MaxiSafe Features

{{toggleGlobalText}} Content Delivery

  • Global Infra Coverage: Infrastructure spans first-tier cities across 50+ countries in Southeast Asia, Oceania, North America, South America, and Asia.
  • Globally Distributed PoPs: Distributed PoPs at tier-1 ISPs and major peering points, covering local tier-1 and extended tier-2 and tier-3 Telcos.
  • Website Acceleration:Accelerates static content cache of the customer website, UGC applications or e-commerce platforms through intelligent scheduling and edge caching, improving the access experience of web users.
  • Download Acceleration: Accelerates large file downloads on websites, e-commerce platforms and apps.
  • API Acceleration: Accelerates API request processing speed by bypassing congested routes. Dynamic content is transmitted to the origin based on intelligent routing technology.
  • Optimised Routing and Caching: Optimises routing and caching across CDN points to serve content from the most efficient source.
  • Traffic Adaptation: Automatically adapts to various traffic demands to consistently ensure seamless and uninterrupted content delivery.
  • Robust Service: Provides robust service by rerouting traffic during network issues.

{{toggleDeliveryText}} AI-WAF

  • Protects websites from common threats using managed rule groups.
  • Offers enhanced intelligent detection against injection attacks powered by semantic analysis rule groups.
  • Provides multiple managed protection policies tailored to various business security scenarios.
  • Features a fully integrated, hybrid, AI-driven threat detection engine.
  • Employs semantic-based algorithms to contextualise threat detection, enhancing the machine comprehension of users’ intentions.
  • Utilises a pre-trained machine learning model and algorithms to access and score for higher accuracy.
  • Page Defacement Mitigation: Ensures that website visitors always get intact web pages, even if websites are hacked or tampered with.
  • Cross-Site Request Forgery (CSRF) Protection: Checks the request referers from the below URL list to verify whether they have access to the cross-site.
  • Anti-Leech Protection: Prevents untrusted third-party websites from accessing static resources.
  • Brute Force Protection: Protects websites from cracking attacks using vast numbers of usernames and passwords with a wide range of combinations.
  • Geo-Location Restriction: Allows or denies requests from a particular region or country.
  • XML Protection: Validates XML files to prevent attacks against servers.
  • Week Password Protection: Detects and handles weak passwords in requests based on the configured rule.
  • CC Protection: Protects a website from surged requests with the same source to specific paths.
  • Illegal Download Protection: Detects and protects the download of specific files.
  • Cookie Protection: Secures cookies and prevents the contents from being leaked or tampered with.
  • Honeypot Protection: Uses fake website paths as bait for attackers to intelligently collect attacks.
  • Vulnerability Scanning Protection: Prevents scan behaviours against servers by setting up a threshold on the rate limit from a single client.
  • Validates HTTP requests to comply with HTTP protocol.
  • Global WAF Whitelist: Allows specific IPs or URL paths to bypass AI-WAF detection across all websites.
  • Website WAF Whitelist: Enables only applying the whitelist to specific websites.
  • Blacklist Management: Enables manually removing blacklisted IPs.
Protects targeted applications and APIs from DDoS attacks by employing sophisticated detection and remediation in multiple network layers.
  • Protects against Challenge Collapsar (CC) attacks on websites.
  • Applies global rate limit to defend against brute force cracking attacks.
  • Detects and blocks automated business threats based on client behaviours including cracking, stuffing and spamming.
  • Supports score-based blocking with up-to-date reputation database and intelligence.
  • Prevents protocol exploitation and packet exploitation in network layers.
  • Mitigates HTTP flooding and HTTP slow attacks brought by malicious bots and hacking tools.
  • Blocks ICMP floods and UDP floods in the cloud.
  • Provides defensive features that allow customers to have quick countermeasures towards ongoing threats or specific business scenarios.
  • Kill Switch: Blocks all requests to protected websites.
  • Read-Only Website: Only requests with HTTP GET and HEAD methods can access the website.
  • Static Website: Only allow requests to visit static HTML pages and static files.
  • Collaborative Monitoring: Continuously monitors threats and implements necessary protective actions.
Dynamically protects websites from automated threats and malicious bot activities.
  • Token Validation: Embeds requests with dynamically generated and encrypted security tokens to validate legitimacy.
  • Behaviour-Based Bot Detection: Identifies and blocks malicious requests from automated tools and bots.
  • Debugging Prevention: Stops debugging activities on remote user browsers to prevent exploitation.
  • Browser Interrogation: Monitors and analyses user behaviours to identify potential threats and anomalies.
  • Finger Printing: Supports unique tags on client, device and access with rich behaviour and agent profiles.
  • Verified Bot Management: Enables managing specific bot traffic, including uptime monitoring, search engine, and marketing tools, to bypass the bot detection to reduce false positives.
  • Bot Whitelist: Configures whitelist to allow particular requests or responses to bypass bot detection.

{{toggleOpenAPIText}} API Protection

Provides a comprehensive, automated solution for discovering, managing, and protecting APIs from vulnerabilities, threats, and data breaches.
  • Automatically discovers APIs and organizes them by domain.
  • Generates a clear API inventory for overview.
  • Systematically tags APIs for tailored protection.
  • Analyses and auto-profiles API parameters.
  • Validates input parameters to ensure request integrity.
  • Managed protection rules protect APIs from common threats.
  • Enables configuring custom rules to defend against targeted attacks.
  • Detects and protects sensitive data, including Personally Identifiable Information (PII), in API requests and responses.
  • Provides data masking to prevent sensitive information leakage.
  • Configures sampling frequencies to effectively monitor API requests and responses.
  • Provides detailed insights into API assets, threats, vulnerabilities, and sensitive data through an intuitive dashboard.
  • Web Access Control: Secures web applications by blocking requests from suspicious IP addresses or user agents.
  • Rate Limiting: Prevents excessive requests from overwhelming protected web applications to ensure optimal performance and security.
  • Configure websites to enable protection.
  • Periodically monitor the health status of the website origin.

{{toggleOptimisationText}} Behavioural Analytics

  • Performance Overview: Enables monitoring system’s general performance.
  • Visualised Data: Utilises diverse data representation (charts, diagrams, tables, etc.) to provide a visualised data insight.
  • Centralised Analysis: Provides a centralised location to display pre-correlated insights and analysis.
  • Alert Monitoring: Enables all significant alerts generated by the system.
  • Threat Investigation: Facilitates detecting and tracking potential threats.
  • Utilises common parsers and decoders to process requests before inspection.
  • Decodes parameters in requests for threat detection.
  • Manages template HTML and XML files.