Akamai MFA is a cloud-based multi-factor authentication solution that leverages the FIDO2 standard to secure workforce logins across various applications. Key features include: - Phish-proof FIDO2 MFA push notifications on smartphones - Configurable authentication factors (secure push, standard push, OTP, TOTP, SMS, biometrics) - Integration with leading IdP and IAM solutions - Automated user provisioning workflows - Reporting features for authentication events - Self-service enrollment and device registration The solution aims to prevent employee account takeover and data breaches without the need for physical security keys. It offers FIDO2-based authentication through a smartphone application, providing a balance between security and user experience. Akamai MFA can be used to secure cloud, web-based, on-premises, SaaS, and IaaS applications. It integrates with Akamai Enterprise Application Access for a complete Zero Trust Network Access (ZTNA) solution.
FEATURES
SIMILAR TOOLS
Encrypt Kubernetes Secrets into SealedSecrets for safe storage and controlled decryption within the cluster.
A list of Windows privilege escalation techniques, categorized and explained in detail.
An AWS IAM security assessment tool that identifies least privilege violations and generates risk-prioritized reports for IAM policy remediation.
A simple drop-in library for managing users, permissions, and groups in your application.
A PHP OAuth 2.0 authorization server implementation with support for various grants and RFCs.
A list of disposable email domains to detect or block disposable accounts
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.