Akamai Cloud Computing Features
Management (6)
-
Access Control
Allows administrators to control access to specific containers or datasets.
-
Network Isolation
Separates containers based on their specific network and connections.
-
File Isolation
Isolates containers based on components of the file systems and their state.
-
Pay by Usage
Services are offered under a pay-as-you-go or utilization-based purchase model.
-
Usage Tracking
Track a business' IaaS usage statistics through dashboards, metrics, and reporting.
-
Performance Tracking
Track a business' IaaS performance statistics through dashboards, metrics, and reporting.
Organization (3)
-
Packaging
Groups containers or applications without altering the container contents.
-
Container Networking
Defines container connections, balances loads, and organizes routes.
-
Orchestration
Runs applications through connected clusters.
Development (4)
-
Developer Toolkit
Provides tools for developers to build software and edit container contents.
-
Architecture
Creates integrations and allows management of connected contains.
-
Datacenter
Integrates data with container contents and applications.
-
Virtualization
Virtualizes operating systems and nests virtualizations within contained environment.
Infrastructure Provision (6)
-
Public Cloud
Provides public cloud capabilities.
-
Hybrid Cloud
Provides hybrid cloud capabilities.
-
High-Performance Computing (HPC)
Provides high-performance computing (HPC) capabilities.
-
Virtual Machines (VMs)
Provides virtual machines (VMs).
-
Edge Computing
Provides edge computing capabilities.
-
Virtual Networks
Provides virtual networking capabilities.
Functionality (4)
-
Resource Auto-Scaling
Scales infrastructure resources automatically to meet capacity or computational demands
-
Versioning
Store copies of old objects when deleted or overwritten
-
Scalability
Ability to scale storage capacity as data increases
-
Speed of access
Low latency access to data
Reliability (2)
-
Redundancy
Multiple copies of data in different data centers
-
Availability
Accessible anywhere, anytime, with low downtime
Security (3)
-
Encryption
Provides encryption to data during transit and storage
-
Auditing
Maintain activity and data access logs
-
Access control
Allows administrators to provide access to storage based on roles
Compatibility (2)
-
Infrastructure compatibility
Compatible with a variety of cloud infrastructure
-
Interoperability
Compatible with object storage from other providers to ensure seamless integration with multiple sources
Usability - Load Balancing (4)
-
User Interface Design
Provides an intuitive interface for managing configurations and monitoring activity.
-
Setup Simplicity
Simplifies the setup process with clear instructions and minimal technical effort.
-
Platform Integration
Integrates seamlessly with cloud, on-premises, and hybrid environments.
-
Container Support
Works effectively with containerized applications and orchestration platforms like Kubernetes.
Performance Optimization - Load Balancing (4)
-
Global Load Balancing
Distributes traffic across multiple data centers or regions to optimize performance.
-
Dynamic Resource Allocation
Adjusts resources automatically to handle traffic spikes efficiently.
-
Server Health Monitoring
Continuously monitors server availability to prevent routing to unresponsive systems.
-
Disaster Recovery
Restores operations quickly and effectively after failures or disruptions.
Security & Compliance - Load Balancing (5)
-
SSL/TLS Termination
Efficiently manages encryption and decryption of traffic to secure data in transit.
-
Application Firewall Integration
Supports integration with web application firewalls (WAF) for additional protection against vulnerabilities.
-
DDoS Mitigation
Protects against Distributed Denial of Service (DDoS) attacks to maintain service availability.
-
Access Control
Provides mechanisms to restrict unauthorized access and manage user or system permissions.
-
IP Whitelisting/Blacklisting
Controls traffic by allowing or blocking specific IP addresses to enhance security.





