Enterprise Threat Monitor Intro

Enterprise Threat Monitor

This real-time visualization shows the phishing, malware, and command & control threats that Akamai is blocking (for customers) through its Intelligent Platform and its unprecedented insights into DNS and IP traffic.

Enterprise Threat Monitor

Print

Threat Log

PHISHING THREAT

Source:

Destination:

Threat Breakdown - Last Hour

MALWARE
PHISHING
C&C

Threat Trends
  • 24 Hours
  • 7 Days
  • 30 Days

Breakdown by Threat Type

Average Threats Per Hour Trends

Malware

Past Day -

60

Past Week -

60

Past Month -

60

Phishing

Past Day -

60

Past Week -

60

Past Month -

60

Command & Control

Past Day -

60

Past Week -

60

Past Month -

60
  • - avg threats per hour, all time
  • - avg threats per hour for given time frame
Print Back To Top
The Threat Log lists a sample of the of malware, phishing, and command and control threats in the previous hour. Hover over any of the items in the log to get information on the threat type and the source and destination locations of the requests. This Donut Chart breaks down the malware, phishing, and command and control threats mitigated by Akamai  in the last hour. This threat profile can change rapidly. The column chart on the left shows the longer-term enterprise threat trends going back up to 30 days. This Column Chart breaks down the malware, phishing, and command and control threats mitigated by Akamai  over time. You can toggle the length of time using the links below. The available options are 24 hours, 7 days and 30 days. Please refer to the donut chart next to the column chart to get an idea of what threats we’ve observed in the past hour. The charts below take a deeper look at the malware, phishing, and command and control threats mitigated by Akamai  over time. The bullet charts show threats per hour for each time period, the vertical white line is the all-time average for this threat, the inner bar represents the average threats per hour – the color - green or red - indicates whether or not the value for that time period is above or below the all-time average. The sparklines show a linear trend for the threat type for the given time period. Akamai is constantly logging the threat events that our Enterprise Threat Protector service is proactively blocking for our customers. Enterprise Threat Protector is a cloud-based service that allows organizations to quickly and easily deploy a DNS-based security layer that proactively protects the organization against malware, phishing, and command and control.
The threat log and map display a sample set of the threats that Enterprise Threat Protector has blocked in the previous hour. The arrows show the source location of the device that made the request to a malicious domain and where the requested malicious domain’s web server is located.
The threat map shows the geographic location of where a user request is being made from and the intended geographic destination location if the request had not been blocked by Enterprise Threat Protector. The arrows are colored to indicate the type of threat being displayed. The dots are a a representative sample of the source locations that have made a request or requests for malicious domains. To show a threat arrow, double click on the dot.
Maximize
Light Theme