Akamai Guardicore Segmentation
Akamai Guardicore Segmentation
achieve greater business agility, reduce infrastructure costs, and Accelerate compliance
enable remote work, it is also creating a larger and more complex
attack surface that does not have a well-defined perimeter. Each Ringfence critical applications
Infrastructure topology
Network map
The output is a dynamic map of the entire IT infrastructure that allows
security teams to view activity with user- and process-level granularity
on a real-time or historical basis. These detailed insights, combined with
AI-powered policy workflows, make the creation of segmentation policies
fast, intuitive, and based on real workload context.
Templates
Policy creation is made easy with pre-built templates for the most common
use cases. Policy enforcement is completely decoupled from the underlying
infrastructure, so security policies can be created or altered without complex
network changes or downtime. In addition, policies follow the workload
no matter where it resides — in on-premises data centers or public cloud
environments. Our segmentation capabilities are complemented by a
sophisticated set of threat defense and breach detection capabilities,
as well as by Akamai Hunt, our managed threat hunting service.
2
Comprehensive protection at scale
Any environment
Protect workloads in complex IT environments with a combination of on-premises workloads,
virtual machines, legacy systems, containers and orchestration, public/private cloud
instances, and IoT/OT
Simplified security
Simplify security management with one platform that provides network visualization,
segmentation, threat defense, breach detection capabilities, and guided policy enforcement
for Zero Trust initiatives
Cloud
workloads
Data
collection
Bare
metal
Visibility
Virtual
machines
IT automation
Segmentation
Containers
Security
operations Breach
detection
Endpoints
Authentication
Devices
3
Supported platforms and technologies
• Akamai Guardicore Segmentation is designed to integrate with your existing infrastructure.
• Check out our technology partners page for a complete list of our integrations.
Operating systems
Linux Apple Microsoft
Unix
STIX,
STIX, Syslog,
Syslog,
STIX, SMTP,
SMTP,
Syslog, CEF,
CEF,
SMTP, Open
Open
CEF, REST
REST
Open API
API
REST API
STIX, Syslog, SMTP, CEF, Open REST API