1 of 20
2 of 20
3 of 20
4 of 20
5 of 20
6 of 20
7 of 20
8 of 20
9 of 20
10 of 20
11 of 20
12 of 20
13 of 20
14 of 20
15 of 20
16 of 20
17 of 20
18 of 20
19 of 20
20 of 20

site

doc

blog

success stories

Secure

Network Layer Protection

A programmable security perimeter for inbound and outbound traffic at the edge.

Network Layer Protection

How It Works

1

Start by setting up your edge application and edge firewall (<10 min) and enabling the Network Layer Protection module.

1
Start by setting up your edge application and edge firewall (<10 min) and enabling the Network Layer Protection module.
2

Create network lists based on user location, ASN, individual hosts, IPs, or lists maintained by Azion, such as the outbound addresses of Tor networks.

2
Create network lists based on user location, ASN, individual hosts, IPs, or lists maintained by Azion, such as the outbound addresses of Tor networks.
3

A globally distributed network of state-of-the-art edge nodes monitor, block or rate limit inbound and outbound traffic based your configured network lists.

3
A globally distributed network of state-of-the-art edge nodes monitor, block or rate limit inbound and outbound traffic based your configured network lists.
Key Benefits

Trusted by security experts across banking, e-commerce, tech, and other industries.

  • Advanced Mitigation
    Full protection for your applications, content and infrastructure with network lists, rate limiting, and origin shield.
  • Flexibility
    Protect your applications, APIs and networks - wherever they are hosted - multi-cloud, on-premises or hybrid.
  • Granular Control
    Create block lists based on networks (ASN), IP/CIDR, country or automatically updated lists, which include Tor networks.
  • High Resiliency
    Automatically-tuned, software-defined network routes bad traffic away, backed by our 100% SLA.
  • Rapid Response
    Mission-critical support and expertise before, during and after an attack.
  • Lower Bandwidth Costs
    Block bad traffic at the edge - without having to scale up bandwidth.
  • Visibility and Automation
    Define responses and gain valuable insights into specific URLs of websites, applications, or API endpoints.
Top Use Cases
Enforce Network Lists

Protect your applications against Tor networks

Stop Account Takeovers

Set rate limits to limit excessive login attempts from brute force or credential stuffing

Stop Abusive Users or Attackers

Create watch lists and tag events to monitor the user's behavior

Protect Your Origin

Hide origin servers from the open Internet to keep your apps safe and performant

Avoid Bandwidth Costs

Reduce bandwidth costs by eliminating undesired traffic spikes or attacks

Success Story

Azion protects Agibank, a Brazilian omnichannel bank with 1M+ customers, from network layer attacks.

Challenges

Solution

Result

Protecting against attacks on the financial services industry, which is highly targeted by criminals and registers hundreds of thousands of attacks monthly Optimizing observability practices in real-time for mission-critical operations Strengthening compliance with financial services rules and regulations Implemented Network Layer Protection to protect applications and origin infrastructure Integrated Data Streaming with existing SIEMs to monitor and mitigate threats in real time Created customized rule sets to meet compliance requirements Automatic mitigation of tens of thousands of attacks without impacting Agibank's services Collection of real-time data, which helped InfoSec team develop more effective defense strategies The growing volume of access requests was effectively met without security and unavailability incidents
GET STARTED

Accelerate your application modernization now.