Kona Site Defender

Integrated protection for websites and APIs against DDoS and targeted web application attacks

Are you struggling to protect your applications against an increasingly diverse range of threats while being asked to implement strategic business initiatives such as cloud adoption and mobile transformation? You have come to the right place. Kona Site Defender is designed to protect your web and mobile assets from rapidly evolving targeted attacks, so you can focus on innovating your business without fear. You get comprehensive protection from latest attacks against your websites and API infrastructure, including DDoS, web application, and direct-to-origin attacks. Virtual patching keeps your application development on schedule while management APIs allow for a seamless integration into your DevOps processes. The Managed Kona Site Defender Service is a managed security service designed to help build a responsive cloud security strategy.

Try Akamai Security Products

Customers Trust in Akamai for their Security and Performance Concerns

Mature security practitioners know that the best Application Security and DDoS Protection requires flexible solutions as well as an ongoing commitment to update and customize their security posture. Kona Site Defender provides a flexible solution with an unlimited number of custom rules, protection for mobile applications. Security rules can be fine-tuned further with Client Reputation, added protection for your DNS layer or an emergency DDoS Attack, and bot mitigation are optional add ons. Built on the globally distributed Akamai Intelligent Platform™ Kona Site Defender not only provides protection at scale but also adaptive caching of your content, delivering your customers a supreme end-user experience, even when under attack. A single pane of glass security analytics tool provides visibility to the level of depth you desire and across all mitigation solutions.

Kona Site Defender provides a flexible solution with access to an industry leading Professional Services team that can service your security needs over the long haul.

Akamai is used by 6,000 of the largest online companies, including the top 30 media and entertainment companies, the 20 top global e-commerce sites, 150 of the world’s leading news portals, and 100 of the world’s largest banks. The popularity and ubiquity of our platform gives us visibility into the disposition of both legitimate and malicious traffic, across geographies and industry verticals. That visibility, along with our Cloud Security Intelligence Data Analysis Engine, allows us to deliver customizable, flexible, accurate and scalable application and mobile security.

Additional Resources

  • Kona Site Defender
    Application security tailored to your business, security posture, and attack surface, powered by the Akamai Intelligent Platform.

    Download the Product Brief
  • The Power of SIEM: Reducing Detection and Response Time in the Attack Chain
    In this white paper, we will explore how you can build and automate actionable threat intelligence by using technologies from both Akamai and Splunk, in a SIEM architecture.h Akamai and Splunk, in a SIEM architecture.

    Download the White Paper
  • Checklist: 8 Best DDoS Mitigation Practices
    Having a DDoS mitigation plan in place can make the difference between organization-wide chaos and an orderly and timely DDoS response. This brief outlines eight steps you can take to prepare for a DDoS attack.

    Download the Checklist
  • Strategies for API Security
    Cyber-attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. In this white paper you will learn about APIs, how and why they are targets for attacks, security models, and how Akamai can help.

    Download the White Paper
  • Akamai API Gateway: Scale access and simplify policy controls for APIs
    APIs empower you to enable new business models but they can also increase your threat surface and expose you to downtime and misuse. Leverage Akamai API Gateway to govern API traffic by authenticating, authorizing, and controlling requests from your API consumers.

    Learn More
  • Improving Web Application Security: The Akamai Approach to WAF
    Many organizations have web application firewall solutions deployed today. However, these deployments often fail to meet their initial expectations in terms of effectiveness, ease of management and impact on protected web applications.

    Download the White Paper
  • Comparing Approaches for Web, DNS, and Infrastructure Security
    In today’s faster forward world, denial of service, data breaches, and SQL injection attacks are growing faster than on-premises firewalls can scale – you need a cloud-based security solution to meet the threat.

    Download the White Paper
  • Strategies for CyberAttack Protection – Managed Web Security Services
    Internet-based businesses are teeming with consumer sales, B2B transactions and users of SaaS applications and online games. It is imperative that online businesses adopt web security solutions to keep unwanted visitors out while keeping websites and applications accessible.

    Download the White Paper
  • State of the Internet – Security reports

    Learn More
  • Threat Advisories

    Learn More