Today, we are proud to introduce Akamai Enterprise Threat Protector (ETP). ETP is designed to provide customers quick-to-deploy and easy-to-manage cloud-based protection against the impact of complex, targeted threats such malware, ransomware, phishing, and DNS‑based data exfiltration.
One organization already seeing the benefit of using Enterprise Threat Protector is innovator in cruise travel, Norwegian Cruise Line. According to Fidel Perez, the company's Director of Enterprise Architecture and Performance, "An important element of our commitment to our guests is doing everything in our power to safeguard their personal information. Our use of Enterprise Threat Protector adds a powerful layer of intelligent security, across all our shoreside office locations and cruise ships, to ensure we're doing all we can to protect the company, our employees and our guests from complex, targeted attacks."
According to the Ponemon Institute, the average cost of a cyber-attack on a company is $9.5 million. And despite the myriad security solutions currently in use to thwart attacks, malicious actors continue to exploit weaknesses and gaps, resulting in a variety of negative consequences for today's enterprises. Recursive DNS, a critical but often overlooked part of enterprise infrastructure, can be one of these gaps. Even though a majority of software and clients rely on DNS to communicate with one another, DNS does not have built-in intelligence to determine if a domain being requested by a user is safe or malicious.
Akamai's Enterprise Threat Protector is designed specifically to address the "intelligence gap" in DNS infrastructure. Using threat data gathered through Akamai's Cloud Security Intelligence capabilities, Enterprise Threat Protector layers critical intelligence onto a company's recursive DNS requests, preventing users from accessing malicious domains and lowering risk for businesses of all sizes. The value of Enterprise Threat Protector comes from the solution's ability to better determine the "intent" of a DNS request from the enterprise. For example, should a malicious email bypass other security efforts and an employee inadvertently click the included link, Enterprise Threat Protector recognizes that the target domain is associated with known or suspected malicious activity and actively blocks the request.
In addition to the solution's capability to identify and block domains known to host malware and ransomware drop sites, and/or known to be associated with phishing attacks, Enterprise Threat Protector can also disrupt communications between already infected devices and the bad actors' command and control (CnC) servers. CnC is a common mechanism to control malware once it has infected systems. Further, the solution can identify DNS data exfiltration attacks where the DNS protocol is leveraged as a way to send sensitive data outside of the enterprise. And because DNS is such an effective control and enforcement point for enterprise security teams, Enterprise Threat Protector can also be used to prevent access to web content that falls outside an enterprise's acceptable use policy.
Akamai's Enterprise Threat Protector is designed to help you:
- Significantly improve security defenses and close DNS security gaps by proactively blocking DNS requests to malware and ransomware drop sites, malware CnC servers, and DNS data exfiltration and phishing domains based on unique and up-to-date threat intelligence.
- Instantly add protection without complexity or hardware with a 100% cloud-based solution that can be configured and deployed in minutes (with no disruption for users) and rapidly scaled.
- Easily reduce management time by administering security policies and updates from anywhere in second to protect all locations.
- Quickly and uniformly enforce compliance and your Acceptable Use Policy by blocking access to objectionable or inappropriate domains and content categories.
- Immediately increase DNS resilience and reliability with Akamai's carrier-grade global intelligent platform.
Where can I learn more about Enterprise Threat Protector?
To learn more about how to add a simple, additional layer of cloud-based security that combines recursive DNS and threat intelligence, reach out to your account team or visit:
- Recursive DNS - The Achilles Heel Of Advanced Threats
- What Are Domain Generation Algorithms (DGAs) And Why Should You Care?
- Spotlight on Malware DGA Communication Technique
- 20 Years of DNS Data Exfiltration: Why, How, and What's Next?
- Advanced, Targeted Threats: What do They Mean for Your Bottom Line?