CTM Security Operations Center

Defense Lab

WAF Analysis

Test your Akamai App & API Protector configurations here. Simulate SQLi and XSS attacks to verify edge blocking.

Zero Trust

Internal training for Identity-Aware Proxy (IAP) setups. Ensure only authenticated CTM personnel can access this environment.

Bug Bounty

View the current scope for our internal vulnerability disclosure program. Focus on Edge Workers and Bot Management bypasses.

Why choose CTM Security?

Advanced Bot Defense

Testing Akamai Bot Manager? Use this page to verify if scraper bots are identified at the edge before hitting the origin server.

Global DDoS Protection

Simulate high-volume Layer 7 requests to ensure Prolexic and Edge DNS are functioning according to the training playbook.

Shadow API Discovery

Uncover hidden endpoints. This demo helps users understand how Akamai discovers and catalogs unmanaged API calls.

Register for the CTM Global CTF event and win prizes

00
Days
00
Hours
00
Minutes
00
Seconds
Request temporary Admin Access to the security staging environment

Security Modules

Security Incident Response