Azion’s WAF Is the Best Option for Businesses of All Sectors
Boost your business cyber security with Azion's WAF, a flexible and cost-effective tool recognized for its excellence
FEB 9, 2024 • 9 min read
The Experts Speak: Cybersecurity Quotes About Zero-Trust, WAF, Social Engineering, and More
Cybersecurity quotes to expand your strategic understanding of Zero Trust, WAF, social engineering, and more.
FEB 1, 2024 • 7 min read
Five Ways HTTP/3 Can Increase the Security of Your Applications
HTTP/3 offers many security improvements over previous versions, which can help to protect your web applications from a variety of threats, including man-in-the-middle and denial-of-service attacks, and session hijacking.
JAN 26, 2024 • 7 min read
Enhance the security of your applications with the new Fingerprint feature of the Azion Marketplace
Improve your application security with the Azion Fingerprint feature, ensuring unique device identification. Scalable, and quick to implement. Try it today!
JAN 19, 2024 • 6 min read
Why did the WAF become essential for cybersecurity?
A scenario dominated by evolving threats requires a tool that increases observability and offers protection against the most varied attacks, even unknown ones.
JAN 18, 2024 • 5 min read
Signature-Based vs. Scoring-Based WAF
WAFs must evolve beyond a signature-based approach to protect against zero-day threats and maintain high performance.
NOV 28, 2023 • 6 min read
How to Mitigate OWASP Top 10 Risks with Azion's WAF
How does Azion's Web Application Firewall help fight OWASP Top 10 threats? Find out here!
NOV 28, 2023 • 14 min read
Two Edge Computing Solutions that Enhance Online Experience for Large-Scale Events
Discover why Azion's Load Balancer and Application Acceleration are the key to preventing website failures during high-traffic events.
NOV 14, 2023 • 6 min read
Remember Zero-Day Attacks Blocked by Azion's WAF
Learn how Azion's Web Application Firewall (WAF) prevents zero-day attacks from succeeding against your web applications.
NOV 6, 2023 • 4 min read
Seven Questions You Should Ask Before Choosing a WAF
Uncover key aspects and determining factors for choosing a Web Application Firewall (WAF) for your company.
OCT 27, 2023 • 6 min read
New Real-Time Metrics Features Offer Enhanced Observability
Upgraded functionality will provide enhanced observability for applications, with powerful real-time visualization into performance, availability and security
OCT 3, 2023 • 2 min read
Zero Trust Journey | Phase 4: Implementation
Discover how to implement a simplified Zero Trust architecture.
AUG 21, 2023 • 8 min read
5 security solutions to easily protect your e-commerce website
Learn how to deploy on your e-commerce platform the same security measures used by the largest retailers, without the need to modify applications or impact business continuity.
JUL 25, 2023 • 6 min read
Zero Trust Journey | Phase 3: Access Control
Find out how to build access control on a Zero Trust security model.
JUL 18, 2023 • 6 min read
Zero Trust Journey | Phase 3: Requirements for Access Control
Find out how to build access control on a Zero Trust security model.
JUN 29, 2023 • 9 min read
Control Access to Your Platform With Scheduled Blocking Function
Learn how you can have application access control with Azion Scheduled Blocking Function. It's an edge function to control access applications based on time windows.
JUN 21, 2023 • 9 min read
Protect Your Application From Session Theft With Azion
Learn what cookie tampering attack is and how to mitigate this attack that alters user data to perform session theft, impersonation, and other malicious actions.
JUN 21, 2023 • 10 min read
Discover How Azion Cipher Suites Manages Your TLS Ciphers at the Edge
Now Azion's graphical interface, Real-Time Manager, allows you to easily set up cipher suites for your edge applications with just a few clicks.
JUN 21, 2023 • 5 min read
Why Choose the Azion WAF
Discover the advantages of adopting Azion's WAF to protect your applications from known and emerging threats and from zero-day exploits.
JUN 13, 2023 • 7 min read
Now It's Much Easier to Get a Let's Encrypt TLS Certificate at Azion
TLS certificates at your fingertips! See how much easier and faster it is to generate or renew a free SSL certificate from Let's Encrypt at Azion's Edge Computing Platform.
JUN 6, 2023 • 5 min read
Azion Announces Solution That Blocks Oversized Requests
Find out why blocking oversized requests simplifies operations and gives you a competitive advantage. Get more security and performance for your applications with Azion's Limit Payload Size solution.
