Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
BlueCat Edge expands the capabilities of traditional DNS by bringing intelligence, automation, and security directly to the edge of the network. It uses distributed service points as first-hop resolvers that enforce policies, optimize forwarding, and capture DNS activity for complete operational visibility. Designed for multicloud and hybrid environments, Edge simplifies DNS routing by managing conditional rules centrally and directing traffic through the most efficient resolution pathway. The platform improves performance with built-in caching, forwarding optimization, and cloud-managed Direct Internet Access for branch locations. Its DNS GSLB features enable cost-effective, scalable traffic distribution with automated failover and load balancing. For cloud operations, Edge Resolver integrates with Integrity and cloud DNS providers to eliminate inconsistencies and ensure accurate cross-cloud resolution. Edge’s security capabilities go beyond traditional threat blocking by preventing malicious queries from executing and detecting sophisticated threats like tunneling, beaconing, and domain generation algorithms. With deep analytics, policy enforcement, and broad SIEM integrations, Edge provides a comprehensive layer of protection for modern distributed networks.
Description
Enterprise Threat Protector operates as a cloud-based secure web gateway (SWG), allowing security teams to facilitate safe Internet connections for users and devices, no matter their location, while eliminating the challenges linked to traditional appliance-based solutions. Utilizing the globally distributed Akamai Intelligent Edge Platform, it proactively detects, blocks, and mitigates various targeted threats including malware, ransomware, phishing, DNS data exfiltration, and sophisticated zero-day attacks. The real-time visualization feature highlights the phishing, malware, and command & control threats that Akamai successfully intercepts for its customers, leveraging its deep insights into both DNS and IP traffic. This enables organizations to safeguard web traffic efficiently across all corporate locations and for users outside the network, simplifying the process with a cloud-based secure web gateway (SWG). Ultimately, Enterprise Threat Protector enhances overall cybersecurity posture by streamlining threat management and ensuring robust protection against evolving digital threats.
API Access
Has API
API Access
Has API
Integrations
6connect
Armis Centrix
Axonius
Azure Marketplace
Datacard Secura
Entrust Certificate Hub
Google Digital Risk Protection
IBM Cloud
Medigate
Rackspace Cloud Files
Integrations
6connect
Armis Centrix
Axonius
Azure Marketplace
Datacard Secura
Entrust Certificate Hub
Google Digital Risk Protection
IBM Cloud
Medigate
Rackspace Cloud Files
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
BlueCat
Founded
2001
Country
Canada
Website
bluecatnetworks.com/products/edge/
Vendor Details
Company Name
Akamai Technologies
Founded
1998
Country
United States
Website
www.akamai.com/site/en/documents/product-brief/enterprise-threat-protector-product-brief.pdf
Product Features
System Monitoring
Alerts / Notifications
Antivirus Management
Data Backup / Recovery
Device Monitoring
Inventory Management
Patch Management
Policy-based Automation
Remote Monitoring
Reporting / Analytics
Risk Analysis
Server Monitoring
Service Configuration Management
Product Features
Cloud Workload Protection
Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity