Oct 29, 2018 — Network protection from traffic threats
SIA now protects your network from threats that target HTTP and HTTPS traffic.
Features include:
-
SIA Proxy. Proxy server that intercepts suspicious HTTP and HTTPS traffic, examines the full URL in a request, and determines which websites are safe for end users to access. You can enable this feature in a policy configuration (Configuration > Policies). When SIA Proxy is enabled, you can select an action for risky domains and file sharing domains. Risky domains are domains that may be a threat because they are newly registered or discovered. File sharing domains are domains for file sharing applications or services.
-
URL-based Threat Intelligence. SIA Proxy inspects the URL and, based on the policy configuration, blocks traffic that’s known to be a security threat. SIA can block traffic to a specific URL without blocking the entire domain. A new Classify policy action is also available for custom lists, risky domains, and file sharing domains. When a threat is detected, the Classify action assigns the corresponding policy action in the Akamai Security tab.
-
HTTPS Traffic Analysis. SIA Proxy requires that you create an Akamai certificate or generate a certificate signing request that’s signed by your organization’s certificate authority (CA). These certificates function as TLS certificates for the SIA proxy to intercept suspicious traffic. If you are creating an Akamai certificate, you must install the root certificate on end-user machines. The certificate feature is available on the Utilities page (Configuration > Utilities > Certificates).
-
Inline Payload Analysis. Feature offered with SIA Advanced Threat that enables SIA Proxy to scan downloadable content on a risky website or in a file sharing application. Multiple static analysis engines are used to scan documents and executables for zero-day threats and other attacks that are typically undetected by antivirus engines.
-
New Reporting pages. New pages are available for reviewing SIA Proxy activity (Monitoring > Activity > Proxy) and network traffic that’s directed to SIA (Monitoring > Activity > Network Traffic).
-
New Acceptable Use Policy (AUP). New categories and detailed subcategories are available in a policy configuration for administrators to control access to websites or specific website content.