Oct 29, 2018 — Network protection from traffic threats

​SIA​ now protects your network from threats that target HTTP and HTTPS traffic.

Features include:

  • ​SIA​ Proxy. Proxy server that intercepts suspicious HTTP and HTTPS traffic, examines the full URL in a request, and determines which websites are safe for end users to access. You can enable this feature in a policy configuration (Configuration > Policies). When ​SIA​ Proxy is enabled, you can select an action for risky domains and file sharing domains. Risky domains are domains that may be a threat because they are newly registered or discovered. File sharing domains are domains for file sharing applications or services.

  • URL-based Threat Intelligence. ​SIA​ Proxy inspects the URL and, based on the policy configuration, blocks traffic that’s known to be a security threat. ​SIA​ can block traffic to a specific URL without blocking the entire domain. A new Classify policy action is also available for custom lists, risky domains, and file sharing domains. When a threat is detected, the Classify action assigns the corresponding policy action in the ​Akamai​ Security tab.

  • HTTPS Traffic Analysis. ​SIA​ Proxy requires that you create an ​Akamai​ certificate or generate a certificate signing request that’s signed by your organization’s certificate authority (CA). These certificates function as TLS certificates for the ​SIA​ proxy to intercept suspicious traffic. If you are creating an ​Akamai​ certificate, you must install the root certificate on end-user machines. The certificate feature is available on the Utilities page (Configuration > Utilities > Certificates).

  • Inline Payload Analysis. Feature offered with ​SIA​ Advanced Threat that enables ​SIA​ Proxy to scan downloadable content on a risky website or in a file sharing application. Multiple static analysis engines are used to scan documents and executables for zero-day threats and other attacks that are typically undetected by antivirus engines.

  • New Reporting pages. New pages are available for reviewing ​SIA​ Proxy activity (Monitoring > Activity > Proxy) and network traffic that’s directed to ​SIA​ (Monitoring > Activity > Network Traffic).

  • New Acceptable Use Policy (AUP). New categories and detailed subcategories are available in a policy configuration for administrators to control access to websites or specific website content.