Business Software for Akamai

  • 1
    Akamai MFA Reviews
    Make authentication resistant to phishing as straightforward as using a mobile push notification. Safeguard employee accounts and protect sensitive data from breaches by implementing phish-proof multi-factor authentication (MFA). Eliminate the risk of MFA bypass attacks by utilizing the most trusted standard in multi-factor authentication. Ensure that MFA remains impervious to phishing attempts through the use of end-to-end encryption. Forget about cumbersome physical security keys; instead, streamline the onboarding process with self-service enrollment and an intuitive smartphone application. Experience top-tier authentication with FIDO2, enhancing security without the need for additional hardware. This solution not only lightens the load for administrators but also offers FIDO2 MFA security that utilizes seamless push notifications on any smartphone, effectively countering phishing threats. You can choose from various authentication methods, including secure push notifications, standard push, TOTP, and SMS, all of which easily integrate with leading identity providers and identity solutions for a cohesive MFA experience. The system automates user provisioning workflows to ensure immediate updates in response to changes within the identity provider. Additionally, comprehensive reporting capabilities keep administrative teams updated on all authentication activities, enhancing oversight and security management. This holistic approach to authentication ensures both ease of use and robust protection against modern threats.
  • 2
    Hydrolix Reviews

    Hydrolix

    Hydrolix

    $2,237 per month
    Hydrolix serves as a streaming data lake that integrates decoupled storage, indexed search, and stream processing, enabling real-time query performance at a terabyte scale while significantly lowering costs. CFOs appreciate the remarkable 4x decrease in data retention expenses, while product teams are thrilled to have four times more data at their disposal. You can easily activate resources when needed and scale down to zero when they are not in use. Additionally, you can optimize resource usage and performance tailored to each workload, allowing for better cost management. Imagine the possibilities for your projects when budget constraints no longer force you to limit your data access. You can ingest, enhance, and transform log data from diverse sources such as Kafka, Kinesis, and HTTP, ensuring you retrieve only the necessary information regardless of the data volume. This approach not only minimizes latency and costs but also eliminates timeouts and ineffective queries. With storage being independent from ingestion and querying processes, each aspect can scale independently to achieve both performance and budget goals. Furthermore, Hydrolix's high-density compression (HDX) often condenses 1TB of data down to an impressive 55GB, maximizing storage efficiency. By leveraging such innovative capabilities, organizations can fully harness their data potential without financial constraints.
  • 3
    Dash0 Reviews

    Dash0

    Dash0

    $0.20 per month
    Dash0 serves as a comprehensive observability platform rooted in OpenTelemetry, amalgamating metrics, logs, traces, and resources into a single, user-friendly interface that facilitates swift and context-aware monitoring while avoiding vendor lock-in. It consolidates metrics from Prometheus and OpenTelemetry, offering robust filtering options for high-cardinality attributes, alongside heatmap drilldowns and intricate trace visualizations to help identify errors and bottlenecks immediately. Users can take advantage of fully customizable dashboards powered by Perses, featuring code-based configuration and the ability to import from Grafana, in addition to smooth integration with pre-established alerts, checks, and PromQL queries. The platform's AI-driven tools, including Log AI for automated severity inference and pattern extraction, enhance telemetry data seamlessly, allowing users to benefit from sophisticated analytics without noticing the underlying AI processes. These artificial intelligence features facilitate log classification, grouping, inferred severity tagging, and efficient triage workflows using the SIFT framework, ultimately improving the overall monitoring experience. Additionally, Dash0 empowers teams to respond proactively to system issues, ensuring optimal performance and reliability across their applications.
  • 4
    Bitmovin Reviews
    Bitmovin has been a pioneer in virtually every major development in online video. From building and deploying the fastest commercial adaptive streaming (MPEG/HLS) HTML5 player, to being the first company to achieve 100x realtime cloud encoding speeds. Bitmovin offers VP9 and HEVC live streaming at 60FPS and 4K resolution. They also created the first containerized video encoding system with Kubernetes and Docker. Bitmovin products were developed entirely in-house, are easy to use, fast to integrate, and highly customizable. This is a true enterprise offering, thanks to our outstanding support, documentation, and SLAs.
  • 5
    Coralogix Reviews
    Coralogix is the most popular stateful streaming platform, providing engineering teams with real-time insight and long-term trend analysis without relying on storage or indexing. To manage, monitor, alert, and manage your applications, you can import data from any source. Coralogix automatically narrows the data from millions of events to common patterns, allowing for faster troubleshooting and deeper insights. Machine learning algorithms constantly monitor data patterns and flows among system components and trigger dynamic alarms to let you know when a pattern is out of the norm without the need for static thresholds or pre-configurations. Connect any data in any format and view your insights anywhere, including our purpose-built UI and Kibana, Grafana as well as SQL clients and Tableau. You can also use our CLI and full API support. Coralogix has successfully completed the relevant privacy and security compliances by BDO, including SOC 2, PCI and GDPR.
  • 6
    GoDataFeed Reviews

