Introducing G2.ai, the future of software buying.Try now
It's been two months since this profile received a new review
Leave a Review

Akamai Enterprise Threat Protector Reviews & Product Details

Profile Status

This profile is currently managed by Akamai Enterprise Threat Protector but has limited features.

Are you part of the Akamai Enterprise Threat Protector team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used Akamai Enterprise Threat Protector before?

Answer a few questions to help the Akamai Enterprise Threat Protector community

Akamai Enterprise Threat Protector Reviews (2)

Reviews

Akamai Enterprise Threat Protector Reviews (2)

4.5
2 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
KM
Software Developer
Small-Business (50 or fewer emp.)
"Ultimate weapon to remove malware and threats"
What do you like best about Akamai Enterprise Threat Protector?

The computer network in Cogswell College were all loaded with Enterprise Threat Protector. I have never used it on a regular basis as a Student Ambassador, but I like how proactive the threat protector is. I never cared so much about how secure the network was, but it's nice to know that the network is more secure with this software. I used the school network to work on tasks for the Admissions department, and it works very securely.

Now there was a time where I was accessing a website, and before I even realized, this protector caught the malware, and unknowingly saved my integrity and security. Review collected by and hosted on G2.com.

What do you dislike about Akamai Enterprise Threat Protector?

Can't think of any cons. I never knew that it was running most of the time, and so far, I haven't seen any issues or blockers in my tasks at Cogswell. Review collected by and hosted on G2.com.

RB
Technical Head
Mid-Market (51-1000 emp.)
"Best web based threat protector solution that monitor DNS activity ,that removes malware threaten"
What do you like best about Akamai Enterprise Threat Protector?

I like its best working in web based as well as desktop based program ,it removes harmful malware threaten and helps our DNS and our hosted things like web based application monitors and prevent through Akamai threat protector.it is good application to prevents from virus.In market many options are available but it is most good application. Review collected by and hosted on G2.com.

What do you dislike about Akamai Enterprise Threat Protector?

Sometimes it slow scan performance and not threatened any virus and help or technical support not appropriate .It is download for business mail not for anyone.That is lack of the akamai enterprise threat protector. Review collected by and hosted on G2.com.

There are not enough reviews of Akamai Enterprise Threat Protector for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Wiz Logo
Wiz
4.7
(752)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
2
Cloudflare Application Security and Performance Logo
Cloudflare Application Security and Performance
4.5
(586)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
3
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(473)
Product Description: Palo Alto Networks' Cortex XSIAM is an AI-driven security operations platform designed to transform traditional Security Operations Centers by integrating and automating key functions such as data centralization, threat detection, and incident response. By leveraging machine learning and automation, it enables organizations to detect and respond to threats more efficiently, reducing manual workloads and improving overall security posture. Key Features and Functionality: - Data Centralization: Aggregates data from various sources into a unified platform, providing comprehensive visibility across the enterprise. - AI-Powered Threat Detection: Utilizes machine learning algorithms to identify anomalies and potential threats in real-time. - Automated Incident Response: Streamlines response processes through automation, enabling rapid mitigation of security incidents. - Integrated SOC Capabilities: Combines functions such as Extended Detection and Response , Security Orchestration, Automation, and Response , Attack Surface Management , and Security Information and Event Management into a cohesive platform, eliminating the need for multiple disparate tools. - Scalability: Designed to handle large volumes of data and adapt to the evolving needs of modern enterprises. Primary Value and Problem Solved: Cortex XSIAM addresses the challenges of disjointed data, weak threat defense, and heavy reliance on manual work in traditional SOCs. By centralizing data and automating security operations, it simplifies processes, enhances threat detection accuracy, and accelerates incident response times. This transformation enables organizations to proactively outpace threats, reduce operational costs, and achieve a more robust security posture.
4
FortiCNAPP Logo
FortiCNAPP
4.4
(383)
FortiCNAPP is a comprehensive Cloud-Native Application Protection Platform (CNAPP) that consolidates Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWPP), Cloud Infrastructure Entitlement Management (CIEM), Kubernetes security, and compliance into a single solution. Using AI-based anomaly detection and behavioral analytics, FortiCNAPP continuously monitors cloud environments to identify misconfigurations, vulnerabilities, and active threats in real time. The platform supports agentless and agent-based deployment models, ensuring flexible coverage across diverse architectures. FortiCNAPP also integrates with the Fortinet Security Fabric, correlating cloud data with network and endpoint insights from FortiGuard, FortiSOAR, and more, delivering full-stack threat context, faster remediation, and unified risk management.
5
CrowdStrike Falcon Endpoint Protection Platform Logo
CrowdStrike Falcon Endpoint Protection Platform
4.6
(370)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
6
ActivTrak Logo
ActivTrak
4.3
(328)
ActivTrak is a cloud-native workforce intelligence platform that transforms work activity data into actionable insights for employee monitoring, productivity and performance management, and workforce planning capabilities that deliver measurable ROI. Deployment is quick and easy — start collecting data in minutes.
7
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(303)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
8
Cisco Umbrella Logo
Cisco Umbrella
4.4
(280)
Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the internet.
9
DNSFilter Logo
DNSFilter
4.6
(260)
DNS threat protection that is accurate, reliable, and easy. Stop end users from visiting malicious and inappropriate sites. Filters internet traffic in minutes. DNSFilter is backed by the largest global DNS network in the industry.
10
Cynet Logo
Cynet
4.7
(246)
AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visibility and defend all domains of your internal network: endpoints, network, files and users, from all types of attacks.
Show More

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Akamai Enterprise Threat Protector
View Alternatives