MAY 29, 2023 • 4 min read
Zero Trust Journey | Phase 2: Planning
Understand the planning phase in the Zero Trust journey and how to succeed in it.
MAY 22, 2023 • 8 min read
Learn How mTLS Can Make Your Applications More Secure
Learn how mTLS can add an extra layer of trust to your applications and help you avoid common data theft attacks.
MAY 17, 2023 • 7 min read
Azion Introduces a Feature to Optimize Threat Detection and Data Analysis
Azion introduces a new feature that helps organizations to optimize threat detection and data analysis.
MAY 15, 2023 • 4 min read
Azion Obtains PCI DSS v4.0 Cybersecurity Certification
With PCI DSS v4.0, Azion is prepared to support the payment card sector in facing the new challenges of today's cybersecurity. Find out how.
MAY 8, 2023 • 5 min read
Azion Marketplace Adds Solution to Monitor and Block Suspicious Requests
Monitor and block suspicious requests with the Request Variation Controller feature available on the Azion Marketplace.
APR 26, 2023 • 4 min read
Zero Trust Journey with Azion | Phase 1: Preparation
Discover the preparation phase and how to execute it for your Zero Trust implementation.
APR 24, 2023 • 5 min read
What Is Data Loss Prevention and How Can I Protect My Business?
Data loss prevention is technology that aims to detect and prevent the loss, leakage, or misuse of data through breaches, leaked transmissions, and unauthorized use.
APR 17, 2023 • 6 min read
How Edge Computing Improves API Security
Find out how edge computing technology gives APIs a superior level of protection and integrity. Check it out!
APR 4, 2023 • 9 min read
First Steps to Simplify the Zero Trust Model Adoption
Discover how to simplify your zero trust journey by following best practices.
MAR 27, 2023 • 8 min read
Azion's WAF Is Not Vulnerable to the CRLF Injection Bypass
Attack may affect products from many vendors. Tests prove the efficacy of Azion's WAF in protecting our customers from zero-day threats.
MAR 23, 2023 • 6 min read
Understand Zero Trust Security's Approach to Data Protection
Microsegmentation and access privilege restriction are some of the characteristics of Zero Trust Security that keep your data away from the hands of criminals.
MAR 20, 2023 • 6 min read
Five Cybersecurity Risks in 2023 and How to Protect Yourself Against Them
Find out how using edge computing can mitigate today's most common cybersecurity risks.
MAR 15, 2023 • 7 min read
5 Benefits of Edge Computing for Banking Technology
Discover five benefits that edge computing can bring to traditional banks, fintechs and other companies in the financial sector.
FEB 27, 2023 • 9 min read
Five Cases of IT Transformation with Edge Computing
Check out these five success stories from companies that have transformed their IT using edge computing.
FEB 15, 2023 • 17 min read
Is Banking Cybersecurity Improved by Edge Computing?
This blog post analyzes how banking cybersecurity is evolving in the edge computing universe.
JAN 24, 2023 • 8 min read
DNSSEC on the Azion Edge Computing Platform
Learn how DNSSEC works on Azion's Edge Computing Platform and how you can enable it to add an extra layer of protection for your websites and applications.
JAN 19, 2023 • 5 min read
How Justa Has Been Evolving Its Technology to Meet Modern Digital Demands
Justa was able to simplify compliance with PCI DSS and Brazil's Central Bank rules and increase the protection of transactions via PIX and QR Code carried out in its points of sales.
JAN 17, 2023 • 4 min read
What is DNSSEC?
Learn what is DNSSEC and how you can use it to add an extra layer of protection for the end users of your websites and applications.
JAN 5, 2023 • 7 min read
The recent WAF Bypass attack does not affect Azion's Web Application Firewall
A recently demonstrated technique allows an attacker to bypass some popular Web Application Firewalls (WAFs). But Azion customers are safe, learn why.
DEC 20, 2022 • 5 min read
Azion Achieves SOC 3 Compliance
With SOC 3, Azion provides transparency into our security and availability controls by making information about our SOC 2 audit accessible to customers.
NOV 14, 2022 • 2 min read
Demystifying Zero Trust Architecture: A Practical Guide
This blog will explain the components and reference architecture needed for effective zero trust security.
NOV 10, 2022 • 7 min read
How Edge Computing Solves Four Key IoT Challenges
The rapid growth of IoT is dependent on the infrastructure needed to support it. While 5G often takes the spotlight for enabling new IoT use cases, edge computing is already working to solve many of the issues created by the exponential increase in IoTs.