    GoDataFeed

    GoDataFeed

    $39 per month
    Your channel listings should be shining. Feed optimized product data to more than 200 ecommerce channels with no custom development or expensive integrations. You can manage every aspect of your product data, including how it is delivered to the digital shelf. Smart catalogs consolidate source data, standardize formats, and enhance feed attributes to create a single source for truth. Your catalog can be published with industry-leading integrations to Google and Amazon, Facebook, Pinterest and TikTok. Automatically update your catalog with product updates and inventory changes across all channels. No manual data entry. No discrepancies. No overselling. High-quality product data is the foundation of high-performance campaigns. GoDataFeed allows you to have complete creative control over your product content and how it is presented to customers. Dynamic rules engines remove the limitations of static data. You can modify values, remove text and inject keywords. You can also add supplemental data or merge fields.
  • 7
    SiteSpect Reviews
    SiteSpect is the most popular A/B testing platform and personalization platform. It allows growing businesses to test changes to websites, mobile experiences, and other digital properties. SiteSpect allows you to test and personalize across all aspects of the customer experience, from client-side design to server-side functionality. This will engage your website visitors with the right experience every time. SiteSpect is the most powerful, complete, and easy solution to personalizing and optimizing your customers' experiences. SiteSpect provides unparalleled site performance, scalability and data integrity, security, as well as the ability to optimize every aspect of the customer experience.
  • 8
    Active Directory Reviews

