What is Kona Site Defender?

Protect your applications and APIs from sophisticated and widespread threats by implementing a web application firewall in conjunction with edge-based DDoS defense. Kona Site Defender delivers strong application security situated at the network's edge, complicating the efforts of potential attackers to access your applications. Processing an impressive 178 billion WAF rule triggers on a daily basis, Akamai equips users with unmatched insights into attack trends, allowing for the provision of customized and effective WAF protections that evolve in response to new threats. Its adaptable security framework is crafted to safeguard your entire application ecosystem while also addressing changing business requirements, including API security and cloud migrations, all while minimizing management overhead. Additionally, Kona Site Defender is equipped with a cutting-edge anomaly detection system that ensures remarkable accuracy from the outset. It is crucial to have security solutions that can adjust to fulfill your unique needs and cater to the varied organizations you support, thereby establishing a robust defense approach. This ensures that your applications remain resilient against both current and future security challenges.

Integrations

Offers API?:
Yes, Kona Site Defender provides an API

Screenshots and Video

Company Facts

Company Name:
Akamai Technologies
Date Founded:
1998
Company Location:
United States
Company Website:
www.akamai.com/us/en/products/security/kona-site-defender.jsp

Product Details

Deployment
SaaS
Training Options
Documentation Hub
Online Training
Support
Standard Support
24 Hour Support
Web-Based Support

Product Details

Target Company Sizes
Individual
1-10
11-50
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
Target Organization Types
Mid Size Business
Small Business
Enterprise
Freelance
Nonprofit
Government
Startup
Supported Languages
English

Kona Site Defender Categories and Features

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Application Security Software

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation