Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Akamai brings digital experiences closer to users than any other provider while simultaneously keeping threats and attacks at bay. As it drives the next wave of digital transformation, the Akamai Intelligent Edge Platform acts as a comprehensive shield, safeguarding all aspects of the digital ecosystem, including websites, users, devices, data centers, and clouds. This technology effectively reduces friction and enhances user engagement. With a network of a quarter of a million edge servers strategically positioned in numerous locations worldwide, it processes an astounding 2.5 exabytes of data annually, engaging with 1.3 billion devices and 100 million IP addresses daily. Positioned within a single network hop of over 90% of the global Internet population, it stands out as the sole global, extensively distributed, intelligent edge platform, delivering the scale, resilience, and security that modern businesses require. Additionally, it offers advanced threat intelligence to help organizations manage security vulnerabilities and defend against cyber threats. This comprehensive approach ensures that digital operations remain secure and efficient in an increasingly complex online landscape.

Description

Online businesses are a common trend. Leaders in business and technology across all industries are doing everything they can to give their companies the edge by providing the best online experience. The apps and cloud are dynamic but the infrastructure that delivers interactive, non-cacheable content is not. Zycada's intelligent edge platform, which is app-aware, allows you to tailor the network infrastructure to better meet your end users. Cloud applications are available at maximum capacity. The fastest online shopping experience worldwide. Deliver a television-like experience via live and VoD streams. Executes business logic at edge to orchestrate cloud services requests. Apps' responsiveness is not affected by the security index. Wireless connection optimization reduces latency in the last mile network. Monitors network health and cloud applications without client instrumentation.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Active Directory
Aprimo
Bitmovin
Castr
Clutch
Crafter CMS
DataStream
Elpha Secure
FusionLayer
Haivision Media Platform
IBM Cloud Content Delivery Network
InsurSuite
Junos Traffic Vision
Netdata
New Relic
NuOCR
S3 Drive
Touchstream VirtualNOC
Userify
Veriti

Integrations

Active Directory
Aprimo
Bitmovin
Castr
Clutch
Crafter CMS
DataStream
Elpha Secure
FusionLayer
Haivision Media Platform
IBM Cloud Content Delivery Network
InsurSuite
Junos Traffic Vision
Netdata
New Relic
NuOCR
S3 Drive
Touchstream VirtualNOC
Userify
Veriti

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$60 per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Akamai Technologies

Founded

1998

Country

United States

Website

www.akamai.com

Vendor Details

Company Name

Zycada

Country

United States

Website

www.zycada.com

Product Features

CDN

Content Acceleration
DDoS Protection
Load Balancing
Managed CDN
Multi-CDN Switching
Reporting/Analytics
Software Downloads
Transparent Caching
Video Streaming
Web Application Firewalls (WAF)

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Load Balancing

Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers

Managed DNS

Anti-Malware
Change Management
DDoS Protection
DNS Failover
DNS Propagation
Disaster Recovery
Global DNS Network
Intelligent Traffic Routing
Load Balancing
Reporting / Analytics
Secondary DNS
Web Application Firewall (WAF)

Performance Testing

API Testing
Benchmarking
Cross Browser Testing
Debugging
Historical Reporting
Load Testing
Mobile Testing
Parallel Testing
Regression Testing
UI Testing
Web Testing

Web Analytics

Campaign Management
Conversion Tracking
Form Analytics
Goal Tracking
Keyword Tracking
Multiple Site Management
Pageview Tracking
Referral Source Tracking
Site Search Tracking
Time on Site Tracking
User Interaction Tracking

Product Features

AB Testing

Audience Targeting
Campaign Segmentation
Funnel Analysis
Heatmaps
Landing Pages / Web Forms
Multivariate Testing
Split Testing
Statistical Relevance Analysis
Surveys
Test Scheduling
Visual Editor

CDN

Content Acceleration
DDoS Protection
Load Balancing
Managed CDN
Multi-CDN Switching
Reporting/Analytics
Software Downloads
Transparent Caching
Video Streaming
Web Application Firewalls (WAF)

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cloud Storage

Access Control
Archiving & Retention
Backup
Data Migration
Data Synchronization
Encryption
File Sharing
Version Control

Website Optimization Tools

Competitor Analysis
Content Management
Keyword Research Tools
Link Management
Performance Metrics
Problem Area Alerts

Alternatives

Alternatives