    Active Directory

    Microsoft

    $1 per user per month
    Active Directory serves as a centralized repository for information regarding various objects within a network, facilitating easy access and management for both administrators and users. It employs a structured data storage approach, which underpins a logical and hierarchical arrangement of directory information. This repository, referred to as the directory, holds details about various Active Directory entities, which commonly include shared resources like servers, volumes, printers, as well as user and computer accounts on the network. For a deeper understanding of the Active Directory data repository, one can refer to the section on Directory data store. Security measures are seamlessly integrated with Active Directory, encompassing logon authentication and the control of access to directory objects. Through a single network logon, administrators are empowered to oversee directory information and organizational structures across the entire network, while authorized users can readily access resources from any location within the network. Additionally, policy-based administration simplifies the management process, making it more efficient even for the most intricate network configurations. This framework not only enhances security but also streamlines resource management, making network operations more effective.
  • 9
    Terraform Reviews
    Terraform is a powerful open-source tool for managing infrastructure as code, offering a consistent command-line interface to interact with numerous cloud services. By translating cloud APIs into declarative configuration files, Terraform enables users to define their infrastructure requirements clearly. Infrastructure can be written using these configuration files, leveraging the HashiCorp Configuration Language (HCL), which provides a straightforward way to describe resources through blocks, arguments, and expressions. Before making any changes to your infrastructure, executing the command terraform plan allows you to verify that the proposed execution plan aligns with your expectations. To implement the desired configuration, you can use terraform apply, which facilitates the application of changes across a wide range of cloud providers. Furthermore, Terraform empowers users to manage the entire lifecycle of their infrastructure — from creating new resources to overseeing existing ones and eventually removing those that are no longer necessary, ensuring efficient management of cloud environments. This holistic approach to infrastructure management helps streamline operations and reduces the risk of errors during deployment.
  • 10
    Akamai Bot Manager Reviews
    Bots vary significantly in their effectiveness — while some offer valuable assistance, many create disruptions, and others pose serious risks by facilitating account breaches and fraudulent activities. As bots continue to adapt and bypass existing detection methods, organizations are facing escalating risks and expenses, which necessitates a fresh and creative strategy. Bot Manager provides enhanced bot detection capabilities to identify and mitigate the most elusive threats, enabling you to remain proactive against the dynamic bot environment and eradicate the most advanced bots before they reach your operations. Furthermore, your website serves as a point of interaction not only with customers but also with various other entities, making it essential to gain deeper insights into who visits your site and their intentions. By implementing appropriate policies, you can regulate their interactions, manage the visibility of content they access, and evaluate their effects on your business. Ultimately, your website plays a crucial role in shaping your overall online business strategy and its success. Ensuring effective protection against malicious bots is vital for safeguarding your digital presence and maintaining operational integrity.
  • 11
    Trustwave DbProtect Reviews
    An advanced database security solution designed for scalability, this platform allows organizations to protect their relational databases and big data repositories, whether located on-site or in the cloud, thanks to its distributed architecture and robust analytics capabilities. Given that databases harbor sensitive and proprietary data, they often attract the attention of cybercriminals eager to exploit vulnerabilities for significant financial gain. Trustwave DbProtect empowers businesses to address resource constraints by identifying configuration mistakes, access control flaws, unpatched vulnerabilities, and other threats that might result in data breaches or misuse. With its user-friendly dashboard, users gain a comprehensive real-time overview of database assets, vulnerabilities, risk assessments, user permissions, anomalies, and incidents. Additionally, the platform offers the functionality to detect, notify, and implement corrective measures against suspicious behaviors, unauthorized access, and violations of policy, ensuring a more secure database environment. Overall, this solution not only safeguards data but also enhances an organization's overall security posture.
  • 12
    AuthPoint Reviews
    Our distinctive multi-factor authentication (MFA) system not only minimizes the chances of network outages and data breaches due to lost or compromised credentials, but it also provides this crucial functionality entirely from the Cloud, ensuring effortless setup and management. AuthPoint transcends conventional 2-Factor Authentication (2FA) by exploring creative methods to reliably verify users, and our extensive network of third-party integrations enables you to implement MFA for safeguarding access. In essence, WatchGuard AuthPoint presents an optimal solution at a pivotal moment, making MFA attainable for businesses that urgently require it to thwart potential attacks. The system incorporates a push notification, QR code, or one-time password (OTP) as an extra verification step to confirm your identity, while our mobile device DNA technology aligns with the authorized user's phone when granting access to various systems and applications. Consequently, any malicious actor attempting to replicate a user's device in order to infiltrate a secured system would face an insurmountable barrier. This comprehensive approach not only secures sensitive information but also enhances overall organizational security protocols.
  • 13
    Junos Traffic Vision Reviews
