Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
                    Akamai brings digital experiences closer to users than any other provider while simultaneously keeping threats and attacks at bay. As it drives the next wave of digital transformation, the Akamai Intelligent Edge Platform acts as a comprehensive shield, safeguarding all aspects of the digital ecosystem, including websites, users, devices, data centers, and clouds. This technology effectively reduces friction and enhances user engagement. With a network of a quarter of a million edge servers strategically positioned in numerous locations worldwide, it processes an astounding 2.5 exabytes of data annually, engaging with 1.3 billion devices and 100 million IP addresses daily. Positioned within a single network hop of over 90% of the global Internet population, it stands out as the sole global, extensively distributed, intelligent edge platform, delivering the scale, resilience, and security that modern businesses require. Additionally, it offers advanced threat intelligence to help organizations manage security vulnerabilities and defend against cyber threats. This comprehensive approach ensures that digital operations remain secure and efficient in an increasingly complex online landscape.
                
            
        
            Description
                    Core CSP is a specialized security solution aimed at overseeing cyber threats targeting Internet Service Provider (ISP) and telecommunications subscribers. This efficient and adaptable service provider system passively observes vast networks, detecting harmful activities stemming from devices such as PCs, tablets, and smartphones. With the rise in cyber threats that exploit bandwidth, ISPs and telecommunications firms are under increasing pressure to protect their subscribers. These threats can lead to serious risks, including the theft of personal credentials, fraudulent activities, and the hijacking of devices for cryptomining, botnet operations, or other ongoing assaults. DDoS attacks, frequently orchestrated by botnets, represent a significant concern as they inundate networks with excessive requests, jeopardizing normal traffic flow and potentially collapsing infrastructure. Moreover, cybercriminals leverage these networks to target a wide array of unsuspecting individuals and organizations, amplifying the urgency for robust defense measures. Consequently, the need for effective monitoring and response strategies in the face of evolving cyber threats has never been more critical.
                
            
        
            API Access
            
                Has API
            
            
        
        
    
                API Access
            
                Has API
            
            
        
        
    
                Integrations
            
                
    Abstract Security
            
            
        
        
    
        
        
            
                
    Active Directory
            
            
        
        
    
        
        
            
                
    Apica
            
            
        
        
    
        
        
            
                
    Azure CDN
            
            
        
        
    
        
        
            
                
    Canopy
            
            
        
        
    
        
        
            
                
    Castr
            
            
        
        
    
        
        
            
                
    CloudCasa
            
            
        
        
    
        
        
            
                
    Coralogix
            
            
        
        
    
        
        
            
                
    Elpha Secure
            
            
        
        
    
        
        
            
                
    Flexopus
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            Integrations
            
                
    Abstract Security
            
            
        
        
    
        
        
            
                
    Active Directory
            
            
        
        
    
        
        
            
                
    Apica
            
            
        
        
    
        
        
            
                
    Azure CDN
            
            
        
        
    
        
        
            
                
    Canopy
            
            
        
        
    
        
        
            
                
    Castr
            
            
        
        
    
        
        
            
                
    CloudCasa
            
            
        
        
    
        
        
            
                
    Coralogix
            
            
        
        
    
        
        
            
                
    Elpha Secure
            
            
        
        
    
        
        
            
                
    Flexopus
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Vendor Details
Company Name
Akamai Technologies
Founded
1998
Country
United States
Website
www.akamai.com
Vendor Details
Company Name
Core Security (Fortra)
Founded
1996
Country
United States
Website
www.coresecurity.com/products/core-csp
Product Features
CDN
                                        Content Acceleration
                                        
                                    
                                    
                                    
                                        DDoS Protection
                                        
                                    
                                    
                                    
                                        Load Balancing
                                        
                                    
                                    
                                    
                                        Managed CDN
                                        
                                    
                                    
                                    
                                        Multi-CDN Switching
                                        
                                    
                                    
                                    
                                        Reporting/Analytics
                                        
                                    
                                    
                                    
                                        Software Downloads
                                        
                                    
                                    
                                    
                                        Transparent Caching
                                        
                                    
                                    
                                    
                                        Video Streaming
                                        
                                    
                                    
                                    
                                        Web Application Firewalls (WAF)
                                        
                                    
                            
                        Cloud Security
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Application Security
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Management
                                        
                                    
                            
                        Cybersecurity
                                        AI / Machine Learning
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        IOC Verification
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Tokenization
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Whitelisting / Blacklisting
                                        
