As an industry-leading web application firewall (WAF) and distributed denial-of-service (DDoS) protection solution, Kona Site Defender guards your online applications against the largest and most sophisticated attacks. Kona Site Defender delivers proprietary rule sets and detection logic honed from Akamai’s experience and investment in defending against the latest cyberattacks. Kona Site Defender provides complete control over protection for every business and application.
Achieve higher accuracy
Kona Site Defender is designed to deliver the lowest false positives and false negatives to ensure access to legitimate users while keeping out threats. Higher accuracy is driven by over 300 security research experts and the latest machine learning algorithms analyzing several petabytes of current threat data.
Evolve defenses to stay ahead of threats
Akamai interacts with 1.3 billion devices and harvests 130 TB of threat data every day, discovering new threats, following them as they evolve, and continuously updating WAF rules accordingly. Kona Site Defender detection logic is so advanced that it often catches zero-day attacks.
Protect your entire application
Focus your staff-resources on securing the most valuable assets, and let automated protection cover the rest. Kona Site Defender is designed to protect your entire application footprint with a single solution, interface, and platform to ensure no part of your attack surface is left open.
Secure applications anywhere
Kona Site Defender protects applications regardless of location ― on premises, in the cloud, or across multiple cloud providers ― using a single security solution. With Kona Site Defender, you can protect applications wherever they reside, without having to manage multiple security solutions.
Manage your WAF your way
Kona Site Defender provides you with total flexibility ― integrating into change control, automating protections, providing powerful APIs for your development toolchain, and offering managed services that offload security management, monitoring, and mitigation to Akamai experts 24/7.
Realize a unified view of security posture
A user-friendly online portal based on a decade of real-world experience makes it easy to view and configure security settings. With the same configuration processes across all Akamai security solutions, it’s easy to change rules and monitor activity as you increase your security posture.
Kona Site Defender runs on the Akamai Intelligent Edge Platform of more than 240,000 servers across more than 2,300 points of presence around the world, providing the resiliency and availability for you to deliver superior online experiences, even when under attack. Online traffic connects to your web application through the most optimal Akamai edge server, which drops network-layer DDoS attacks instantly.
Automated rate controls block application traffic that exceeds your defined thresholds to defend against application-layer DDoS attacks. Kona Site Defender inspects web traffic and API requests using proprietary WAF rules with high accuracy. Optional Client Reputation Service allows you to increase the level of protection by blocking traffic originating from clients with recent malicious behavior, and you can add domain name system (DNS) layer protection with Fast DNS.
Customizable and automated protection
Kona Site Defender provides customized-customizable and automated protection in one solution. Expert-curated rule sets allow you to tailor protection for accuracy in the most challenging environments. Automated protection extends security across your entire application without taxing resources.
Advanced API security
From automated to focused protection, Kona Site Defender secures your APIs. Fully automated API security inspects all requests for threats using a negative security model, while a positive security model only allows traffic within predefined specifications.
Application DDoS protection
Kona Site Defender protects your applications from the largest DDoS threats, automatically dropping network-layer attacks at the edge and responding to application-layer attacks within seconds — minimizing any potential downtime.
Akamai serves up to 30% of all Internet traffic, sees 178 billion WAF rule triggers a day, and conducts live rule testing on the world’s largest test bed — tremendous visibility that shapes Kona Site Defender protections for the lowest false positives and false negatives.
Availability and scale
With a network of over 240,000 servers in more than 2,300 points of presence worldwide, Akamai provides unmatched scale and availability to your business. Kona Site Defender is designed to defend against the largest attacks with 100% uptime and no performance degradation.
Executive-level dashboards and in-depth security analytics allow you to examine security events more closely. Integration with other security solutions and security information and event management (SIEM) provides a unified view of security posture.
Client reputation intelligence
Leveraging Akamai’s visibility into prior malicious behavior on its Intelligent Edge Platform, the optional Client Reputation service alerts you of traffic coming from known malicious clients. It provides a risk score in four different categories, tailored to your organization, so you can take appropriate action.
Managed security services
If your organization doesn’t have the resources or expertise to manage your WAF, Akamai provides managed security services to augment your team, from regular configuration tuning to 24/7 monitoring and live attack response.
Akamai Identified as a Web Application Firewall Leader by Independent Research Firm1DOWNLOAD FULL REPORT
Akamai Identified as a Leader In 2018 Gartner Magic Quadrant for Web Application Firewalls for Second Consecutive Year2DOWNLOAD FULL REPORT
Learn why Akamai leads vendor comparisons in multiple categories.Download the Report
Advanced threat research and intelligence to help manage security risks and protect against cyber attacks.Learn More
Hybrid cloud security
Security teams responsible for protecting applications deployed across multiple cloud environments can leverage a single set of controls to maintain a consistent security posture. Akamai security makes it easy for you to scale resources to quickly meet your business demands.
Comprehensive application coverage
With a growing number of applications, you must focus on fortifying high-value properties, but you cannot leave any vulnerabilities unprotected. Automated attack groups are designed to automatically secure the entire application from all attack vectors with a single management interface requiring minimal overhead.