    Junos Traffic Vision is a licensed application designed for traffic sampling on MX Series 3D Universal Edge Routers. It offers comprehensive insights into network traffic flows, which are essential for various operational and planning endeavors. By monitoring the packets processed by the router, it captures critical information such as source and destination addresses, along with packet and byte counts. This data is then aggregated and exported in a standardized format, making it compatible with analysis and presentation tools from both Juniper and third-party vendors that facilitate usage-based accounting, traffic profiling, traffic engineering, and monitoring of attacks and intrusions, as well as service level agreements. Capable of being implemented inline and on service cards that ensure high performance and scalability, Junos Traffic Vision can function in both active and passive modes, seamlessly integrating with lawful intercept filtering and port mirroring without compromising performance. Its versatility and efficiency make it a valuable asset for maintaining robust network management and security.
  • 14
    ThreatSync Reviews
    Managing security consistently across various organizations, ranging from distributed enterprises with multiple branch offices to small and midsize businesses (SMBs) with remote employees, can be quite challenging. For both SMBs and distributed enterprises, it is essential to maintain visibility into network and endpoint event data while also being able to efficiently utilize actionable insights to mitigate threats. The integration of ThreatSync, a vital element of Threat Detection and Response (TDR), plays a key role by gathering event data from the WatchGuard Firebox, Host Sensor, and advanced threat intelligence sources. This data is analyzed through a proprietary algorithm that assigns an in-depth threat score and rank, allowing organizations to prioritize their responses effectively. With its robust correlation engine, ThreatSync facilitates cloud-based threat prioritization, thereby equipping IT teams to address threats swiftly and with confidence. Ultimately, this system collects and correlates threat event data from both the Firebox and Host Sensor, enhancing the overall security posture of the organization.
  • 15
    IBM Cloud Content Delivery Network Reviews
    Users anticipate rapid loading times for web applications, yet the delivery of content can often be sluggish and variable. The IBM® Content Delivery Network leverages the Akamai infrastructure to provide exceptional content caching, significantly enhancing delivery speeds. It allows for the efficient serving of non-cacheable dynamic content and offers seamless scalability through a pay-as-you-go model. In collaboration with Akamai, IBM Cloud® delivers a wide array of features while maintaining cost-effectiveness. This alliance merges Akamai's extensive network of nearly 1,700 servers across 136 countries with IBM's robust cloud presence, which includes over 60 data centers in 19 nations, ensuring that content is positioned as closely as possible to users. Additionally, the platform supports the hosting and delivery of website assets, images, videos, documents, and user-generated content using cloud object storage. By doing so, it guarantees quicker and more secure access for users around the globe. Ultimately, this solution not only meets but aims to surpass customer expectations for content delivery speed.
  • 16
    Akamai Media Analytics Reviews
    Digital viewers demand immediate access to video content and a seamless viewing experience across all devices and locations. Factors that can detract from this experience, such as delays in loading, subpar video quality, and frequent buffering, can result in decreased audience engagement, increased drop-off rates, negative perceptions of the brand, and a diminished chance of viewers returning. The importance of addressing the relationship between video quality, consistent performance, and overall business outcomes cannot be overstated. Gaining insight into your audience's online viewing habits from both a quality and engagement perspective is essential for maintaining a strong grasp on your business's health. Furthermore, having clear visibility into video performance quality is vital for revealing important insights about your viewers, which ultimately affects the long-term sustainability of your business and its success in the competitive digital landscape.
  • 17
    Abstract Security Reviews
    Save your security teams from drowning in noise and hassle! With Abstract, they can focus on what truly matters without worrying about vendor lock-ins, SIEM migration costs or compromise on speed of access over storage! Abstract Security is an AI driven security data management platform that streamlines your data operations with noise reduction, AI based normalization and advanced threat analytics performed on live streaming data so you can analyze insights before routing it to any storage destination.
  • 18
    Samplead Reviews
    Samplead is an innovative platform powered by AI, aimed at transforming outbound sales with a more intelligent method for discovering and interacting with ideal customer profiles (ICPs). By automating the identification of promising prospects through trigger-based insights, it examines online behaviors and buyer intent to reveal pertinent leads. The platform generates customized messaging sequences specifically designed for each prospect, thereby greatly improving engagement and conversion rates. Additionally, Samplead integrates effortlessly with widely-used sales tools, facilitating a seamless workflow within established sales operations. With its extensive analytics capabilities, sales teams can monitor campaign effectiveness, adjust targeting approaches, and enhance outreach strategies for optimal results. Furthermore, Samplead's user-friendly interface ensures that teams can quickly adapt to the platform and leverage its features efficiently.
  • 19
    Netacea Bot Management Reviews
    Netacea is a pioneering server-side detection and mitigation approach that helps us understand bot behavior better than anyone else. Our technology is easy to implement and supports many integrations. This provides comprehensive protection against malicious bots across your website, mobile app, and APIs without compromising your website infrastructure, reliance upon hardware, or disruptive code changes. Our team of experts and revolutionary machine-learning powered Intent Analytics™, engine help us quickly distinguish between bots and humans. This allows us to prioritize genuine users. Netacea works in close collaboration with your security functions, from implementation to providing accurate detection and equipping you with actionable threat information.
  • 20
    Pypestream Reviews
