Akamai Cloud Computing Features
Management (6)
Access Control
Allows administrators to control access to specific containers or datasets.
Network Isolation
Separates containers based on their specific network and connections.
File Isolation
Isolates containers based on components of the file systems and their state.
Pay by Usage
Services are offered under a pay-as-you-go or utilization-based purchase model.
Usage Tracking
Track a business' IaaS usage statistics through dashboards, metrics, and reporting.
Performance Tracking
Track a business' IaaS performance statistics through dashboards, metrics, and reporting.
Organization (3)
Packaging
Groups containers or applications without altering the container contents.
Container Networking
Defines container connections, balances loads, and organizes routes.
Orchestration
Runs applications through connected clusters.
Development (4)
Developer Toolkit
Provides tools for developers to build software and edit container contents.
Architecture
Creates integrations and allows management of connected contains.
Datacenter
Integrates data with container contents and applications.
Virtualization
Virtualizes operating systems and nests virtualizations within contained environment.
Infrastructure Provision (6)
Public Cloud
Provides public cloud capabilities.
Hybrid Cloud
Provides hybrid cloud capabilities.
High-Performance Computing (HPC)
Provides high-performance computing (HPC) capabilities.
Virtual Machines (VMs)
Provides virtual machines (VMs).
Edge Computing
Provides edge computing capabilities.
Virtual Networks
Provides virtual networking capabilities.
Functionality (4)
Resource Auto-Scaling
Scales infrastructure resources automatically to meet capacity or computational demands
Versioning
Store copies of old objects when deleted or overwritten
Scalability
Ability to scale storage capacity as data increases
Speed of access
Low latency access to data
Reliability (2)
Redundancy
Multiple copies of data in different data centers
Availability
Accessible anywhere, anytime, with low downtime
Security (3)
Encryption
Provides encryption to data during transit and storage
Auditing
Maintain activity and data access logs
Access control
Allows administrators to provide access to storage based on roles
Compatibility (2)
Infrastructure compatibility
Compatible with a variety of cloud infrastructure
Interoperability
Compatible with object storage from other providers to ensure seamless integration with multiple sources
Usability - Load Balancing (4)
User Interface Design
Provides an intuitive interface for managing configurations and monitoring activity.
Setup Simplicity
Simplifies the setup process with clear instructions and minimal technical effort.
Platform Integration
Integrates seamlessly with cloud, on-premises, and hybrid environments.
Container Support
Works effectively with containerized applications and orchestration platforms like Kubernetes.
Performance Optimization - Load Balancing (4)
Global Load Balancing
Distributes traffic across multiple data centers or regions to optimize performance.
Dynamic Resource Allocation
Adjusts resources automatically to handle traffic spikes efficiently.
Server Health Monitoring
Continuously monitors server availability to prevent routing to unresponsive systems.
Disaster Recovery
Restores operations quickly and effectively after failures or disruptions.
Security & Compliance - Load Balancing (5)
SSL/TLS Termination
Efficiently manages encryption and decryption of traffic to secure data in transit.
Application Firewall Integration
Supports integration with web application firewalls (WAF) for additional protection against vulnerabilities.
DDoS Mitigation
Protects against Distributed Denial of Service (DDoS) attacks to maintain service availability.
Access Control
Provides mechanisms to restrict unauthorized access and manage user or system permissions.
IP Whitelisting/Blacklisting
Controls traffic by allowing or blocking specific IP addresses to enhance security.





