{{toggleGlobalText}}
Content Delivery
Global CDN Edge Infrastructure
- Global Infra Coverage: Infrastructure spans first-tier cities across 50+ countries in Southeast Asia, Oceania, North America, South America, and Asia.
- Globally Distributed PoPs: Distributed PoPs at tier-1 ISPs and major peering points, covering local tier-1 and extended tier-2 and tier-3 Telcos.
Content Acceleration
-
Website Acceleration:Accelerates static content cache of the customer website, UGC applications or e-commerce platforms through intelligent scheduling and edge caching, improving the access experience of web users.
- Download Acceleration: Accelerates large file downloads on websites, e-commerce platforms and apps.
-
API Acceleration: Accelerates API request processing speed by bypassing congested routes. Dynamic content is transmitted to the origin based on intelligent routing technology.
Scalability & Reliability
- Optimised Routing and Caching: Optimises routing and caching across CDN points to serve content from the most efficient source.
- Traffic Adaptation: Automatically adapts to various traffic demands to consistently ensure seamless and uninterrupted content delivery.
- Robust Service: Provides robust service by rerouting traffic during network issues.
{{toggleDeliveryText}}
AI-WAF
General Protection
- Protects websites from common threats using managed rule groups.
- Offers enhanced intelligent detection against injection attacks powered by semantic analysis rule groups.
- Provides multiple managed protection policies tailored to various business security scenarios.
Contextual AI Detection
- Features a fully integrated, hybrid, AI-driven threat detection engine.
- Employs semantic-based algorithms to contextualise threat detection, enhancing the machine comprehension of users’ intentions.
- Utilises a pre-trained machine learning model and algorithms to access and score for higher accuracy.
Advanced Protection
- Page Defacement Mitigation: Ensures that website visitors always get intact web pages, even if websites are hacked or tampered with.
- Cross-Site Request Forgery (CSRF) Protection: Checks the request referers from the below URL list to verify whether they have access to the cross-site.
- Anti-Leech Protection: Prevents untrusted third-party websites from accessing static resources.
- Brute Force Protection: Protects websites from cracking attacks using vast numbers of usernames and passwords with a wide range of combinations.
- Geo-Location Restriction: Allows or denies requests from a particular region or country.
- XML Protection: Validates XML files to prevent attacks against servers.
- Week Password Protection: Detects and handles weak passwords in requests based on the configured rule.
- CC Protection: Protects a website from surged requests with the same source to specific paths.
- Illegal Download Protection: Detects and protects the download of specific files.
- Cookie Protection: Secures cookies and prevents the contents from being leaked or tampered with.
- Honeypot Protection: Uses fake website paths as bait for attackers to intelligently collect attacks.
- Vulnerability Scanning Protection: Prevents scan behaviours against servers by setting up a threshold on the rate limit from a single client.
Compliance Validation
- Validates HTTP requests to comply with HTTP protocol.
Web Control
- Global WAF Whitelist: Allows specific IPs or URL paths to bypass AI-WAF detection across all websites.
- Website WAF Whitelist: Enables only applying the whitelist to specific websites.
- Blacklist Management: Enables manually removing blacklisted IPs.
Distributed Denial-of-Service (DDoS) Mitigation
Protects targeted applications and APIs from DDoS attacks by employing sophisticated detection and remediation in multiple network layers.
- Protects against Challenge Collapsar (CC) attacks on websites.
- Applies global rate limit to defend against brute force cracking attacks.
- Detects and blocks automated business threats based on client behaviours including cracking, stuffing and spamming.
- Supports score-based blocking with up-to-date reputation database and intelligence.
- Prevents protocol exploitation and packet exploitation in network layers.
- Mitigates HTTP flooding and HTTP slow attacks brought by malicious bots and hacking tools.
- Blocks ICMP floods and UDP floods in the cloud.
Emergency Mitigation
- Provides defensive features that allow customers to have quick countermeasures towards ongoing threats or specific business scenarios.
- Kill Switch: Blocks all requests to protected websites.
- Read-Only Website: Only requests with HTTP GET and HEAD methods can access the website.
- Static Website: Only allow requests to visit static HTML pages and static files.
- Collaborative Monitoring: Continuously monitors threats and implements necessary protective actions.
Bot Management
Dynamically protects websites from automated threats and malicious bot activities.
- Token Validation: Embeds requests with dynamically generated and encrypted security tokens to validate legitimacy.
- Behaviour-Based Bot Detection: Identifies and blocks malicious requests from automated tools and bots.
- Debugging Prevention: Stops debugging activities on remote user browsers to prevent exploitation.
- Browser Interrogation: Monitors and analyses user behaviours to identify potential threats and anomalies.
- Finger Printing: Supports unique tags on client, device and access with rich behaviour and agent profiles.
- Verified Bot Management: Enables managing specific bot traffic, including uptime monitoring, search engine, and marketing tools, to bypass the bot detection to reduce false positives.
- Bot Whitelist: Configures whitelist to allow particular requests or responses to bypass bot detection.
{{toggleOpenAPIText}}
API Protection
Provides a comprehensive, automated solution for discovering, managing, and protecting APIs from vulnerabilities, threats, and data breaches.
API Management
- Automatically discovers APIs and organizes them by domain.
- Generates a clear API inventory for overview.
- Systematically tags APIs for tailored protection.
API Request Validation
- Analyses and auto-profiles API parameters.
- Validates input parameters to ensure request integrity.
Threat Detection
- Managed protection rules protect APIs from common threats.
- Enables configuring custom rules to defend against targeted attacks.
Data Loss Prevention
- Detects and protects sensitive data, including Personally Identifiable Information (PII), in API requests and responses.
- Provides data masking to prevent sensitive information leakage.
API Data Sampling
- Configures sampling frequencies to effectively monitor API requests and responses.
Advanced Analytics
- Provides detailed insights into API assets, threats, vulnerabilities, and sensitive data through an intuitive dashboard.
Programmable Mitigation
- Web Access Control: Secures web applications by blocking requests from suspicious IP addresses or user agents.
- Rate Limiting: Prevents excessive requests from overwhelming protected web applications to ensure optimal performance and security.
Website Management
- Configure websites to enable protection.
- Periodically monitor the health status of the website origin.
{{toggleOptimisationText}}
Behavioural Analytics
Provides an insightful and intuitive dashboard to monitor the protected websites.
- Performance Overview: Enables monitoring system’s general performance.
- Visualised Data: Utilises diverse data representation (charts, diagrams, tables, etc.) to provide a visualised data insight.
- Centralised Analysis: Provides a centralised location to display pre-correlated insights and analysis.
- Alert Monitoring: Enables all significant alerts generated by the system.
- Threat Investigation: Facilitates detecting and tracking potential threats.
Settings
- Utilises common parsers and decoders to process requests before inspection.
- Decodes parameters in requests for threat detection.
- Manages template HTML and XML files.