    Eliminate the need for your call center by transforming your business into a conversational leader through comprehensive cloud messaging solutions. Ensure your customers receive non-stop support with a 24/7 interactive portal to engage with your services. Implement secure transactional messaging to offer enriched and dynamic experiences while maintaining rigorous data privacy, guiding users towards effective resolutions. Utilize a full-stack platform that incorporates automation, conversational analytics, agent escalations, and self-service options seamlessly. Master the deployment of AI to infuse conversational elements into your brand, significantly enhancing customer satisfaction through exceptional user experiences. Say goodbye to ineffective AI trials and projects that go nowhere—Pypestream clients experience remarkable returns on investment. This approach not only fosters innovation but also demonstrates tangible business benefits. In light of staffing challenges posed by the pandemic, consider leveraging Pypestream's COVID-19 customer care starter packs to enhance your operations and support. Embracing this technology can pave the way for a more resilient and responsive customer service model.
  • 21
    TierPoint Reviews
    Every organization finds itself at a distinct stage in its digital transformation journey. No matter your current position, we are here to support you every step of the way. Our extensive network of data centers, cloud solutions, and IT professionals provides tailored offerings that facilitate your growth today, in the future, and beyond. Security is paramount, and it remains our top focus. Designed with security in mind, our IT solutions aim to provide you with tranquility. By employing cutting-edge physical and network security protocols, including multi-factor authentication and robust encryption, we ensure you receive proactive safeguarding. Each business has its own unique trajectory for growth, along with specific challenges to navigate. Our adaptable IT solutions are personalized to align with both your immediate needs and long-term objectives. As technology continues to evolve, staying ahead of innovation and competition requires a knowledgeable IT partner capable of guiding your progress. We are committed to being that partner, dedicated to helping you achieve success in an ever-changing landscape.
  • 22
    Userify Reviews
    Efficiently manage SSH keys for your team across various cloud environments and continents utilizing tools like Ansible, Chef, Puppet, Salt, CloudFormation, Terraform, or tailor-made scripts. Userify seamlessly operates across multiple clouds that are geographically dispersed and high-latency networks. It offers enhanced security measures with Curve 25519 encryption and bcrypt hashing, ensuring compliance with PCI-DSS and HIPAA standards. Additionally, it holds AICPA SOC-2 Type 1 certification and is trusted by over 3,500 organizations worldwide. Userify's passwordless SSH key logins provide both heightened security and ease of use. Uniquely, it is the only key management solution designed to function effectively over the open Internet. When it comes to de-provisioning administrators who depart from your organization, Userify simplifies the process to just one click. Furthermore, it assists in achieving PCI-DSS Requirement 8 compliance, effectively safeguarding PII and permanently eliminating the use of ec2-user. Lastly, Userify also supports compliance with HIPAA Security Rule, ensuring protection for critical healthcare systems and PHI by restricting internal access and authority.
  • 23
    DNSWatch Reviews
    WatchGuard DNSWatch is a cloud-based solution that enhances security through DNS-level filtering, which helps identify and prevent potentially harmful connections while safeguarding both networks and employees from destructive attacks. Critical alerts are analyzed by WatchGuard experts, who provide clear summaries that include in-depth information regarding any potential threats. In instances where phishing is involved and an employee inadvertently clicks a malicious link, DNSWatch swiftly redirects them away from the harmful site and supplies educational resources to bolster their understanding of phishing risks. Since hackers often exploit DNS to launch attacks on unaware targets, monitoring DNS requests proves to be an effective strategy for detecting and thwarting such threats. By incorporating DNS-level filtering into the Total Security Suite, DNSWatch adds an essential layer of protection against malware infections. Additionally, attempts made by users to connect to recognized malicious DNS addresses are automatically blocked, ensuring they are redirected to a secure landing page without any disruption to their experience. This proactive approach not only defends against immediate threats but also educates users, contributing to a more security-conscious workplace.
  • 24
    Rackspace Reviews
    Improved full-lifecycle cloud native development capabilities empower customers to create future-ready applications. By harnessing the full power of the cloud today, businesses can develop applications designed for tomorrow's needs. Historically, cloud adoption strategies have concentrated on infrastructure and application migration, often neglecting the essential updates needed in the underlying code. Although the cloud has consistently provided advantages like elasticity and scalability, its complete potential can only be realized when the application code is modernized. Embracing cloud native technologies and contemporary architectures enables the development of modern applications that tap into the cloud's full capabilities, enhance agility, and expedite innovation. Create self-healing and auto-scaling applications that are free from server constraints. Serverless architectures not only optimize efficiency and cost but also delegate the majority of infrastructure and software management tasks to the platform, resulting in a more streamlined development process. This shift allows organizations to focus on innovation rather than infrastructure, paving the way for groundbreaking advancements.
  • 25
    FusionLayer Reviews
    FusionLayer Infinity represents the inaugural Software-Defined IP Address Management (SD-IPAM) solution aimed at superseding conventional IPAM tools and spreadsheets. By consolidating all network information into a unified and authoritative system, it empowers users to automate their networking processes while delivering real-time insights for network engineers. Similarly, FusionLayer NameSurfer serves as a comprehensive DNS management platform tailored for telecom operators and managed service providers overseeing extensive numbers of zones in their authoritative DNS. Used by 35% of the world's top 20 telecom firms, NameSurfer features numerous process automations and user-friendly functionalities designed specifically for authoritative DNS management, enhancing operational efficiency and simplifying complex tasks. This dual offering positions FusionLayer as a leader in modern network management solutions.
MongoDB Logo MongoDB