Built on a platform delivering more than 82 Tbps of traffic, Kona Site Defender is designed to deliver always-on protection from the largest, most aggressive DDoS attacks, respond to network-layer attacks instantaneously, and protect against application-layer attacks within seconds.
Kona Site Defender uses positive and negative security models for increased protection of APIs from malicious calls and DDoS attacks. You define the types of requests allowed, and Kona Site Defender will inspect the JSON and XML content in the API request body and path for any risks.
Kona Site Defender provides a virtual patch for your applications, protecting against a broad range of known vulnerabilities out of the box, and offering custom rules to quickly secure any new exposures or tailor protection for your website traffic.
Embracing cloud, automation, and DevOps practices also requires security integration. Kona Site Defender includes management APIs that let you programmatically update security controls within agile development processes.
"Akamai has an excellent product that we are able to manage with a small but capable devops team. They have improved the availability of self-service APIs that allow us to automate Akamai endpoint management via our fully programmatic devops stack, CI and CD. The Akamai solution is at the premier price point and requires good understanding to make the most of..."Read Full Review
“The evolution of the products and the need to be constantly in front of all of the changing digital threat requires security to be not a mind set but a behaviour when either developing new sites/application or remediation of legacy environment Akamai are a strong partner and provide thought leadership around solutions and environmental threats. The platform allows flexibility and quick remediation.”Read Full Review
“No vendor/company is perfect, but Akamai is as close as I've seen. Typically, if they offer a product it does exactly what it says it does and the services staff are very good at their jobs. They're widely experienced, well trained, and technically competent beyond what we typically see with vendors...”Read Full Review
10 Myths in Selecting a Web Application Firewall
Securing your web applications can be a daunting task, especially without dedicated security staff or training. Discover the myths surrounding Web Application Firewall (WAF) solutions and how you can make the best choice for your organization.Download the Brochure
Checklist: 8 Best DDoS Mitigation Practices
Having a DDoS mitigation plan in place can make the difference between organization-wide chaos and an orderly and timely DDoS response. This checklist outlines eight steps you can take to prepare for a DDoS attack.Download the Brochure
Strategies for API Security
Cyberattackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. In this white paper you will learn about APIs, how and why they are targets for attacks, security models, and how Akamai can help.Download the White Paper
Luisa Via Roma
Italian luxury fashion retailer relies on Akamai to protect against bots, DDOS & malicious attacks, while driving web performance & revenue.Read More
Health and Sports Nutrition Group's online business can sleep safely at night, knowing Akamai is protecting their website.Read More
Akamai protects 5miles against online attacks to support its rapid business expansion.Read More
Boston Scientific sees 100% adoption of remotely accessed business intelligence software after deploying Akamai’s solution.Read More
Akamai protects CashFlows’ critical payment systems from both targeted and distributed cyberattacks using their worldwide network of hundreds of thousands of servers, massive bandwidth, and world-class security systems and knowledge.Read More
Akamai enables Concur to instantly improve global application performance and expand into new markets.Read the Blog
Domino's Pizza Enterprises focuses heavily on the digital ordering experience of their customers in seven major markets. Akamai has been a key partner in delivering a fast and secure platform, which has helped increase conversion and sales.Read More
Akamai cloud security solutions ensured the safety and 100% availability of EPRO’s website, and helped the company lower IT cost while improving the overall user experience.Read More
Hong Kong Airlines
Akamai helped Hong Kong Airlines speed up their website’s response time significantly for its visitors from all over the world, while managing bots and scrapers, achieving annual savings of RMB 40 million.Read the Blog
MailChimp pursues global growth with Akamai protection solutions in place.Read More
Guests visit Six Flags amusement parks to have an enjoyable experience with family and friends. Six Flags trusts Akamai to ensure that exceptional experience extends to their mobile app users while inside the park.Read More
Why Xero chose Akamai for security and performance
Xero is an cloud-based accounting software for small businesses based in New Zealand with over 1.2 million subscribers. Akamai and Xero began their relationship in 2009 and remain key security partners collaborate at all levels of technical capacity.Watch the Video
Webinar: Does My Company Need Web Application Firewalls
In this on-demand webinar, you'll learn why you need a Web Application Firewall along with the top considerations for selecting a WAF solution.Watch the Video
Website & API Security: DDoS & Web Application Threats & Protection
Your customers need your website, application, or API, so you need security. Get answers about how DDoS and web attackers choose their targets, and attacks you will face.Watch the Video
Smartest Protection Against DDoS Attacks
DDoS attacks can bring down your business and threaten your customer relationships. With this video, discover more about the smartest way to protect your revenue and your reputation with a world-class cloud security strategy.Watch the Video
ZALORA CTO on solving security issues in the Asian market
ZALORA is the fastest-growing online fashion retailer in Asia. From battling against bots scraping their prices, to shaving seconds off of page speed for mobile users in Indonesia and the Philippines, Karthik Subramanian, CTO & Co-founder, talks about his journey of finding solutions that fix their security and performance challenges.Watch the Video
1The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester’s call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgement at the time and are subject to change.
2Gartner, Magic Quadrant for Web Application Firewalls, Jeremy D'Hoinne | Adam Hils | Ayal Tirosh | Claudio Neiva, 29 August 2018.
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Akamai.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.