Company Website

Ratings and Reviews 7 Ratings

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

What is Source Defense?

Source Defense plays a crucial role in safeguarding web safety by securing data precisely at the point of entry. Its platform delivers a straightforward yet powerful approach to ensuring data security and meeting privacy compliance requirements. This solution effectively tackles the threats and risks associated with the growing reliance on JavaScript, third-party vendors, and open-source code within your online assets. By providing various options for code security, it also fills a significant gap in managing the risks of third-party digital supply chains, which includes regulating the actions of third-party, fourth-party, and beyond JavaScript that enhance your website's functionality. Furthermore, Source Defense Platform defends against a wide range of client-side security threats, such as keylogging, formjacking, and digital skimming, while also offering protection against Magecart attacks by extending security measures from the browser to the server environment. In doing so, it ensures a comprehensive security framework that adapts to the complexities of modern web interactions.

What is EdgeWorkers?

Akamai's EdgeWorkers offers a serverless computing framework that empowers developers to run custom JavaScript code at the network edge, significantly improving user experiences by executing tasks nearer to the users' locations. By doing this, it effectively cuts down on latency, diminishing the reliance on slower calls to origin servers, which not only accelerates performance but also bolsters security by bringing sensitive client-side logic closer to the edge. EdgeWorkers supports a wide range of applications, including A/B testing, geolocation-based content delivery, data protection compliance, dynamic website personalization, traffic management, and experience customization based on the type of device used. Developers are able to craft their JavaScript code and deploy it through various channels such as APIs, command-line interfaces, or user-friendly graphical interfaces, fully leveraging Akamai's powerful infrastructure that automatically adjusts to accommodate increased demand or traffic spikes. Furthermore, the platform integrates smoothly with Akamai's EdgeKV, a distributed key-value store, which enhances the development of data-centric applications by enabling rapid data access. This adaptability ensures that EdgeWorkers is an indispensable asset for contemporary developers focused on building agile and secure web applications. As technology continues to evolve, the importance of such innovative solutions in meeting user demands only grows more pronounced.

Media

Media

Integrations Supported

JavaScript

Integrations Supported

JavaScript

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Source Defense

Date Founded

2014

Company Location

United States, Israel

Company Website

sourcedefense.com

Company Facts

Organization Name

Akamai

Date Founded

1998

Company Location

United States

Company Website

www.akamai.com/products/serverless-computing-edgeworkers

Categories and Features

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

Categories and Features

Popular Alternatives

Popular Alternatives

Feroot Reviews & Ratings

Feroot

Feroot Security