Get In Touch
Chat with Sales
- Call us
- Customer Support For immediate customer support please call +44 1784 22 5400 or email us at email@example.com
- Email Us Please email Akamai Sales and we will contact you within 1-2 business days.
Proactive protection against malware
Enterprise Threat Protector (ETP) enables security teams to proactively identify, block, and mitigate targeted threats such as malware, ransomware, phishing, and data exfiltration that exploit the Domain Name System (DNS). Powered by real-time intelligence from Akamai Cloud Security Intelligence and Akamai’s proven, globally distributed recursive DNS platform, Enterprise Threat Protector efficiently delivers security, control, and visibility to the enterprise while easily integrating with your existing network defenses.
Real-time Akamai Threat Intelligence
Up-to-the minute threat intelligence with low false positives based on Akamai’s visibility into 15-30% of daily web traffic, 2.2 Trillion Recursive DNS requests and propriety Data Science algorithms.
Analysis and Reporting
Dashboards provide real-time insight into all outbound enterprise DNS traffic, as well as threat and AUP events.
Customer-Categorized Threat Customization
Security teams can quickly integrate existing threat intelligence feeds, extending value from your existing security investments.
DNS logs are retained for 30 days and can easily be exported as a CSV file or integrated into a SIEM for further analysis.
Acceptable Use Policy Management
Customize and enforce enterprise acceptable use policy and ensure compliance by limiting which content categories can and cannot be accessed.
All DNS requests sent to Enterprise Threat Protector have DNSSEC enabled.
How Does Enterprise Threat Protector Work?
As every web request from your network begins with DNS, it’s the perfect control point to secure company-wide visibility into web requests and apply a security policy.
By simply directing your enterprise’s external recursive DNS traffic to Akamai’s Enterprise Threat Protector service, you can uniformly and immediately block employees from accessing malicious domains and services. And since this validation happens before the IP connection is made, threats are stopped earlier in the security kill chain and further away from your enterprise.
Protection Against Malware for Devices that are On- or Off-Network
Apply policy to block malicious activity across your entire enterprise in minutes. Use the DNS control point to uniformly and immediately block malicious domains and communications.
Guest Wi-Fi Acceptable Use Policy
Enforce an Acceptable Use policy across your guest wi-fi for brand protection.
Enforce an Enterprise Acceptable Use Policy
Block inappropriate content across the enterprise quickly and effectively.
A high-level overview of Enterprise Threat Protector features and benefits.Download Now
Understand more about how Enterprise Threat Protector works, explore Akamai's Cloud Security Intelligence, and familiarize yourself with the product's cloud-based management portal. Also examine deployment, configuration, and monitoring capabilities.Download Now
Reference Architecture Diagram: Off-Network Device
Learn how Akamai protects devices while off network.View Now
Reference Architecture Diagram: On-Network Device
Learn how Akamai protects devices while on network.View Now
See just how quick and simple it is to configure and deploy Enterprise Threat Protector across your entire enterprise in this 5-minute demo video.Watch the Video
Quick Start Guide: Enterprise Protection
The quick start guide provides guidance on how to configure and monitor DNS activity to identify and block threats, such as malware, phishing, DNS data exfiltration, and command and control communication using Enterprise Threat Protector.View Now
Quick Start Guide: Guest WiFi Protection
The quick start guide provides guidance on how to configure, apply, and monitor an Acceptable Use Policy (AUP) for guest Wi-Fi networks using Enterprise Threat Protector.View Now
Enterprise Threat Monitor
This real-time visualization shows the phishing, malware, and command & control threats that Akamai is blocking (for customers) through its Intelligent Platform.Learn More
Ponemon Institute report: Securing the Enterprise Against Cyber Attacks
Ponemon surveyed 600+ IT security practitioners to identify the most significant challenges to securing the enterprise. Learn more about theses barriers as well as the security practices and perceptions of high-performing organizations.View the Report
How Securing Recursive DNS Proactively Protects Your Network
Recursive DNS doesn’t have to be a security vulnerability. Learn more about the simple and effective control-point this Internet protocol can provide.Read the White Paper
Why Akamai Uses Enterprise Threat Protector
Watch an interview with Keith Hills, Director of Enterprise IT Risk & Information Security at Akamai.Watch the Video
Advanced, Targeted Threats: What do They Mean for Your Bottom Line?
Examine the business impact of malware, ransomware, and phishing, as well as the cost of the average data breach. Given the significant economic impact of these threats, understanding your financial exposure and employing a layered defense simply makes sense.Read the Blog
What Are Domain Generation Algorithms and Why You Should Care?
Learn more about this common evasion and obfuscation technique that is increasingly being used by malicious actors. And understand how DGA effectiveness can be minimized: visibility, evolved algorithms, and ample data are vital.Read the Blog
Perform Group selects Akamai to transform its security posture and gain faster identification, isolation, and resolution of threats.Read the Case Study
Learn more about the significant and quantifiable benefits that Enterprise Threat Protector has delivered since being deployed on Akamai’s corporate network.Read the Case Study
U.S. college protects campus network from malware by utilizing Enterprise Threat Protector.Read the Case Study
Europe-based manufacturing company improves their security posture by utilizing Enterprise Threat Protector to check all external recursive DNS traffic and requested domains.Read the Case Study
Family-friendly entertainment venue utilizes Enterprise Threat Protector to secure free wi-fi from phishing and malware threats and create a new Acceptable Use Policy.Read the Case Study
Large international retailer selects Enterprise Threat Protector to secure free wi-fi and create a new Acceptable Use Policy.Read the Case Study
Financial Services Vertical
Leading financial services firm chooses Enterprise Threat Protector for an additional layer of security framework.Read the Case Study