secure

Edge Firewall

Protect users, applications, and networks with a modern approach.

Edge Firewall

How it works

Programmable security modules and rules processing

  • Edge Firewall processes incoming traffic at OSI layers L3-L7 through configurable criteria and behaviors defined in Rules Engine.

  • The system evaluates requests against user-defined conditions including headers, cookies, query strings, and network parameters.

  • Rules execute sequentially with conditional logic, enabling precise control over traffic before application access.

Programmable security modules with rules processingProgrammable security modules with rules processing

Edge Firewall Functions and security integrations

  • Edge Functions runtime executes custom JavaScript security code and third-party marketplace integrations directly at edge locations.

  • The system enables integration with specialized security tools including authentication, JWT validation, fingerprinting, rate limiting, and payload validation services.

  • Configurable behaviors provide flexible response options including blocking, monitoring, redirecting, and custom status codes.

Edge Functions with security integrations and custom responses.Edge Functions with security integrations and custom responses.

Distributed rule synchronization and SIEM integration

  • The platform automatically synchronizes configured security rules across all edge locations through API-driven deployment.

  • Data Stream connectors enable real-time security event forwarding to customer SIEM platforms for correlation analysis and threat intelligence feedback.

  • API endpoints allow dynamic adjustment of network lists and security configurations based on external threat intelligence and operational requirements.

Distributed rule synchronization with SIEM integration.Distributed rule synchronization with SIEM integration.
ADD-ON CAPABILITIES

Precise threat detection and mitigation with a programmable rules engine.

add-on

Web Application Firewall

Protect applications against OWASP Top 10 threats, zero-day attacks and more.

alt textalt text
add-on

Network Layer Protection

Stop attackers with intelligent rules, network lists, rate limiting, and more.

add-on

DDoS Protection

Always-on protection against DDoS attacks, backed by a 100% SLA.

top use cases

Learn how you can benefit from our platform.

Protect legacy and modern applications/APIs

Secure attack vectors against evolving web threats.

Maintain great customer experiences

Keep your applications, content, and origin infrastructure available, backed by our 100% SLA.

Achieve frictionless compliance

Simplify compliance with PCI-DSS and other security standards with an intuitive, enterprise-class platform.

Enable DevSecOps processes

Deliver secure applications on time.

Track potential threats and stream data to your SIEM in real time, while creating automated incident responses with our APIs.

  • Precise threat mitigation

    Advanced scoring algorithms reduce false positives while catching sophisticated and emerging threats.

  • Frictionless compliance

    Customize your rule sets to meet compliance and regulatory requirements.

  • Real-time observability and response

    Track potential threats and stream data to your SIEM in real time, while creating automated incident responses with our APIs.

  • Flexibility

    Protect your applications, APIs and networks wherever they are hosted: multi-cloud, on-premises or hybrid.

  • Automatically tuned

    Instantly detect and block bad traffic on Azion's software-defined network, backed by our 100% SLA guarantee.

'Azion protects the Brazilian omnichannel bank from sophisticated multi-layer attacks.'

Sign-up and get $300 to use for 12 months.

Access to all products

No credit card required

Credit available to use for 12 months