Accelerate security modernization with edge computing

Edge computing capabilities can help you safeguard your applications and their content, benefiting you from modern logic that requires minimum management and observability products to monitor requests while focusing on your core business objectives.

By implementing efficient and effective security measures at the edge, you can ensure faster threat detection and response times, leading to a more robust and proactive security posture, as well as significantly reducing latency, enhancing data privacy, and improving overall system resilience.

This use case is ideal for organizations looking to build a strong online presence and protect valuable business assets.


Security Modernization Architecture Diagram

Section titled Security Modernization Architecture Diagram

Security Modernization Architecture Diagram

  1. A request reaches Azion Edge Platform.
  2. Edge Firewall processes the request.
  • DDoS Protection Unmetered detects if there are DDoS or DoS attacks and either blocks the request and mitigates the attacks or allows the request.
  1. Edge Firewall Rules Engine identifies if there are rules from WAF, Network Layer Protection, and Bot Manager.
  2. Edge Application Rules Engine identifies if there are rules related to caching, image optimization, cookies, and redirects, among others.
  • If the request doesn’t match an Edge Firewall rule and isn’t blocked, the request continues the flow.
  1. If the content isn’t cached on the application, the request proceeds to the origin to be processed.
  2. Edge Application or Edge Firewall Rules Engine executes any rule configured for the Response Phase.
  3. The final response is delivered to the client.
  4. Activity can be observed through Real-Time Events, Real-Time Metrics, and GraphQL API or using a Data Stream connector to feed event logs into your stream processing, SIEM, and big data platforms.

  1. Create an edge application using one of the recommended options:
  1. Create an edge firewall and associate it with the configured domain, so all security rules apply to that specific domain.
  • Enable the Web Application Firewall, Network Layer Protection, and Edge Functions modules.
  1. Create a WAF rule set, configuring Threat Type and Sensitivity levels.
  2. Create a network list in Network Layer Protection.
  3. Create your security edge functions or explore marketplace security integrations like Fingerprint, reCaptcha, hCaptcha, Secure Token, JWT, and much more.
  4. Create rules in Rules Engine for Edge Firewall to define the behavior to be executed when the Edge Firewall detects a request matching the criteria defined by the rule sets, network lists, and edge functions.
  5. Use Observe products to monitor your requests and traffic.