Get In Touch
Chat with Sales
- Call us
- Customer Support For immediate customer support please call +44 1784 22 5400 or email us at firstname.lastname@example.org
- Email Us Please email Akamai Sales and we will contact you within 1-2 business days.
Proactive protection against malware
Enterprise Threat Protector (ETP) enables security teams to proactively identify, block, and mitigate targeted threats such as malware, ransomware, phishing, and data exfiltration that exploit the Domain Name System (DNS). Powered by real-time intelligence from Akamai Cloud Security Intelligence and Akamai’s proven, globally distributed recursive DNS platform, Enterprise Threat Protector efficiently delivers security, control, and visibility to the enterprise while easily integrating with your existing network defenses.
Real-time Akamai Threat Intelligence
Up-to-the minute threat intelligence with low false positives based on Akamai’s visibility into 15-30% of daily web traffic, 2.2 Trillion Recursive DNS requests and propriety Data Science algorithms.
Analysis and Reporting
Dashboards provide real-time insight into all outbound enterprise DNS traffic, as well as threat and AUP events.
Customer-Categorized Threat Customization
Security teams can quickly integrate existing threat intelligence feeds, extending value from your existing security investments.
DNS logs are retained for 30 days and can easily be exported as a CSV file or integrated into a SIEM for further analysis.
Acceptable Use Policy Management
Customize and enforce enterprise acceptable use policy and ensure compliance by limiting which content categories can and cannot be accessed.
All DNS requests sent to Enterprise Threat Protector have DNSSEC enabled.
How Does Enterprise Threat Protector Work?
As every web request from your network begins with DNS, it’s the perfect control point to secure company-wide visibility into web requests and apply a security policy.
By simply directing your enterprise’s external recursive DNS traffic to Akamai’s Enterprise Threat Protector service, you can uniformly and immediately block employees from accessing malicious domains and services. And since this validation happens before the IP connection is made, threats are stopped earlier in the security kill chain and further away from your enterprise.
Protection Against Malware for Devices that are On- or Off-Network
Apply policy to block malicious activity across your entire enterprise in minutes. Use the DNS control point to uniformly and immediately block malicious domains and communications.
Guest Wi-Fi Acceptable Use Policy
Enforce an Acceptable Use policy across your guest wi-fi for brand protection.
Enforce an Enterprise Acceptable Use Policy
Block inappropriate content across the enterprise quickly and effectively.
A high-level overview of Enterprise Threat Protector features and benefits.Download Now
Understand more about how Enterprise Threat Protector works, explore Akamai's Cloud Security Intelligence, and familiarize yourself with the product's cloud-based management portal. Also examine deployment, configuration, and monitoring capabilities.Download Now
Reference Architecture Diagram: Off-Network Device
Learn how Akamai protects devices while off network.View Now
Reference Architecture Diagram: On-Network Device
Learn how Akamai protects devices while on network.View Now
See just how quick and simple it is to configure and deploy Enterprise Threat Protector across your entire enterprise in this 5-minute demo video.Watch the Video
Quick Start Guide: Enterprise Protection
The quick start guide provides guidance on how to configure and monitor DNS activity to identify and block threats, such as malware, phishing, DNS data exfiltration, and command and control communication using Enterprise Threat Protector.View Now
Quick Start Guide: Guest WiFi Protection
The quick start guide provides guidance on how to configure, apply, and monitor an Acceptable Use Policy (AUP) for guest Wi-Fi networks using Enterprise Threat Protector.View Now
Enterprise Threat Monitor
This real-time visualization shows the phishing, malware, and command & control threats that Akamai is blocking (for customers) through its Intelligent Platform.Learn More
How Securing Recursive DNS Proactively Protects Your Network
Recursive DNS doesn’t have to be a security vulnerability. Learn more about the simple and effective control-point this Internet protocol can provide.Read the White Paper
Why Akamai Uses Enterprise Threat Protector
Watch an interview with Keith Hills, Director of Enterprise IT Risk & Information Security at Akamai.Watch the Video
Advanced, Targeted Threats: What do They Mean for Your Bottom Line?
Examine the business impact of malware, ransomware, and phishing, as well as the cost of the average data breach. Given the significant economic impact of these threats, understanding your financial exposure and employing a layered defense simply makes sense.Read the Blog
What Are Domain Generation Algorithms and Why You Should Care?
Learn more about this common evasion and obfuscation technique that is increasingly being used by malicious actors. And understand how DGA effectiveness can be minimized: visibility, evolved algorithms, and ample data are vital.Read the Blog
Enterprise Threat Protector Case Study: Financial Vertical
Financial Vertical: A leading financial services firm chooses Enterprise Threat Protector as an additional layer of security framework.Learn More
Enterprise Threat Protector Case Study: Retail Vertical
Customer Stories: A large international retailer selects Enterprise Threat Protector to secure free wi-fi and create a new Acceptable Use Policy.Learn More
Enterprise Threat Protector Case Study: Entertainment Vertical
Customer Stories: A family-friendly entertainment venue utilizes Enterprise Threat Protector to secure free wi-fi from phishing and malware threats and create a new Acceptable Use Policy.Learn More
Enterprise Threat Protector Case Study: Commerce Vertical
Customer Stories: Learn how a prominent online retailer utilizes Enterprise Threat Protector to block command and control requests related to instances of Locky ransomware and more.Learn More
Enterprise Threat Protector Case Study: Manufacturing Vertical
Customer Stories: A European customer improves their security posture by utilizing Enterprise Threat Protector to check all external recursive DNS traffic and requested domains.Learn More