Protect

Network Shield

Create a programmable security perimeter on the Azion Web Platform's distributed architecture to protect applications, APIs, and networks in any environment — multi-cloud, hybrid, or on-premises.

Network Shield

Advanced mitigation

Use network lists of IP addresses, geographic locations, and ASNs and the power of the Rules Engine to harden applications, content, and infrastructure.

Multi-cloud and On-Prem

Protect your applications, APIs, and networks wherever they are hosted: in multi-cloud, on-premises, or hybrid environments.

Reduce Costs

Block unwanted traffic on the distributed infrastructure before it consumes resources on your origin.

DNZ
Axur
Radware
Arezzo
Contabilizei
Magazine Luiza
Fourbank
Amazon Prime Video
Crefisa
Netshoes
Dafiti
Global Fashion Group
GPA Logo

"Azion shielded us from sophisticated cyberattacks and empowered us to modernize our infrastructure, reduce costs, and deliver the best shopping experiences to millions of customers across Latin America."

Allan Monteiro

CISO & Head of Technology

Network Lists for programmable ACLs

Define access policies with lists that combine IP addresses, geolocation, ASNs, and reputation.

Reference these lists directly in the Firewall and ensure updates are propagated automatically without causing service interruption

Docs

To get started, enable Network Shield in the Firewall and configure the Rules Engine to define traffic filtering criteria.

Simplified security with rule-based traffic control

Simplify security management with a centralized catalog of ACLs and apply actions based on custom rules.

Segment access by region, trusted address lists, allow search crawlers without opening gaps, and keep policies consistent by sharing network lists across multiple firewalls.

Learn More

Create custom allowlists or blocklists using IPs, CIDR blocks, ASNs, countries, or Azion-managed lists such as Tor networks.

Threat response through automation

Stream events in real time to your SIEM and use automated playbooks to update Network Lists via API with effects in seconds.

Orchestrate dynamic decisions using Azion Functions to adapt the risk response and implement programmable blocks on each request.

Start Free

Monitor, block, or rate-limit inbound and outbound traffic based on your configured network lists.

Use cases

Apply Network Lists

Create allowlists and blocklists with IPs, CIDR blocks, countries, or Azion-managed networks like Tor. Control who accesses and from where — without delays or complexity.

Stop abusive users or intruders

Set rate limits to contain suspicious login attempts, monitor abnormal usage patterns, and block abusive behaviors in real time.

Meet regulatory compliance

Restrict access from countries and networks where the application is not authorized to operate due to local regulations, such as data privacy laws or trade embargoes.

Avoid bandwidth costs

Eliminate malicious traffic spikes and prevent unnecessary bandwidth consumption — saving costs without compromising performance.

Access to all features.

$300 free credits

Modenize your Application Security