Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Akamai brings digital experiences closer to users than any other provider while simultaneously keeping threats and attacks at bay. As it drives the next wave of digital transformation, the Akamai Intelligent Edge Platform acts as a comprehensive shield, safeguarding all aspects of the digital ecosystem, including websites, users, devices, data centers, and clouds. This technology effectively reduces friction and enhances user engagement. With a network of a quarter of a million edge servers strategically positioned in numerous locations worldwide, it processes an astounding 2.5 exabytes of data annually, engaging with 1.3 billion devices and 100 million IP addresses daily. Positioned within a single network hop of over 90% of the global Internet population, it stands out as the sole global, extensively distributed, intelligent edge platform, delivering the scale, resilience, and security that modern businesses require. Additionally, it offers advanced threat intelligence to help organizations manage security vulnerabilities and defend against cyber threats. This comprehensive approach ensures that digital operations remain secure and efficient in an increasingly complex online landscape.

Description

Core CSP is a specialized security solution aimed at overseeing cyber threats targeting Internet Service Provider (ISP) and telecommunications subscribers. This efficient and adaptable service provider system passively observes vast networks, detecting harmful activities stemming from devices such as PCs, tablets, and smartphones. With the rise in cyber threats that exploit bandwidth, ISPs and telecommunications firms are under increasing pressure to protect their subscribers. These threats can lead to serious risks, including the theft of personal credentials, fraudulent activities, and the hijacking of devices for cryptomining, botnet operations, or other ongoing assaults. DDoS attacks, frequently orchestrated by botnets, represent a significant concern as they inundate networks with excessive requests, jeopardizing normal traffic flow and potentially collapsing infrastructure. Moreover, cybercriminals leverage these networks to target a wide array of unsuspecting individuals and organizations, amplifying the urgency for robust defense measures. Consequently, the need for effective monitoring and response strategies in the face of evolving cyber threats has never been more critical.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Akamai Bot Manager
Akamai Enterprise Application Access
Azure CDN
Carbon Black EDR
Clutch
CrowdHandler
FusionLayer
HUMAN Bot Defender
InsurSuite
Kasada
Netacea Bot Management
Netdata
Prometheus
Queue-it
Rackspace
Stackreaction
TESSA DAM
ThreatSync
Veriti
Web Werks

Integrations

Akamai Bot Manager
Akamai Enterprise Application Access
Azure CDN
Carbon Black EDR
Clutch
CrowdHandler
FusionLayer
HUMAN Bot Defender
InsurSuite
Kasada
Netacea Bot Management
Netdata
Prometheus
Queue-it
Rackspace
Stackreaction
TESSA DAM
ThreatSync
Veriti
Web Werks

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Akamai Technologies

Founded

1998

Country

United States

Website

www.akamai.com

Vendor Details

Company Name

Core Security (Fortra)

Founded

1996

Country

United States

Website

www.coresecurity.com/products/core-csp

Product Features

CDN

Content Acceleration
DDoS Protection
Load Balancing
Managed CDN
Multi-CDN Switching
Reporting/Analytics
Software Downloads
Transparent Caching
Video Streaming
Web Application Firewalls (WAF)

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Load Balancing

Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers

Managed DNS

Anti-Malware
Change Management
DDoS Protection
DNS Failover
DNS Propagation
Disaster Recovery
Global DNS Network
Intelligent Traffic Routing
Load Balancing
Reporting / Analytics
Secondary DNS
Web Application Firewall (WAF)

Performance Testing

API Testing
Benchmarking
Cross Browser Testing
Debugging
Historical Reporting
Load Testing
Mobile Testing
Parallel Testing
Regression Testing
UI Testing
Web Testing

Web Analytics

Campaign Management
Conversion Tracking
Form Analytics
Goal Tracking
Keyword Tracking
Multiple Site Management
Pageview Tracking
Referral Source Tracking
Site Search Tracking
Time on Site Tracking
User Interaction Tracking

Product Features

Network Traffic Analysis (NTA)

Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption

Alternatives

Alternatives

DNSWatch Reviews

DNSWatch

WatchGuard