This article takes an honest look at the features of Akamai Page Integrity Manager.
Since you’re on the c/side website, we acknowledge our bias. That said, we’ve built our case honestly and based our analysis on publicly available information, industry information, and our own or our customers' experiences.
If you want to verify their claims yourself, please navigate to their product pages.
What is Akamai Page Integrity Manager?
Akamai Page Integrity Manager is a client-side security solution that monitors and analyzes JavaScript running in users’ browsers to detect malicious activity, like digital skimming, formjacking, and Magecart-style attacks. It focuses on identifying suspicious behavior from third-party scripts and alerting when potentially harmful actions are found.
How Akamai Page Integrity Manager works
Akamai’s Page Integrity Manager is mainly able to list, allow, and block scripts based on previous intel and known issues. They offer great visibility of the script sources, but no insight into the actual payload of a script. This means they can't block scripts in real-time, before needing confirmation after alerting you.
Akamai Page Integrity Manager injects a JavaScript file into the of a website, which runs in the user’s browser during live sessions. The script monitors the execution of all other scripts on the page.
Users need to set up a policy management system that allows them to allowlist or block specific scripts or domains. This is combined with a threat feed to check which sources are deemed safe and malicious.
This is a reactive solution. Akamai Page Integrity Manager can not actively block malicious scripts before they execute. Blocking relies on predefined allow/block policies or manual response after detection, meaning new attacks need to be found, understood and adjusted for in order to be properly detected and blocked next time.
c/side however, uses a proxy approach which sits in between every actual user session. It checks the actual payload of every page view, and analyzes the served dependencies code in real-time before serving it to the user.
This allows us to not only spot 0-day attacks and alert, c/side also makes it possible to block attacks before they touch the user’s browser. It also checks the box for multiple compliance frameworks, including PCI DSS 4.0.1
We believe this is the most secure way to monitor and protect your dependencies across your entire website.
Sign up or book a demo to get started.