Akamai Web Application Firewall
GPTKB entity
Statements (82)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:port
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:Akamai_Technologies_(Peru)_S._A.
|
gptkbp:deployment |
cloud infrastructure
|
gptkbp:developed_by |
gptkb:Research_Institute
|
https://www.w3.org/2000/01/rdf-schema#label |
Akamai Web Application Firewall
|
gptkbp:integrates_with |
gptkb:Akamai_CDN
|
gptkbp:is_available_for |
various industries
small to large businesses |
gptkbp:is_available_in |
multiple regions
|
gptkbp:is_compatible_with |
gptkb:ISO_27001
gptkb:GDPR various CMS platforms various operating systems various programming languages various web technologies PCIDSS |
gptkbp:is_designed_for |
high availability
dynamic web applications |
gptkbp:is_designed_to |
enhance user experience
reduce false positives |
gptkbp:is_integrated_with |
identity management systems
SIEM tools cloud access security brokers firewall management tools |
gptkbp:is_optimized_for |
high traffic websites
|
gptkbp:is_part_of |
gptkb:Akamai_Intelligent_Edge_Platform
gptkb:Akamai_Security_Solutions gptkb:Akamai's_managed_security_services Akamai's cloud security solutions Akamai's security portfolio Akamai's threat management solutions Akamai's enterprise security solutions |
gptkbp:is_protected_by |
application layer attacks
|
gptkbp:is_scalable |
to meet traffic demands
|
gptkbp:is_supported_by |
24/7 customer support
|
gptkbp:is_used_by |
government agencies
enterprises |
gptkbp:is_used_for |
protecting sensitive data
protecting web applications protecting online transactions |
gptkbp:is_used_in |
gptkb:financial_services_company
e-commerce sites healthcare applications |
gptkbp:is_used_to |
prevent data breaches
secure AP Is |
gptkbp:managed_by |
Akamai security team
|
gptkbp:offers |
API security
content delivery optimization real-time monitoring security compliance tools threat intelligence security analytics incident response services user authentication features data encryption services custom reporting features customizable security policies security training resources security incident reporting features security policy automation web traffic encryption |
gptkbp:provides |
data loss prevention
security assessments user behavior analytics network security features real-time threat detection SSL offloading bot management application performance monitoring incident management capabilities compliance reporting tools security incident response plans security architecture reviews security policy management tools SQL injection protection Cross-Site Scripting protection D Do S protection |
gptkbp:supports |
gptkb:mobile_application
multi-cloud environments API traffic HTTP/ HTTPS traffic |