                                    
                            
                        DDoS Protection
                                        DNS Amplification Protection
                                        
                                    
                                    
                                    
                                        DNS Reflection Protection
                                        
                                    
                                    
                                    
                                        High Network Capacity
                                        
                                    
                                    
                                    
                                        Illegitimate Traffic Recognition
                                        
                                    
                                    
                                    
                                        Infrastructure Protection (Layer 3/Layer 4)
                                        
                                    
                                    
                                    
                                        Post Attack Analysis
                                        
                                    
                                    
                                    
                                        Traffic Monitoring
                                        
                                    
                                    
                                    
                                        Website Protection (Layer 7)
                                        
                                    
                            
                        Load Balancing
                                        Authentication
                                        
                                    
                                    
                                    
                                        Automatic Configuration
                                        
                                    
                                    
                                    
                                        Content Caching
                                        
                                    
                                    
                                    
                                        Content Routing
                                        
                                    
                                    
                                    
                                        Data Compression
                                        
                                    
                                    
                                    
                                        Health Monitoring
                                        
                                    
                                    
                                    
                                        Predefined Protocols
                                        
                                    
                                    
                                    
                                        Redundancy Checking
                                        
                                    
                                    
                                    
                                        Reverse Proxy
                                        
                                    
                                    
                                    
                                        SSL Offload
                                        
                                    
                                    
                                    
                                        Schedulers
                                        
                                    
                            
                        Managed DNS
                                        Anti-Malware
                                        
                                    
                                    
                                    
                                        Change Management
                                        
                                    
                                    
                                    
                                        DDoS Protection
                                        
                                    
                                    
                                    
                                        DNS Failover
                                        
                                    
                                    
                                    
                                        DNS Propagation
                                        
                                    
                                    
                                    
                                        Disaster Recovery
                                        
                                    
                                    
                                    
                                        Global DNS Network
                                        
                                    
                                    
                                    
                                        Intelligent Traffic Routing
                                        
                                    
                                    
                                    
                                        Load Balancing
                                        
                                    
                                    
                                    
                                        Reporting / Analytics
                                        
                                    
                                    
                                    
                                        Secondary DNS
                                        
                                    
                                    
                                    
                                        Web Application Firewall (WAF)
                                        
                                    
                            
                        Performance Testing
                                        API Testing
                                        
                                    
                                    
                                    
                                        Benchmarking
                                        
                                    
                                    
                                    
                                        Cross Browser Testing
                                        
                                    
                                    
                                    
                                        Debugging
                                        
                                    
                                    
                                    
                                        Historical Reporting
                                        
                                    
                                    
                                    
                                        Load Testing
                                        
                                    
                                    
                                    
                                        Mobile Testing
                                        
                                    
                                    
                                    
                                        Parallel Testing
                                        
                                    
                                    
                                    
                                        Regression Testing
                                        
                                    
                                    
                                    
                                        UI Testing
                                        
                                    
                                    
                                    
                                        Web Testing
                                        
                                    
                            
                        Web Analytics
                                        Campaign Management
                                        
                                    
                                    
                                    
                                        Conversion Tracking
                                        
                                    
                                    
                                    
                                        Form Analytics
                                        
                                    
                                    
                                    
                                        Goal Tracking
                                        
                                    
                                    
                                    
                                        Keyword Tracking
                                        
                                    
                                    
                                    
                                        Multiple Site Management
                                        
                                    
                                    
                                    
                                        Pageview Tracking
                                        
                                    
                                    
                                    
                                        Referral Source Tracking
                                        
                                    
                                    
                                    
                                        Site Search Tracking
                                        
                                    
                                    
                                    
                                        Time on Site Tracking
                                        
                                    
                                    
                                    
                                        User Interaction Tracking
                                        
                                    
                            
                        Product Features
Network Traffic Analysis (NTA)
                                        Anomalous Behavior Detection
                                        
                                    
                                    
                                    
                                        High Bandwidth Usage Monitoring
                                        
                                    
                                    
                                    
                                        Historical Behavior Data
                                        
                                    
                                    
                                    
                                        Identify High Network Traffic Sources
                                        
                                    
                                    
                                    
                                        Network Transaction Visibility
                                        
                                    
                                    
                                    
                                        Stream Data to IDR or Data Lake
                                        
                                    
                                    
                                    
                                        Traffic Decryption
                                        
                                    
                            
                         
        