Enterprise Threat Protector Intro Image

Proactive protection against zero-day malware and phishing

Enterprise Threat Protector is a cloud-based secure web gateway (SWG) that enables security teams to ensure that users and devices can safely connect to the Internet, regardless of where they are connecting from, without the complexity associated with legacy, appliance-based approaches.

Deployed on the globally distributed Akamai Intelligent Edge Platform, Enterprise Threat Protector proactively identifies, blocks, and mitigates targeted threats such as malware, ransomware, phishing, DNS data exfiltration, and advanced zero-day attacks.

Enterprise Threat Protector is a cloud-based secure web gateway that can be deployed in minutes and delivers persistent, universal security.

Try Now
Spotlight on Enterprise Threat Protector
???Watch the Video???

We’re Constantly Monitoring Enterprise Threats

This real-time visualization shows the phishing, malware, and command & control threats that Akamai is blocking (for customers) through its Intelligent Platform and its unprecedented insights into DNS and IP traffic.

Threat Trends
  • 24 Hours
  • 7 Days
  • 30 Days
Threat Breakdown - Last Hour
C&C -

Quickly Improve Security Posture

Add an additional layer of proactive security using DNS to quickly and uniformly block malicious web traffic — for all of your users, on network and remote.

Secure HQ and Branch Office Direct Internet Access (DIA) Connections

Protect web traffic at every corporate location and for off-network users quickly and without complexity with a cloud-delivered secure web gateway (SWG).

Simplify Data Center/IaaS DNS Visibility and Threat Protection

Your business applications may be accessing malicious external resources. Simply redirect your application DNS traffic to Enterprise Threat Protector for 100% visibility, increased security, and improved compliance.

Protect Guest Wi-Fi and Enforce AUPs

Easily enforce acceptable use policies (AUPs) across your corporate and guest networks to protect both your brand and users.

Learn More About Threat Protection

If Akamai’s capabilities were to be maintained in-house, we would have to hire, train, and retain substantial and expensive security resources. We find that it’s more cost-effective to use Akamai’s products than attempt to hire and retain scarce security talent.
— Head of Security and Compliance, Forrester TEI Report

Try the ROI Calculator

Ruthy Mabe
???Watch the Video???

Customer Story: MCNC

“[Our customers’ security] resources are limited. The ETP solution is one that is easy to deploy and lightweight. It’s one that we can walk through with a 30-minute configuration call. And they’re up and running and protected…We have a CIO [who said] something like, ‘It paid for itself in one attack.’ ” — Ruthy Mabe, Security Services Program Manager, MCNC

Educational Testing Service Customer Testimonial Thumbnail
???Watch the Video???

Customer Story: Educational Testing Service

"We’re dealing with attacks as any company would be…When people think of ETS, the first thing they think of is the test question. Protecting that intellectual property is very important. That’s one of the reasons we leverage Akamai." — Fred Manno, Business Technology Leader, Educational Testing Service

Real-Time Akamai Threat Intelligence

Up-to-the-minute threat intelligence based on Akamai’s visibility into 15–30% of daily web traffic, up to 2.2 trillion daily recursive DNS requests, hundreds of third-party data sources, and proprietary data science algorithms. Produces incredibly low rates of false positives.

Security Insights

Quickly understand why Akamai has added a domain or a URL to its threat intelligence lists.

Inline and Offline Payload Analysis

Four advanced malware detection engines identify and block complex advanced threats and improve zero-day protection.


Web and DNS logs are retained for 30 days and can easily be exported as a .CSV file or integrated into a SIEM for further analysis.

Cloud Sandbox

Dynamic analysis identifies and protects against complex, obfuscated malware.

Analysis and Reporting

Real-time insights via an easy-to-use dashboard into all outbound web and DNS traffic, as well as threat and acceptable use policy events, available via a single dashboard.

Customer-Categorized Threat Customization

Integrate existing threat intelligence feeds, extending value from your existing security investments.

Acceptable Use Policy (AUP) Management

Customize and enforce your enterprise AUP, simply limiting access to certain content categories. Ensure compliance with centrally managed, cloud-based updates.

View the Feature Matrix

How Does Enterprise Threat Protector Work?

How Does Enterprise Threat Protector Work

Enterprise Threat Protector uses multiple layers of protection — DNS, URL, and inline and offline payload analysis — to deliver optimal security and reduced complexity, without impacting performance. All of this protection can be delivered by simply directing web traffic to Enterprise Threat Protector using a lightweight client or by forwarding web traffic from another web proxy via proxy chaining.

All requested domains and URLs are checked against Akamai’s real-time domain risk-scoring threat intelligence. Malicious domains and HTTP/S URLs are blocked. The HTTP and HTTPS payloads are then scanned either inline or offline using multiple advanced malware-detection engines, including an offline cloud sandbox.

Resources: Enterprise Threat Protector