Defense in Depth
Different tools are needed to combat different types of attacks. Edgecast is flexible and capable to address these variations.

Security Application Manager
Dual Web App and API Protection
Run full production workloads in Block and Alert on a combination of rules. Quickly test and verify changes against real traffic.
Rate Limiting
Keep visitors limited to reasonable interactions to mitigate brute-force attacks or keep interactions boxed in. Protect key APIs and Login pages.
Versioning and Rollback
Deploy changes globally in seconds to verify changes, address zero day attacks, verify changes, and decrease general frustration with waiting for configs to “go live”.
API Security
Prevent common API vulnerabilities such as injection attacks, while also improving developer experience and overall security posture.


Observability and Prevention
Attack Surface Management
Proactively identify, analyze, and mitigate vulnerabilities across your properties and network. Automate alerting and task assignment to ensure compliance.
Origin Shield
Protect your origin from unnecessary load by enabling a centralized caching layer between your edge and origin servers.
Auditing
Apply config version in Audit mode on production traffic. Observe the result of the changes in analytics view within seconds.
Denial of Service Attacks (DDoS)
Built-in threshold alerting to manage attacks on the network. Combined with Managed SOC to stop attacks in their place.

Dual Web App and API Protection (WAAP/WAF)
Traffic is evaluated against both Block and Audit mode configurations, ensuring a consistent security posture across all systems and eliminating the need to “test in production.
View Audit mode analytics in the Security Dashboard
Promote configuration to Block mode when ready
View Block mode analytics in the Security Dashboard for further confirmation.
Versioning and Rollback
Like version control for your security system. Log who performed changes, when they performed them, and what was changed.
Easily view Diff to quickly summarize changes
Change summary can be presented in a text or JSON file


Rate Limiting
Designed to work seamlessly alongside Layer 3/4 DDoS protection. It can be applied to all traffic or targeted to specific users, giving your team the flexibility to enforce API rate limits and safeguard high-risk pages—like login or authentication endpoints—from abuse.
Maintain consistent flow that protects your infrastructure
Reduce the risk of overload and avoid costly autoscaling events
Bot Manager
Bot manager is the key to making sure the “good” bots are able to keep the internet working as expected while blocking “bad” bots that are trying to perform malicious actions. The control is yours, block all bots, some or none.
Granular action response options: alert, block, browserchallenge, CAPTCHA, custom response, redirect, drop connection, JA4 fingerprinting
Prevent malicious bot activity such as credentialstuffing and inventory hoarding


API Security
Discover and protect API endpoints in multiple ways that ensure greater confidence and better performance. Filter sensitive data and code to avoid unintended leaks.
JWT Authentication at the edge (stateless, encrypted)
Schema validation to enforce a positive security model (XML, JSON)
CI/CD integration to keep rules in sync with API configurations
Attack Surface Management
Continuously identify, analyze, and mitigate vulnerabilities across your applications and network. Edgecast automatically discovers all related systems, cataloging assets and inventory.
Vulnerabilities are automatically categorized and cataloged.
Tasks can be assigned to team members to follow through on mitigation
Scheduled reports can email on a regular cadence to concerned parties.
ASM continuously updates and rescans for new vulnerabilities.


Scan Your Properties
Discover, analyze and mitigate vulnerabilities across your applications and network

Denial of Service Attacks (DDoS)
Edgecast has been part of some of the largest attacks in the history of the internet. Leveraging our systems ability to quickly filter and mitigate these attacks has kept customers safe and secure from downtime.
DDoS mitigation takes place with sufficient network capacity, smart rule tuning, and a proactive SOC.
Edgecast’s detection and mitigation takes place at the Layer 3 and 4 level.
The SOC gets involved quickly and evaluates the attack to provide further mitigation and tuning.
With Edgecast, most DDoS attacks get stopped before they can ever even get going


Origin Shield
Keeping an origin walled off from the general internet is one of the best ways to make sure access can only come via your security layers.
Edgecast obfuscates your origin location
Edgecast fronts all requests to your network to ensure best practices are followed for security threats and traffic bursts.
Let Us Handle It
With Edgecast’s Managed Services, you’ll work directly with our experts to strengthen your security posture and optimize your site’s performance.
