Enhance Cybersecurity with Azion's Advanced WAAP Solution

Azion’s Web Application and API Protection (WAAP) ensures robust defense mechanisms against cyber threats such as OWASP Top 10, sophisticated zero-day attacks, and automated bot activities. This architecture guarantees the security and uninterrupted availability of web applications and APIs by employing a comprehensive suite of integrated security features that meticulously analyze and manage incoming requests to protect against a wide range of attacks.

This solution is ideal for organizations looking to safeguard their digital infrastructure against advanced security threats, providing reliable protection for web applications and APIs against the most challenging cyber attacks.


Web Application and API Protection (WAAP) Architecture Diagram

Section titled Web Application and API Protection (WAAP) Architecture Diagram

Architecture diagram

Web Application and API Protection (WAAP) Dataflow

Section titled Web Application and API Protection (WAAP) Dataflow
  1. A request reaches Azion Edge Platform and is redirected to Edge Firewall.
  2. Edge Firewall processes the request, where DDoS Protection Unmetered assesses for potential DDoS or DoS attacks, blocking or allowing the request accordingly.
  3. Edge Firewall’s Rules Engine processes the rules during the request phase; if conditions are met, the corresponding behaviors are executed.
  4. Rules Engine finalizes execution and sends a response if:
    • Network Layer Protection identifies the user or network as a potential threat and applies configured behaviors such as blocking or penalties.
    • WAF detects a security threat.
    • Bot Manager classifies the device, user, or intent as malicious.
    • Security Edge Functions or custom rules, such as rate limiting, deny access or take other preventive actions to protect the application.
  5. Rules Engine permits the request to proceed to Edge Application.
  6. Edge Application’s Rules Engine forwards the request to the Origin—whether it be multi-cloud, on-premises, or hybrid—and, upon receiving the response, initiates the Rules Engine’s response phases.
  7. The client receives the final response.
  • Edge Firewall: provides main settings to set up your instance and associate it with domains and activate modules.
    • DDoS Protection: detects and mitigates DDoS and DoS attacks when it’s activated.
    • Web Application Firewall: allows you to configure protection against attacks and vulnerabilities found in OWASP Top 10 and block requests.
    • Network Layer Protection: allows you to create lists with IP addresses or countries with suspicious behavior and restrict their access.
    • Bot Manager: identifies and classifies the request according to the intent-based behavioral analysis.
  • Edge Application: runs your application on top of the Azion Edge Platform.


  • Use Azion Observe products to monitor your application delivery, incoming traffic, and how your security logics are being applied and with which requests.