Filter by type
Prevent credential stuffing and mitigate human Account Takeover (ATO).
View which rules Adaptive Acceleration applies to a property, and generate new rules.
Deliver high-quality streaming video optimized to available bandwidth in real time.
Create and deliver quality, immersive media playback experiences.
Connect a Flowplayer® to the Akamai CDN.
Connect a JWPlayer® to the Akamai CDN.
Manage Akamai services from the command line.
Implement a proprietary content delivery network (CDN) for your customers.
Deliver your customers’ vanity domains securely via HTTPS with Akamai Cloud Embed.
Provide secondary authentication to cloud, on-premises, web-based, SaaS, and IaaS applications.
Get notified automatically of changes in your origin infrastructure and content-delivery patterns.
Improve the performance, security, and scalability of your APIs.
Register and manage your APIs to enable security, delivery, and governance.
Detect and assess unprotected APIs to add them to your API definitions.
Register, manage, and deliver your APIs efficiently and securely over the Akamai network.
Create and manage API keys. Control your API traffic with quotas and throttling.
Fend off DDoS floods, malicious bots, and sophisticated web application attacks.
Manage your configurations for Kona Site Defender, Web Application Protector, and Client Reputation.
Deliver IP video, premium web content, and CDN services while reducing network traffic and costs.
Share the same multicast stream for high traffic events using this LCDN extension.
Access your account’s monthly usage of Akamai services.
Welcome the bots you want and mitigate those you don’t.
Manage support requests to resolve issues with your Akamai applications and services.
Get full life cycle management of SSL certificates for your Akamai CDN applications.
Manage the lifecycle and monitor the status of your property hostnames on Akamai's China CDN.
Restrict access between your origin infrastructure and Akamai edge servers based on CIDR blocks.
Stop malicious clients, based on Akamai’s visibility into prior behavior of individual IP addresses.
Securely store and manage access keys for cloud origins independent of your property.
Establish a private connection with Google Cloud Provider to reduce egress costs at the origin.
Seamlessly connect your publicly stored media delivery content to the Akamai edge.
Solve specific business challenges using value-added apps that complement Akamai's core solutions.
Optimize your approach to load testing with a scalable global platform.
Provide Akamai contract identifiers and associated products to other APIs, using this microservice.
Configure your Akamai services, monitor performance, and resolve user issues from this dashboard.
Access detailed information about CP codes, edit their parameters, and group them for billing.
Monitor activity on the Akamai platform and send live log data to a destination of your choice.
Start integrating Akamai solutions with developer tools.
Diagnose DNS and network problems from Akamai servers around the world.
Establish a dedicated physical connection to the edge platform from within a data center.
Deliver a fast, secure, and personalized user experience, with intelligent recursive DNS.
Use Akamai's recursive DNS to deliver fast, secure, and personalized experiences on your carrier network.
Download files that support your Akamai products.
Deliver software downloads effectively, reduce latency, and optimize large file delivery.
Implement network optimizations to deliver rich, dynamically generated content at scale.
Diagnose your server, DNS, and network problems from Akamai servers around the world.
Replace or augment your DNS infrastructure with a cloud-based authoritative DNS solution.
Manage how requests for your site, app, or content are mapped to Akamai edge servers.
Deliver traffic from a small, static set of IP addresses in an Akamai scalable manner.
Add a key-value store database to your serverless compute logic and build data-driven applications.
Refresh content cached on the edge network based on directory, file extension, or other logic.
Manage and control remote access to your applications.
Protect users in your organization from malware, phishing, and other threats.
Analyze ETP traffic for security, acceptable use policy, DNS activity, or IOC events.
Configure events, reporting, and alerts in Event Center.
Monitor and analyze Control Center events.
Get notifications of CIDR block changes on the edge network so you can update your firewall rules.
Improve page-loading speed through reorganizing resources to optimize rendering in the browser.
Use load balancing to manage website and mobile performance demands.
Submit load data for a Global Traffic Management domain in either JSON or XML.
Get read-only reports on Global Traffic Management's real-time statistics.
Detect breaches and stop ransomware by applying network segmentation controls.
Create users and groups, and define policies that manage access to Control Center applications.
Manage accounts for users, and control their access to groups and properties.
Maintain an allowlist of IP addresses to control which users can access Akamai Control Center.
Add secure, cloud-based identity management to your websites or apps.
Create and employ authorization codes, access tokens, and verification codes for Identity Cloud.
Manage user accounts and user profiles for Identity Cloud.
Configure and maintain social logins, social sharing, and the social login process.
Automate image and video delivery optimizations for your website visitors.
Process and deliver data for connected IoT devices in real time.
Store and access messages in a key-value datastore without maintaining dedicated storage servers.
Read aggregated messages from topics related to IoT Edge Connect.
Securely update vehicle-specific software over cellular networks.
Manage the public keys that authenticate JSON web token requests for IoT devices.
Develop your own tools to track invoice files, and keep others updated about their status.
Deliver better user experiences for websites and mobile apps with intelligent performance automation.
Shield your site from DDoS attacks by diverting traffic and scrubbing network packets.
Protect against DDoS and web application attacks, and keep up with evolving security threats.
Add a compute instance so you can build, release, and scale applications faster with virtual machines.
Archive live streams in HLS and DASH formats for use as video on demand (VOD) content.
View, update, and delete scheduled log deliveries, and adjust details of your log delivery setup.
Analyze customers' experience data via a comprehensive software as a service (SaaS).
Integrate analytics plugins with players and view data in customizable dashboards.
Monitor traffic for Adaptive Media, Download Delivery, Akamai Cloud Embed, and Object Delivery.
Implement security services for your media content using a web-based interface.
Build a custom HD Network Management Interface.
Broadcast live streaming events reliably at scale.
Reduce your content’s upload-to-publish time with an optimized cloud ecosystem.
Monitor traffic for your Media Services Live and Media Services On Demand solutions.
Fix performance issues and improves user experience with real-time performance monitoring.
Send beacons from any web or mobile application to mPulse.
Fetch aggregate data and receive a JSON response with mPulse data.
Store content for digital optimization and flexible data transfer.
Manage your NetStorage content using various HTTP methods.
Automate the creation, deployment, and management of lists used in Akamai security products
Protect your website from Magecart and other data skimming attacks.
Stop DDoS attacks in the cloud before they reach the data center.
Define rules and behaviors that govern your website delivery based on match criteria.
Refresh or remove specific cached objects, by URLs, content provider (CP) codes, or cache tags.
Generate custom reports to monitor and optimize your Akamai services.
Create an isolated development environment to test code changes locally before deploying to the CDN.
Get clientless protection for mobile and IoT SIM-enabled devices from malware, phishing, and other threats.
Review data visualizations of security events, traffic, and attack activity.
Access the SLA test configurations and the resulting reports.
Integrate third-party SIEM applications with Akamai security solutions.
Hide websites and applications from the Internet and restrict clients from accessing the origin.
Run functional and comparative tests to check how configuration changes affect your configuration.
Protect your website against DDoS and web application attacks, while reducing effort and overhead.