NOV 2, 2022 • 10 min read
Azion Introduces Its New Federated Authentication Feature
Azion presents our new federated authentication feature, which simplifies multiple tools' login process and brings more security to the user and your company.
NOV 2, 2022 • 4 min read
Azion and Radware Bot Manager: A Combo for Full Protection
Our main goal is to ensure efficient bot management closest to end users, leveraging the security, performance and resiliency of the Azion platform, combined with a state-of-the-art bot mitigation solution in Radware, fully equipped to detect and block the most aggressive and sophisticated automated attacks.
NOV 1, 2022 • 4 min read
How Will Digital Transformation Change Your Compliance Risk?
With many companies’ digital transformation underway, it’s important to consider how new processes and technology can affect your compliance. Find out how!
OCT 24, 2022 • 8 min read
Can Zero Trust Help You Maintain Compliance?
By replacing perimeter-based security with a zero-trust approach that restricts access based on users and data, teams can strengthen compliance with data privacy laws.
OCT 24, 2022 • 6 min read
Two-Factor Authentication (2FA) Reinforces the Security of Your Access to the Azion Platform
Azion has just implemented two-factor authentication (2FA) for Real Time Manager access. Learn how this new feature makes our edge platform even more secure.
JUL 4, 2022 • 5 min read
How Our New Social Login Feature Simplifies the Way You Access the Azion Edge Platform
Azion introduces its new Social Login feature, which makes it easier to register and access Real-Time Manager using the credentials of major social networks.
JUN 21, 2022 • 3 min read
Stay Ahead of the Security Curve with Cyber Threat Intelligence
Cyber threat intelligence is a proactive security method that collects, analyzes, and organizes threat data to inform fast, effective decision-making. Learn more!
JUN 6, 2022 • 7 min read
Azion Adopts the Use of Personal Tokens on Its Platform
Discover our personal tokens, a new way to make your access to Azion APIs and CLI even safer.
MAY 17, 2022 • 7 min read
Azion Achieves Level 1 PCI Certification
We’re proud to announce that we are now a PCI DSS 3.2.1 Level 1 compliant service provider, effective across all of our edge platform services
APR 12, 2022 • 5 min read
Azion Achieves SOC 2 Compliance
Azion has achieved SOC 2 Type 2 compliance.
APR 12, 2022 • 1 min read
How Azion DDoS Protection Mitigates the Main Types of DDoS Attacks
Over the past two years, the technology industry has faced a progressive increase in the types, size and aggressiveness of DDoS attacks. Therefore, it is necessary to protect yourself to avoid major financial losses and damage to your company's image.
MAR 9, 2022 • 13 min read
Easily Obtain SSL Certificates with Let's Encrypt
With Let’s Encrypt’s automated process, you can easily obtain SSL certificates for your domains and set them up at no additional cost on Azion’s platform.
JAN 18, 2022 • 8 min read
How Much Should You Spend on Cybersecurity?
Budgeting for cybersecurity requires IT decision makers to analyze their needs, prioritize cost-effective solutions, and consider recent security trends.
JAN 13, 2022 • 9 min read
Benefits of a Modern DNS at the Edge
Find out the benefits of a modern DNS in an edge computing platform. Azion's Intelligent DNS.
JAN 12, 2022 • 8 min read
A Closer Look at Log4Shell and Azion’s Protections
Given the severity of the Log4Shell exploit, security teams must rely on robust WAFs that not only protect known exploits, but new and emerging variants.
JAN 6, 2022 • 9 min read
How Azion Protects Our Customers from CVE-2021-44228
CVE-2021-44228 is a vulnerability in Log4j that enables remote file execution. Azion’s WAF offers protection with a simple rule configuration.
DEC 20, 2021 • 5 min read
How Cybersecurity Protects Your Brand Image
Downtime, spam, and data leaks can damage your brand image. Choosing the right security products will help you avoid attacks that protect your brand.
NOV 18, 2021 • 11 min read
Edge Computing and the Future of Healthcare
Edge computing will revolutionize the future of healthcare with localized data security, less dependence on bandwidth, and mission-critical low latency.
NOV 17, 2021 • 12 min read
The Rising Cost of Cyberattacks
The cost of cyberattacks to businesses is higher than ever. Investing in cybersecurity now can avoid these damages and improve your users’ trust.
