Potential Threat Analysis & Protection for Enterprise

Service Overview

Hacking methods change every day.  As businesses move most of the data into cloud, Internet threats become a challenge that businesses cannot avoid.  Traditional antivirus software and cybersecurity strategies that rely on the release of a virus’s signature are too slow in response.  Intrusion Prevention System (IPS) and sandboxes rely on behavioral analysis; yet due to the trend of HTTPS everywhere, hacker attacks also make use of encrypted tunnels to transmit data.  It has become more and more difficult to protect against instant attacks. 

Akamai Enterprise Threat Protector (ETP) can make up for the lack of defenses.  It can actively identify and intercept malware ranging from ransomware, phishing, coin miner malware to the latest and most frequent threats.  Akamai ETP provides the most immediate and efficient threat filtering, protection and analysis through its DNS service.  It ensures that your users and devices safely connect to the Internet from any location.

Features

  • Threats Categorization

Akamai provides the latest intelligence on threats and guarantees a low false alarm rate.  The sources of its intelligence include 15-30% of its daily web traffic and 2.2 trillion times of DNS requests and integrated intelligence from other sources.

  • Zero-Device Operation

Akamai ETP is a fully cloud-infrastructure solution that can be deployed within minutes so that it will not affect users and services.  It can also scale the protection fast without new hardware, which helps to keep your system simple.

  • User Behavior Management

Akamai ETP has a built-in and automatically kept list where it categorizes the domains visited by the users.  Base on this list, your business can decide which domains to allow or forbid.  This can avoid inappropriate visits to porn websites or videos on public devices that can be used by external users.

  • Analysis and Reports

Akamai ETP provides your business an analysis of both normal and threatening DNS visits in order to help you understand how your users behave and thus how to control or manage them.

  • DNSSEC

You do not have to worry about attacks by DNS man-in-the-middle attacks because all DNS requests that go through Akamai ETP are verified by the DNSSEC mechanism.

Steps of Implementation

  • Step 1: Apply for Akamai Enterprise Threat Protector (ETP)

You can get in touch with us here to apply for an Akamai EAA trial.

  • Step 2: Configure Akamai ETP Settings  

Please provide us your English name, email and phone number so that we can create and set up an account (in the monitor mode) for you on the Akamai portal site.  You will receive your Akamai ETP DNS server address.

  • Step 3: Point Your DNS Forwarder to Akamai ETP DNS

Your business can delete your existing DNS forwarder setting and point to the DNS server address provided by Akamai ETP.  It has no impact on your service to users and will allow Akamai to provide you analysis and reports on your users’ visits.

  • Step 4: Deploy Security Connector & Start DNS Redirect and Trapping

Akamai offers you 2 options when it detects an insider threat endpoint visiting your public network.  You can choose between activating the blocking mode or deploying a Security Connector VM internally to redirect DNS to the Security Connector while responding with a warning webpage and sending information to Akamai ETP for integrated data analysis.

  • Step 5: DNS Behavior Analysis and Control

Akamai ETP offers 16 Acceptable Use Policies (AUP) by default that you can modify to control DNS behavior by categories such as “disable visits to Facebook or YouTube by employees during office hours from 8 am to 5 pm.”  Meanwhile, the system records user visits for analysis and control.

Is This for My Business?

  • I want to manage user’s usage of the Internet effectively and filter inappropriate searches
  • I want to improve the cybersecurity problem that comes with SSL without impacting existing services
  • I want to improve the performance of security devices and filter/reduce unnecessary online traffic

Service Architecture

DNS
  1. Point the internal DNS forwarder to Akamai ETP DNS Server
  2. Deploy a Security Connector VM internally to catch internal threatening endpoints (private IP)
  3. Activate DNS blocking of threat domain visits on the cloud management platform and redirect such visits to Security Connector to record information about the visits
  4. Send the threat information gather to Akamai ETP for data association and analysis
A comparison of different versions

A comparison of different versions

報名表單

Please enable JavaScript in your browser to complete this form.
產業類型
請填寫公司電話號碼包含區碼 ,限數字不可輸入符號,範例:0226565630
請填寫您的分機號碼
您如何得知本次活動訊息?(可複選)
本人已瞭解並同意授予羽昇國際問卷資料使用聲明之權利,並留此同意書以供日後查驗。
聲明:以下依據《個人資料保護法》(暨施行細則),向您告知本問卷蒐集、處理及利用個人資料之事項:本問卷依據個資法蒐集、處理及利用您的個人資料包含識別個人姓名、行動電話、電子郵件地址等。本問卷資料將提供會後會議相關資料、相關產品資訊、支援服務、業務諮詢、促銷訊息、新產品推廣訊息、產品及教育訓練與課程之提供與行銷推廣、產品配送、產品市場分析及統計或研究、寄送抽獎贈獎活動贈品之使用。上述個人資料之蒐集、處理及利用,將僅限本問卷業務需要使用,並遵守個資法之規定妥善保護您的個人資訊。依據個資法第 3 條規定,您可向羽昇國際行使之個資權利包括:查詢、閱覽、複製、補完、更正、處理、利用及刪除。您可與羽昇國際客服專員聯繫,羽昇國際將儘速處理與回覆 您的請求。您亦可拒絕提供相關之個人資料,但若無完整的資料,羽昇國際將無法進行本問卷之後續作業,致無法提供您相關服務。未經您的許可,羽昇國際不會將您的個資與第三方分享。
Scroll to Top