Head of Information at a leisure / travel company with 51-200 employees
Mar 29, 2021
The pricing isn't the highest, however, it's not the lowest either. They could adjust it so that it was a bit more affordable. It would be appreciated by the customers. It's expensive, however, if you compare it to AWS, you'll get different services that you'll have to collaboratively pick in order to get the same solution that Akamai provides to you in one package.
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias.
Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why.
You can read user reviews for the Top 8 Distributed Denial of Service (DDO...
I am currently working on a use case involving vulnerabilities and deferral requests made by individuals seeking to complete their remediation. These vulnerabilities are categorized and require an SLA for remediation based on their severity. If a certain category of vulnerability cannot meet the mitigation deadline, it must be approved. I am responsible for explaining why mitigation is impossible, the remediation time frame, and the holdup. My approach to addressing vulnerabilities is to evaluate the risk from Akamai WAF's perspective and the application's exposure. I review the WAF for external vulnerabilities to determine if the specific issues have been addressed. The adaptive function of the WAF is powerful, as it can detect suspicious behavior and pick up on issues. The adaptive role sets and behavioral activities seem to be very effective in this regard. Additionally, the WAF can share information such as IP ranges or addresses associated with certain kinds of activity. If a threat is detected on one WAF, it may be blocked across all WAFs owned by different enterprises. As for my understanding, I cannot say for certain. While I am not entirely sure about how the WAF works in sharing information and blacklisting potential threats, I believe it is an effective solution. However, I would caution against quoting me on this as I may not have all of the information. So, that's a very powerful feature. However, assessing when something is not explicitly described in the rule set can be challenging. It's difficult to determine if it's being prevented or not. But, I have noticed that it's very effective at preventing people from even being able to identify the existing vulnerabilities. This is a great prevention measure, and it can adapt to different situations by considering various factors, including those specific to the WAF and threat intelligence data. It seems to work really well, but I can't speak to the overall effectiveness of all the activities.
I provide a service. We manage the Akamai service for our customers. Our customers are predominantly government agencies and medium-sized companies, and banks.
We use Akamai Kona for our cloud services.
We primarily use the solution as an application firewall.
We have multiple use cases but the solution is primarily for content delivery network. The product has multiple features so we area also using it as a wall. It's really a combination between a CDN and a WAF. We also use Adidol switches. We are partners with Akamai and I'm a cloud solution architect.
We use this solution primarily to prevent DDoS attacks.
We're using it as DDoS on a basic WAF. We use a hybrid cloud deployment model.
We use it for website protection.