Enterprise Threat Protector proactively identifies, blocks, and mitigates targeted threats such as malware, ransomware, phishing, DNS data exfiltration, and advanced zero-day attacks. Enterprise Threat Protector is a Secure Internet Gateway (SIG) that enables security teams to ensure that users and devices can safely connect to the Internet, regardless of where they are connecting from, without the complexity associated with legacy approaches.
This real-time visualization shows the phishing, malware, and command & control threats that Akamai is blocking (for customers) through its Intelligent Platform and its unprecedented insights into DNS and IP traffic.
Improve Security Posture Everywhere
Your recursive DNS is likely unprotected, and as such, could be exploited. In a matter of minutes, add a layer of security that uses DNS as a control point to uniformly and immediately block malicious domains and communications for all of your users, whether they are on or off network.
Secure Direct Internet Access (DIA) Connections
Protect your branch DIA traffic quickly with zero complexity, without replicating your security stack at every location.
Protect Guest Wi-Fi
Easily enforce an acceptable use policy (AUP) across your guest Wi-Fi for both brand and user protection.
“I think that Akamai’s system, which uses the company’s extensive threat intelligence to pre-emptively block unauthorized DNS queries, is a very simple and effective measure against targeted threats." — Kazuo Suzuki, information systems expert in the Information Systems Division, Corporate Planning Division.
Real-time Akamai Threat Intelligence
Up-to-the-minute threat intelligence with low false positives based on Akamai’s visibility into 15-30% of daily web traffic, 2.2 trillion recursive DNS requests, and proprietary data science algorithms.
Analysis and Reporting
Real-time insight via an easy-to-use dashboard into all outbound enterprise DNS traffic, as well as threat and acceptable use policy events.
Inline Real-time Payload Analysis
Three advanced malware detection engines identify and block complex advanced threats and improve zero-day protection.
DNS logs are retained for 30 days and can easily be exported as a .CSV file or integrated into a SIEM for further analysis.
Acceptable Use Policy (AUP) Management
Customize and enforce your enterprise AUP and ensure compliance by limiting access to certain content categories.
Quickly understand why Akamai has added a domain or a URL to its threat intelligence lists.
Customer-Categorized Threat Customization
Integrate existing threat intelligence feeds, extending value from your existing security investments.
All DNS requests sent to Enterprise Threat Protector have DNSSEC enabled.
|Acceptable Use Policy (AUP)|
|Reporting, Monitoring & Administration|
Enterprise Threat Protector uses multiple layers of protection — DNS, URL, and inline payload analysis — to deliver optimal security and reduced complexity, without impacting performance.
By simply directing your external recursive DNS traffic to Enterprise Threat Protector, all requested domains are checked against Akamai’s real-time domain risk scoring threat intelligence.
Safe domains are resolved as normal, malicious domains are blocked, and risky domains are sent to a smart selective proxy where the HTTP or HTTPS URLs are inspected to determine if they are malicious. The HTTP and HTTPS payloads from risky domains are then scanned in real-time using multiple advanced malware-detection engines.
A high-level overview of Enterprise Threat Protector features and benefits.Download Now
Reference Architecture Diagram: Off-Network Device
Learn how Akamai protects devices while off network.View Now
Reference Architecture Diagram: On-Network Device
Learn how Akamai protects devices while on network.View Now
Reference Architecture Diagram: Direct Internet Access (DIA) Connection
Learn how to protect your DIA connection against zero-day threats.View Now
Reference Architecture Diagram: Guest Wi-Fi
Learn how to secure your guest Wi-Fi across all enterprise locations to protect your users and brand reputation.View Now
See just how quick and simple it is to configure and deploy Enterprise Threat Protector across your entire enterprise in this 5-minute demo video.Watch the Video
Quick Start Guide: Enterprise Protection
The quick start guide provides guidance on how to configure and monitor DNS activity to identify and block threats, such as malware, phishing, DNS data exfiltration, and command and control communication using Enterprise Threat Protector.View Now
Quick Start Guide: Guest WiFi Protection
The quick start guide provides guidance on how to configure, apply, and monitor an Acceptable Use Policy (AUP) for guest Wi-Fi networks using Enterprise Threat Protector.View Now
Enterprise Threat Monitor
This real-time visualization shows the phishing, malware, and command and control (CnC) threats that Akamai is blocking (for customers) through its Intelligent Platform.Learn More
Ponemon Institute report: Securing the Enterprise Against Cyber Attacks
Ponemon surveyed 600+ IT security practitioners to identify the most significant challenges to securing the enterprise. Learn more about theses barriers as well as the security practices and perceptions of high-performing organizations.View the Report
Fixing the Hole in Your Layered Enterprise Security Strategy
Read this white paper to learn why integrating a DNS-based solution with layered enterprise and Zero Trust security strategies is your best defense.Read the White Paper
Why Akamai Uses Enterprise Threat Protector
Watch an interview with Keith Hills, Director of Enterprise IT Risk & Information Security at Akamai.Watch the Video
Zero Trust Transformation with a Secure Internet Gateway (SIG)
Learn more about how to accelerate your Zero Trust security transformation with Enterprise Threat Protector.Read the Blog
How Securing Recursive DNS Proactively Protects Your Network
Recursive DNS doesn’t have to be a security vulnerability. Learn more about the simple and effective control-point this Internet protocol can provide.Read the White Paper
DNS Is a Unique (and Necessary) Security Control
DNS is an effective and easily-manipulated entry point for malicious actors. Learn more about rDNS security as a unique control plane and understand why it is difficult to manage via traditional security mechanisms.Read the Blog
Marshall Community Schools
Marshall School District added a critical security layer with Enterprise Threat Protector, giving Marshall's IT resources peace of mind regarding the threat of malicious attacks and enabling them to focus on other priorities.Read the Story
Kaizen chose Akamai to protect their network and improve security for remote employees. Implementing Enterprise Threat Protector allowed the digital marketing company to fully understand the security threats and breaches present on their network.Read the Story
DAZN/Perform Group selected Akamai to transform its security posture. As a result, the subscription video streaming service gained faster identification, isolation, and resolution of threats.Read the Story
Cranfield University added a simple yet effective DNS security layer to its network with Akamai Enterprise Threat Protector. The university is better able to block, monitor, and mitigate threats while keeping the network open to users.Read the Story
Topcon utilizes Akamai’s Enterprise Threat Protector to preemptively block unauthorized DNS queries, securing the manufacturer against targeted attacks.Read the Story
Learn more about the significant and quantifiable benefits that Enterprise Threat Protector has delivered since being deployed on Akamai’s corporate network.Read the Case Study
U.S. college protects campus network from malware by utilizing Enterprise Threat Protector.Read the Case Study
Family-friendly entertainment venue utilizes Enterprise Threat Protector to secure free wi-fi from phishing and malware threats and create a new Acceptable Use Policy.Read the Case Study
Financial Services Vertical
Leading financial services firm chooses Enterprise Threat Protector for an additional layer of security framework.Read the Case Study
Europe-based manufacturing company improves their security posture by utilizing Enterprise Threat Protector to check all external recursive DNS traffic and requested domains.Read the Case Study
India-based retailer centralized network security by utilizing Enterprise Threat Protector.Read the Case Study
Large international retailer selects Enterprise Threat Protector to secure free wi-fi and create a new Acceptable Use Policy.Read the Case Study