NOV 9, 2021 • 8 min read
Analytics as a Security Tool
Learn how data analytics can enhance your security by providing internal transparency.
NOV 4, 2021 • 9 min read
A Quick Guide to Securing Serverless Applications
Serverless developers are responsible for securing their data, third-party services, and code. Best practices like least-privilege access can ensure protection.
OCT 26, 2021 • 9 min read
Protecting Against Zero Days: Apache HTTP Server Exploit (CVE-2021-41773)
A zero-day path traversal attack is being used to exploit a vulnerability in Apache HTTP servers. You can protect against it using an advanced rules-based WAF.
OCT 22, 2021 • 6 min read
Most Common Types of DDoS Attacks
To stop DDoS attacks from crashing or degrading your web application, you must understand what they are and how they work.
OCT 13, 2021 • 6 min read
Secure Your Website for Black Friday
Learn how to secure your website and ready yourself for Black Friday.
OCT 5, 2021 • 6 min read
How to Keep Edge Applications Secure
Edge security strategies like zero trust have benefits for applications and websites residing anywhere in today’s complex threat landscape.
SEP 30, 2021 • 9 min read
Improve Security with Custom Rule Sets
Protect against massive cyberattacks with Edge Firewall
SEP 24, 2021 • 7 min read
Ransomware: What Is It and How Can You Prevent It?
As Ransomware attacks increase, learn how Edge Computing can lower your ransomware risk and keep your critical applications and data secure.
AUG 31, 2021 • 10 min read
DDoS Attack Trends for H2 2021
With the continued high risk of DDoS attacks, the most important step a company can take in ensuring its availability and performance is to be prepared for attacks before they begin.
AUG 13, 2021 • 10 min read
Build Data Insights to Keep you Secure and Compliant with Regulatory Laws
Azion Data Stream: Ensure Safety and Comply with Regulatory Laws.
AUG 4, 2021 • 3 min read
Keep Your e-Commerce Available on Black Friday
Having an outage on Black Friday is every e-commerce owner’s worst nightmare. Preparing for access spikes and DDoS attacks can ensure that your site stays available.
JUL 27, 2021 • 10 min read
What is a DDoS attack, anyway?
Distributed Denial of Service (DDoS) attacks are one of the most common forms of cyber attacks we have today.
JUL 1, 2021 • 8 min read
5 management techniques to mitigate bad bots on your website
Bad bots represent approximately 26% of internet traffic and disrupt services, steal data, perform fraudulent and other illegal activities.
JUN 4, 2021 • 5 min read
Delivering Speed with Security: Why Azion Is Ideal for Finance Apps
Some of the measures designed to secure applications can negatively impact performance, resulting in a tradeoff that finance apps can’t afford to make. Edge computing can prevent this dilemma.
MAY 5, 2021 • 10 min read
Three Ways Edge Computing Can Improve e-Commerce
As e-commerce becomes an increasingly popular way for consumers to shop, businesses must find new and innovative ways to improve their sites in order to remain competitive. By providing speed, increased availability, real-time analytics, and security in the last mile, edge computing can give retailers a competitive advantage.
APR 20, 2021 • 11 min read
Bots: Allies or Enemies? How to Ensure the Security of Your Business and Clients
Customer data moves back and forth all the time, and although the forms of virtual interaction have diversified, security when protecting this data has not always been enough. Since companies are increasingly building cloud-based applications with SaaS, security must also evolve to keep pace with this modernization.
APR 9, 2021 • 6 min read
DDoS Attack Trends for 2021
Ongoing changes to Internet use like accelerated cloud migration and the increase in IoT devices have resulted in larger and more frequent DDoS attacks, attacks on APIs, and new attack weapons. The most important step a company can take in protecting against DDoS attacks is to be prepared for them before they begin.
MAR 2, 2021 • 10 min read
Strengthening Routing Security
Azion is working with the Internet Society on implementing MANRS, a sweeping initiative to tackle BGP vulnerabilities and routing weaknesses in pursuit of building a safer, more stable global internet.
MAR 2, 2021 • 5 min read
Zero Trust: How Does It Work?
Click here to read about what the zero trust economy is and how it can improve your cybersecurity.
NOV 19, 2020 • 9 min read
Origin Shield, Available for RTM and API
Automate the configuration of your firewall rules and release or block access at its source only to specific IP addresses.
JUL 13, 2020 • 3 min read